fffffff, 0x0, 0x0) 01:59:19 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc20000", 0x32, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="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"]) 01:59:19 executing program 0: r0 = gettid() ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x4d) ptrace(0xffffffffffffffff, 0x0) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f0000001d40)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x10000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4080}, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='rdma.current\x00', 0x0, 0x0) ioctl$sock_proto_private(r2, 0x89e5, &(0x7f0000000600)="4856193edcfe08fc2ba35a8ef8ac0b9ddd5c461b2e6f111252f505f5850aec00473a79097ef9b3d9cdc97b169949e5e15a8ed708a127300cd1665dbe553a143e145729df749cb83d5b9f12fa9b05f6c9e60901a786d784830d4bed6751b9bc90f9ff6c3340b98e91f2b947908137cfa665daa27c1a410c6f9f21faa575d16f2748d04e10650ace1ed3d5d5f76ae4027f7bbd2399") perf_event_open(&(0x7f0000000580)={0x3, 0x80, 0x4a, 0x80, 0x1f, 0x1, 0x0, 0x4d93, 0x802, 0x5, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_config_ext={0xc447, 0x3}, 0x0, 0x1b, 0xb77e, 0x1, 0x3, 0x8, 0x4, 0x0, 0x6, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0xf, r2, 0x1) perf_event_open(&(0x7f0000000500)={0x4, 0x80, 0x40, 0x0, 0x1, 0x1, 0x0, 0x0, 0x112, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xae5, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x382, 0x2, 0x2, 0x9, 0x5, 0x0, 0xfffa, 0x0, 0x8000, 0x0, 0x9}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1e, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000"/262, 0x106, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="0000000000000000000000000000000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000006900000000001a8885d61aee4febb69bd33546bd0e04000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000005000000000001a8885d61aee4febb69bd33546bd0e04000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e040100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2", 0x160, 0x101ea0}, {&(0x7f0000011800)="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", 0x15d, 0x500000}, {&(0x7f0000011a00)="00000000000000000000000000000000000000000400000000000000000100000000000000905000000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000004", 0x64, 0x500560}, {&(0x7f0000011b00)="00000000000000000000000400000000000000000000000000000000a05000000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000004", 0x5b, 0x500720}, {&(0x7f0000011c00)="000001000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed41", 0x38, 0x500840}, {&(0x7f0000011d00)="00000600000000000000000000000000000000605000000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000006", 0x52, 0x5008e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000050000000000000084ffffffffffffffff0000000000000000000007000264656661756c74000000000000000002002e2e03000000000000000000000000000000000000000000000000100000000000000000000000000000010000000000000000000000ed41000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005bbc645f00000000000000005bbc645f00000000000000005bbc645f00000000000000005bbc645f000000000000000001000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed410000000000000000000000000080ffffffff", 0x132, 0x5009e0}, {&(0x7f0000012000)="000000000000000000000600000000000000000100000000000000d05000000000000000000000000000003000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000106000000000000000b4f7fb0d0124f978a408dac5052e4f6000000000000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000005cbc645f00000000c7a335155bbc645f", 0xc1, 0x500b60}, {&(0x7f0000012100)="000000000000000000070064656661756c7401000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed41", 0x48, 0x500c80}, {&(0x7f0000012200)="0000000000000000000000000000000000000600000000000000000000000000000000005100000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000006", 0x62, 0x500d20}, {&(0x7f0000012300)="00000000000000000001000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed41", 0x3f, 0x500e40}, {&(0x7f0000012400)="0000000000000000000700000000000000000000000000000000105000000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000007", 0x59, 0x500ee0}, {&(0x7f0000012500)="46ea879d00000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200105000000000000100000000000001e1ee0d5d64d84a64be712c7636496d14070000000000000002000000000000000e000000000000100000000000c00000400000000000830f0000180000000010100000000000a90000000000000000620f0000210000000000500000000000a90000000000000000410f0000210000000000500000000000c00000190000000000290f0000180000000010500000000000a90000000000000000080f0000210000000030500000000000a80030000000000000d30e0000350000000060500000000000a90000000000000000b20e0000210000000090500000000000a90000000000000000910e00002100000000a0500000000000a90000000000000000700e00002100000000c0500000000000a900000000000000004f0e00002100000000d0500000000000a901000000000000002e0e00002100000000e0500000000000a900000000000000000d0e0000210000000000510000000000a90000000000000000ec0d0000210000000000690000000000c00000190000000000d40d000018", 0x1c0, 0x501000}, {&(0x7f0000012700)="0000010000000000000500000000000000010000000000000006000000000000000200000000000000b00400000000000000010000000000000006000000000000000200000000000000b00500000000000000010000000000000006000000000000000200000000000000b00500000000000000010000000000000006000000000000000200000000000000b00500000000000000010000000000000004000000000000000200000000000000b00900000000000000010000000000000004000000000000000200000000000000b0f7ffffffffffffff010000000000000006000000000000000200000000000000b00700000000000000010000000000000006000000000000000100000000000000b205000000000000000501000000000000000000000000000001000000010000000000000007000000000000000200000000000000b0020000000000000000c000000000000000010000000000000500000000000000010000000000000007000000000000000200000000000000b00100000000000000010000000000000004000000000000000200000000000000b003000000000000000010000000000000000100000000000002", 0x1b9, 0x501e40}, {&(0x7f0000012d00)="f37badf500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200605000000000000100000000000001e1ee0d5d64d84a64be712c7636496d14060000000000000007000000000000000100000000f6ffffffffffffff8000305000000000008f0f00000c", 0x7b, 0x506000}, {&(0x7f0000012e00)="00000000000000000000000000000000000000008941f9988941f9988941f998f3", 0x21, 0x506fe0}, {&(0x7f0000013000)="b95ad41c00000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200905000000000000100000000000001e1ee0d5d64d84a64be712c7636496d140400000000000000f7ffffffffffffff02000000000001000000000000010000000000000000fb0e0000a000000000010000000000000c0001000000000000ef0e00000c", 0x94, 0x509000}, {&(0x7f0000013100)="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", 0x13b, 0x509f40}, {&(0x7f0000013300)="000000000000000000000000000000000000000000000000050000", 0x1b, 0x50afe0}, {&(0x7f0000013500)="0000010000000000000500000000000000010000000000000006000000000000000200000000000000b00400000000000000010000000000000006000000000000000200000000000000b00100000000000000010000000000000006000000000000000200000000000000b00500000000000000010000000000000006000000000000000200000000000000b00500000000000000010000000000000006000000000000000200000000000000b00500000000000000010000000000000006000000000000000200000000000000b00200000000000000010000000000000004000000000000000200000000000000b00900000000000000010000000000000004000000000000000200000000000000b0f7ffffffffffffff010000000000000006000000000000000200000000000000b00700000000000000010000000000000006000000000000000100000000000000b20500000000000000050100000000000000000000000000000100000000c000000000000000010000000000000500000000000000010000000000000004000000000000000200000000000000b00300000000000000001000000000000000010000000000000200000000000000d35bdc0e00000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200c05000000000000100000000000001e1ee0d5d64d84a64be712c7636496d140600000000000000050000000000000012000000000001000000000000010000000000000000fb0e0000a000000000010000000000000c0001000000000000ef0e00000c0000000001000000000000544bae790400000000cc0e0000230000000001000000000000546b826b1100000000a50e000027000000000100000000000054bf5d291700000000820e000023000000000100000000000054bcde42e5000000005f0e000023000000000100000000000054482d12f6000000003c0e0000230000000001000000000000600200000000000000190e0000230000000001000000000000600300000000000000f60d0000230000000001000000000000600400000000000000d30d0000230000000001000000000000600500000000000000b00d0000230000000001000000000000600600000000000000890d0000270000000101000000000000010000000000000000e90c0000a000000001010000000000000c0001000000000000da0c00000f0000000101000000000000544bae790400000000b70c000023000000010100000000000054482d12f600000000940c0000230000000101000000000000600200000000000000710c00002300000001010000000000006003000000000000004e0c000023", 0x3e4, 0x50be40}, {&(0x7f0000013900)="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", 0x400, 0x50cca0}, {&(0x7f0000000700)="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", 0x20b, 0x50e000}, {&(0x7f0000014000)="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", 0x920, 0x50e6e0}, {&(0x7f0000015600)="af6d627700000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200005100000000000100000000000001e1ee0d5d64d84a64be712c7636496d140600000000000000040000000000000004000000000000000000000000f90100000000000000730f0000280000000100000000000000cc0000100000000000430f0000300000000100000000000000cc0000500000000000130f0000300000000100000000000000cc0000690000000000e30e000030", 0xc6, 0x510000}, {&(0x7f0000015700)="00000000000000000300000000000000000100000000000000006900000000000000190000000000e1ee0d5d64d84a64be712c7636496d140300000000000000000100000000000000005000000000000000190000000000e1ee0d5d64d84a64be712c7636496d140300000000000000000100000000000000001000000000000000400000000000e1ee0d5d64d84a64be712c7636496d14", 0x98, 0x510f40}], 0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="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"]) [ 353.134448] BTRFS error (device loop5): superblock checksum mismatch [ 353.206310] BTRFS error (device loop5): open_ctree failed [ 353.314733] BTRFS error (device loop3): superblock checksum mismatch [ 353.353710] BTRFS error (device loop3): open_ctree failed 01:59:19 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r2 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) 01:59:19 executing program 3: r0 = gettid() ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x4d) ptrace(0xffffffffffffffff, 0x0) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f0000001d40)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x10000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4080}, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='rdma.current\x00', 0x0, 0x0) ioctl$sock_proto_private(r2, 0x89e5, &(0x7f0000000600)="4856193edcfe08fc2ba35a8ef8ac0b9ddd5c461b2e6f111252f505f5850aec00473a79097ef9b3d9cdc97b169949e5e15a8ed708a127300cd1665dbe553a143e145729df749cb83d5b9f12fa9b05f6c9e60901a786d784830d4bed6751b9bc90f9ff6c3340b98e91f2b947908137cfa665daa27c1a410c6f9f21faa575d16f2748d04e10650ace1ed3d5d5f76ae4027f7bbd2399") perf_event_open(&(0x7f0000000580)={0x3, 0x80, 0x4a, 0x80, 0x1f, 0x1, 0x0, 0x4d93, 0x802, 0x5, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_config_ext={0xc447, 0x3}, 0x0, 0x1b, 0xb77e, 0x1, 0x3, 0x8, 0x4, 0x0, 0x6, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0xf, r2, 0x1) perf_event_open(&(0x7f0000000500)={0x4, 0x80, 0x40, 0x0, 0x1, 0x1, 0x0, 0x0, 0x112, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xae5, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x382, 0x2, 0x2, 0x9, 0x5, 0x0, 0xfffa, 0x0, 0x8000, 0x0, 0x9}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x2}, 0x8) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1e, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000"/262, 0x106, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {&(0x7f0000011800)="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", 0x15d, 0x500000}, {&(0x7f0000011a00)="00000000000000000000000000000000000000000400000000000000000100000000000000905000000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000004", 0x64, 0x500560}, {&(0x7f0000011b00)="00000000000000000000000400000000000000000000000000000000a05000000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000004", 0x5b, 0x500720}, {&(0x7f0000011c00)="000001000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed41", 0x38, 0x500840}, {&(0x7f0000011d00)="00000600000000000000000000000000000000605000000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000006", 0x52, 0x5008e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000050000000000000084ffffffffffffffff0000000000000000000007000264656661756c74000000000000000002002e2e03000000000000000000000000000000000000000000000000100000000000000000000000000000010000000000000000000000ed41000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005bbc645f00000000000000005bbc645f00000000000000005bbc645f00000000000000005bbc645f000000000000000001000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed410000000000000000000000000080ffffffff", 0x132, 0x5009e0}, {&(0x7f0000012000)="000000000000000000000600000000000000000100000000000000d05000000000000000000000000000003000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000106000000000000000b4f7fb0d0124f978a408dac5052e4f6000000000000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000005cbc645f00000000c7a335155bbc645f", 0xc1, 0x500b60}, {&(0x7f0000012100)="000000000000000000070064656661756c7401000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed41", 0x48, 0x500c80}, {&(0x7f0000012200)="0000000000000000000000000000000000000600000000000000000000000000000000005100000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000006", 0x62, 0x500d20}, {&(0x7f0000012300)="00000000000000000001000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed41", 0x3f, 0x500e40}, {&(0x7f0000012400)="0000000000000000000700000000000000000000000000000000105000000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000007", 0x59, 0x500ee0}, {&(0x7f0000012500)="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", 0x1c0, 0x501000}, {&(0x7f0000012700)="0000010000000000000500000000000000010000000000000006000000000000000200000000000000b00400000000000000010000000000000006000000000000000200000000000000b00500000000000000010000000000000006000000000000000200000000000000b00500000000000000010000000000000006000000000000000200000000000000b00500000000000000010000000000000004000000000000000200000000000000b00900000000000000010000000000000004000000000000000200000000000000b0f7ffffffffffffff010000000000000006000000000000000200000000000000b00700000000000000010000000000000006000000000000000100000000000000b205000000000000000501000000000000000000000000000001000000010000000000000007000000000000000200000000000000b0020000000000000000c000000000000000010000000000000500000000000000010000000000000007000000000000000200000000000000b00100000000000000010000000000000004000000000000000200000000000000b003000000000000000010000000000000000100000000000002", 0x1b9, 0x501e40}, {&(0x7f0000012d00)="f37badf500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200605000000000000100000000000001e1ee0d5d64d84a64be712c7636496d14060000000000000007000000000000000100000000f6ffffffffffffff8000305000000000008f0f00000c", 0x7b, 0x506000}, {&(0x7f0000012e00)="00000000000000000000000000000000000000008941f9988941f9988941f998f3", 0x21, 0x506fe0}, {&(0x7f0000013000)="b95ad41c00000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200905000000000000100000000000001e1ee0d5d64d84a64be712c7636496d140400000000000000f7ffffffffffffff02000000000001000000000000010000000000000000fb0e0000a000000000010000000000000c0001000000000000ef0e00000c", 0x94, 0x509000}, {&(0x7f0000013100)="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", 0x13b, 0x509f40}, {&(0x7f0000013300)="000000000000000000000000000000000000000000000000050000", 0x1b, 0x50afe0}, {&(0x7f0000013500)="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", 0x3e4, 0x50be40}, {&(0x7f0000013900)="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", 0x400, 0x50cca0}, {&(0x7f0000000700)="f816d9c600000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200e05000000000000100000000000001e1ee0d5d64d84a64be712c7636496d140600000000000000050000000000000011000000000201000000000000010000000000000000fb0e0000a000000002010000000000000c0101000000000000ec0e00000f00000002010000000000006c0000000000000000bd0a00002f04000003010000000000000100000000000000001d0a0000a000000003010000000000000c01010000000000000e0a00000f00000003010000000000006c0000000000000000d30900003b000000040100000000000001000000000000000033090000a000000004010000000000000c0001000000000000240900000f00000004010000000000001822a8f12600000000f50800002f000000040100000000000018d65ba13500000000c60800002f00000004010000000000006c0000000000000000a70800001f000000050100000000000001000000000000000007080000a000000005010000000000000c0001000000000000e90700001e00000005010000000000006c0000000000000000b407000035000000060100000000000001000000000000000014070000a000000006010000000000000c0001000000000000010700001300000006010000000000006c00000000000000008806000079", 0x20b, 0x50e000}, {&(0x7f0000014000)="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", 0x920, 0x50e6e0}, {&(0x7f0000015600)="af6d627700000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200005100000000000100000000000001e1ee0d5d64d84a64be712c7636496d140600000000000000040000000000000004000000000000000000000000f90100000000000000730f0000280000000100000000000000cc0000100000000000430f0000300000000100000000000000cc0000500000000000130f0000300000000100000000000000cc0000690000000000e30e000030", 0xc6, 0x510000}, {&(0x7f0000015700)="00000000000000000300000000000000000100000000000000006900000000000000190000000000e1ee0d5d64d84a64be712c7636496d140300000000000000000100000000000000005000000000000000190000000000e1ee0d5d64d84a64be712c7636496d140300000000000000000100000000000000001000000000000000400000000000e1ee0d5d64d84a64be712c7636496d14", 0x98, 0x510f40}], 0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="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"]) 01:59:19 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x128, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:19 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc20000", 0x32, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="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"]) 01:59:19 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="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"]) 01:59:19 executing program 0: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00), 0x0, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r2 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) 01:59:19 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x129, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:19 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="636f6d70726573732d666f7263653d7a6c69622c001162c7bf2ada3c242ec6317802d843f45487e3574147e2ce454ccfb4134c48efc5fe21b350a76cc9a9dddb4c93fe19c5b02e5e7bea1b3a86dc4861ab96775d3cd8ec9a4d678538951988167bc888bb4fdfdb4feedcbbf2bc7045b91f74a2090bc8731759fbbda5b4dee056450a843e3fc24dfe3a2ed8e65c5252dfbf6195437a0e2d5119f6f664566598bb9eb4907945f006a1c90eda211291bae4182110b51042ba3bc3c70847174482f9405a3ad87e9b6e12ffbbe701d5a148dae5864f0db46ab5d26a82ddf530c892010400885bc07ffb00a1db5c42e71cba34fb64c4797e6e50aa57968314f81668a2d74e863f2b4a314aaeea1a902af62503739d36faecb475ffa6fdea292e81a760c2edb16aa6e7e1c2494b719f202e04795d7374b467290ecd14bfde9dbb21fe221fbfe1e0c77d5907bf010f66cc02c9bd1f2fd485c2ec3dbe8f63804c998e0857211c60ad99fc5ea88e70c49bfb9b94855c5785ad1aa4a350bf22fb85b9ab74843c3f6e9ae6e04358469f9ffca065eb35989c8cbbbf8d030e083aac0e928308eb8ba2d546cf8cf72afc0c0a54010662af6a3f43b2a74cea1e10e86bf66e5f38ae907b7d0fa418af3ff617084948647dd7a129a67f2987828c074eafa317ad9236d3b4daceea144c252ab4dff85b1d9284e8714264c502845a5d3f374bb620e4af6cbd3af133eed76c9f4f363b4cf56317c7a6a75c97cbb0d880a0a88ff569eec2dcacdbed4c53905f7f2d182b285c76209a803648e98645dcd135da01a62b626fb961ea2270d7828517ebc565a55e7de0d62aa21cdc733f0f77e3d3e3a8134254eb26000000000000000000000081000fde19730e8367654bfca91bacf5781f939f0dc498279c05a8adb0c2f4f76a8a3e3b2224b600be4659700966cdd8f94ead25b5f2202a2049314bb1bcb0c25f798b3d4ad868a32d508b823837cb10b8580ab03accc8476505ecf4f03abd70afa3ad4966043d2ef3f480d686c321b7b83d38b3393fc5d4938edebf6acc81b8291635abf9a031ee4a0000000000000000000000000000fae5ec3d52a8a04342004542f73a20592f92bd71e7d7d9a806ec8460e7184419d5831110c923b9057754bc8e7fd719bdaeeaa703ca69b6cbe0b45e83ae97e6754ebd56bd6541f4fb1100769dc3a3323b5a3adba5d6ffc88379b12d73fb87a71d6059be8166888c3cd6438ab95e"]) [ 353.590190] audit: type=1804 audit(1630461559.883:196): pid=20818 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir191613056/syzkaller.RalUww/281/bus" dev="sda1" ino=14471 res=1 01:59:20 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x12a, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 353.722781] audit: type=1804 audit(1630461560.013:197): pid=20831 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/188/file0/bus" dev="loop1" ino=1 res=1 01:59:20 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, 0x0, 0x0, 0xda1, 0x0) r2 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) 01:59:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc20000", 0x32, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="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"]) 01:59:20 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x12b, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:20 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="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"]) [ 354.043894] BTRFS error (device loop3): superblock checksum mismatch [ 354.096304] audit: type=1804 audit(1630461560.393:198): pid=20855 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/189/file0/bus" dev="sda1" ino=14466 res=1 [ 354.102290] BTRFS error (device loop3): open_ctree failed 01:59:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33}], 0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="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"]) 01:59:20 executing program 3: r0 = gettid() ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x4d) ptrace(0xffffffffffffffff, 0x0) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f0000001d40)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x10000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4080}, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='rdma.current\x00', 0x0, 0x0) ioctl$sock_proto_private(r2, 0x89e5, &(0x7f0000000600)="4856193edcfe08fc2ba35a8ef8ac0b9ddd5c461b2e6f111252f505f5850aec00473a79097ef9b3d9cdc97b169949e5e15a8ed708a127300cd1665dbe553a143e145729df749cb83d5b9f12fa9b05f6c9e60901a786d784830d4bed6751b9bc90f9ff6c3340b98e91f2b947908137cfa665daa27c1a410c6f9f21faa575d16f2748d04e10650ace1ed3d5d5f76ae4027f7bbd2399") perf_event_open(&(0x7f0000000580)={0x3, 0x80, 0x4a, 0x80, 0x1f, 0x1, 0x0, 0x4d93, 0x802, 0x5, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_config_ext={0xc447, 0x3}, 0x0, 0x1b, 0xb77e, 0x1, 0x3, 0x8, 0x4, 0x0, 0x6, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0xf, r2, 0x1) perf_event_open(&(0x7f0000000500)={0x4, 0x80, 0x40, 0x0, 0x1, 0x1, 0x0, 0x0, 0x112, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xae5, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x382, 0x2, 0x2, 0x9, 0x5, 0x0, 0xfffa, 0x0, 0x8000, 0x0, 0x9}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x2}, 0x8) setsockopt$inet_int(r3, 0x0, 0x7, &(0x7f0000000040)=0x1000, 0x4) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1e, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000"/262, 0x106, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="0000000000000000000000000000000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000006900000000001a8885d61aee4febb69bd33546bd0e04000019000000000002000000000000000000010000000000050000000000000000000100000001000010000001000100010000000000000000005000000000001a8885d61aee4febb69bd33546bd0e04000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e040100000000000000000000010000000000007200000000000010000000100000001000000000000000000000000000000000000000000000000000000000000000001a8885d61aee4febb69bd33546bd0e04f90cac8b044b4fa88bee4b8d3da88dc2b758485800000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200101000000000000100000000000001e1ee0d5d64d84a64be712c7636496d140400000000000000030000000000000004000000000100000000000000d80100000000000000390f0000620000000001000000000000e40000100000000000e90e0000500000000001000000000000e40000500000000000990e0000500000000001000000000000e40000690000000000490e000050", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {&(0x7f0000011800)="b8e6bc4200000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200005000000000000100000000000001e1ee0d5d64d84a64be712c7636496d14070000000000000001000000000000000a000000000200000000000000840000000000000000e40d0000b701000004000000000000008400000000000000002d0c0000b701000005000000000000000c06000000000000001c0c0000110000000500000000000000840000000000000000650a0000b70100000600000000000000010000000000000000c5090000a000000006000000000000000c0600000000000000b90900000c000000060000000000000054d2c2bf8d0000000094090000250000000700000000000000840000000000000000dd070000b7010000090000000000000084000000000000000026060000b7010000f7ffffffffffffff8400000000000000006f040000b701", 0x15d, 0x500000}, {&(0x7f0000011a00)="00000000000000000000000000000000000000000400000000000000000100000000000000905000000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000004", 0x64, 0x500560}, {&(0x7f0000011b00)="00000000000000000000000400000000000000000000000000000000a05000000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000004", 0x5b, 0x500720}, {&(0x7f0000011c00)="000001000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed41", 0x38, 0x500840}, {&(0x7f0000011d00)="00000600000000000000000000000000000000605000000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000006", 0x52, 0x5008e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000050000000000000084ffffffffffffffff0000000000000000000007000264656661756c74000000000000000002002e2e03000000000000000000000000000000000000000000000000100000000000000000000000000000010000000000000000000000ed41000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005bbc645f00000000000000005bbc645f00000000000000005bbc645f00000000000000005bbc645f000000000000000001000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed410000000000000000000000000080ffffffff", 0x132, 0x5009e0}, {&(0x7f0000012000)="000000000000000000000600000000000000000100000000000000d05000000000000000000000000000003000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000106000000000000000b4f7fb0d0124f978a408dac5052e4f6000000000000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000005cbc645f00000000c7a335155bbc645f", 0xc1, 0x500b60}, {&(0x7f0000012100)="000000000000000000070064656661756c7401000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed41", 0x48, 0x500c80}, {&(0x7f0000012200)="0000000000000000000000000000000000000600000000000000000000000000000000005100000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000006", 0x62, 0x500d20}, {&(0x7f0000012300)="00000000000000000001000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed41", 0x3f, 0x500e40}, {&(0x7f0000012400)="0000000000000000000700000000000000000000000000000000105000000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000007", 0x59, 0x500ee0}, {&(0x7f0000012500)="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", 0x1c0, 0x501000}, {&(0x7f0000012700)="0000010000000000000500000000000000010000000000000006000000000000000200000000000000b00400000000000000010000000000000006000000000000000200000000000000b00500000000000000010000000000000006000000000000000200000000000000b00500000000000000010000000000000006000000000000000200000000000000b00500000000000000010000000000000004000000000000000200000000000000b00900000000000000010000000000000004000000000000000200000000000000b0f7ffffffffffffff010000000000000006000000000000000200000000000000b00700000000000000010000000000000006000000000000000100000000000000b205000000000000000501000000000000000000000000000001000000010000000000000007000000000000000200000000000000b0020000000000000000c000000000000000010000000000000500000000000000010000000000000007000000000000000200000000000000b00100000000000000010000000000000004000000000000000200000000000000b003000000000000000010000000000000000100000000000002", 0x1b9, 0x501e40}, {&(0x7f0000012d00)="f37badf500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200605000000000000100000000000001e1ee0d5d64d84a64be712c7636496d14060000000000000007000000000000000100000000f6ffffffffffffff8000305000000000008f0f00000c", 0x7b, 0x506000}, {&(0x7f0000012e00)="00000000000000000000000000000000000000008941f9988941f9988941f998f3", 0x21, 0x506fe0}, {&(0x7f0000013000)="b95ad41c00000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200905000000000000100000000000001e1ee0d5d64d84a64be712c7636496d140400000000000000f7ffffffffffffff02000000000001000000000000010000000000000000fb0e0000a000000000010000000000000c0001000000000000ef0e00000c", 0x94, 0x509000}, {&(0x7f0000013100)="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", 0x13b, 0x509f40}, {&(0x7f0000013300)="000000000000000000000000000000000000000000000000050000", 0x1b, 0x50afe0}, {&(0x7f0000013500)="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", 0x3e4, 0x50be40}, {&(0x7f0000013900)="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", 0x400, 0x50cca0}, {&(0x7f0000000700)="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", 0x20b, 0x50e000}, {&(0x7f0000014000)="0000000000000000000000000006000000000000006400000000000000000000000073797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c6572730600000000000000090066696c652e636f6c6406000000000000000600000000000000640000000000000064000000000000000000000000000000010000000000000000000000ed81000000000000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000005cbc645f00000000cb865b135cbc645f00000000cb865b135cbc645f00000000cb865b135cbc645f00000000cb865b1306000000000000000030000000000000000000000100305000000000000030000000000000000000000000000000300000000000000400000000000000050066696c65320500000000000000050066696c653306000000000000000600000000000000282300000000000000300000000000000000000000000000020000000000000000000000ed81000000000000000000000000000000000000070000000000000000000000000000000000000000000000000000000000000000000000000000005cbc645f00000000cb865b135cbc645f00000000cb865b135cbc645f00000000cb865b135cbc645f00000000cb865b1306000000000000000a00000000000000000000000073797a6b616c6c6572730000000000000000000000000000000000060000000000000006000b0008757365722e7861747472317861747472310000000000000000000000000000000000060000000000000006000b0008757365722e7861747472327861747472320300000000000000050066696c6531060000000000000006000000000000000a000000000000000a000000000000000000000000000000010000000000000000000000ed81000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000005cbc645f00000000cb865b135cbc645f00000000cb865b135cbc645f00000000cb865b135cbc645f00000000cb865b130600000000000000260000000000000000000000002f746d702f73797a2d696d61676567656e3038323231363939382f66696c65302f66696c65300300000000000000050066696c653106000000000000000600000000000000260000000000000026000000000000000000000000000000010000000000000000000000ffa1000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000005cbc645f00000000cb865b135cbc645f00000000cb865b135cbc645f00000000cb865b135cbc645f00000000cb865b1306000000000000001a04000000000000000000000073797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c0200000000000000050066696c6530060000000000000006000000000000001a040000000000001a040000000000000000000000000000010000000000000000000000ed81000000000000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000005cbc645f00000000cb865b135cbc645f00000000cb865b135cbc645f00000000cb865b135cbc645f00000000cb865b13", 0x920, 0x50e6e0}, {&(0x7f0000015600)="af6d627700000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200005100000000000100000000000001e1ee0d5d64d84a64be712c7636496d140600000000000000040000000000000004000000000000000000000000f90100000000000000730f0000280000000100000000000000cc0000100000000000430f0000300000000100000000000000cc0000500000000000130f0000300000000100000000000000cc0000690000000000e30e000030", 0xc6, 0x510000}, {&(0x7f0000015700)="00000000000000000300000000000000000100000000000000006900000000000000190000000000e1ee0d5d64d84a64be712c7636496d140300000000000000000100000000000000005000000000000000190000000000e1ee0d5d64d84a64be712c7636496d140300000000000000000100000000000000001000000000000000400000000000e1ee0d5d64d84a64be712c7636496d14", 0x98, 0x510f40}], 0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="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"]) 01:59:20 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x12c, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:20 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="636f6d70726573732d666f7263653d7a6c69622c001162c7bf2ada3c242ec6317802d843f45487e3574147e2ce454ccfb4134c48efc5fe21b350a76cc9a9dddb4c93fe19c5b02e5e7bea1b3a86dc4861ab96775d3cd8ec9a4d678538951988167bc888bb4fdfdb4feedcbbf2bc7045b91f74a2090bc8731759fbbda5b4dee056450a843e3fc24dfe3a2ed8e65c5252dfbf6195437a0e2d5119f6f664566598bb9eb4907945f006a1c90eda211291bae4182110b51042ba3bc3c70847174482f9405a3ad87e9b6e12ffbbe701d5a148dae5864f0db46ab5d26a82ddf530c892010400885bc07ffb00a1db5c42e71cba34fb64c4797e6e50aa57968314f81668a2d74e863f2b4a314aaeea1a902af62503739d36faecb475ffa6fdea292e81a760c2edb16aa6e7e1c2494b719f202e04795d7374b467290ecd14bfde9dbb21fe221fbfe1e0c77d5907bf010f66cc02c9bd1f2fd485c2ec3dbe8f63804c998e0857211c60ad99fc5ea88e70c49bfb9b94855c5785ad1aa4a350bf22fb85b9ab74843c3f6e9ae6e04358469f9ffca065eb35989c8cbbbf8d030e083aac0e928308eb8ba2d546cf8cf72afc0c0a54010662af6a3f43b2a74cea1e10e86bf66e5f38ae907b7d0fa418af3ff617084948647dd7a129a67f2987828c074eafa317ad9236d3b4daceea144c252ab4dff85b1d9284e8714264c502845a5d3f374bb620e4af6cbd3af133eed76c9f4f363b4cf56317c7a6a75c97cbb0d880a0a88ff569eec2dcacdbed4c53905f7f2d182b285c76209a803648e98645dcd135da01a62b626fb961ea2270d7828517ebc565a55e7de0d62aa21cdc733f0f77e3d3e3a8134254eb26000000000000000000000081000fde19730e8367654bfca91bacf5781f939f0dc498279c05a8adb0c2f4f76a8a3e3b2224b600be4659700966cdd8f94ead25b5f2202a2049314bb1bcb0c25f798b3d4ad868a32d508b823837cb10b8580ab03accc8476505ecf4f03abd70afa3ad4966043d2ef3f480d686c321b7b83d38b3393fc5d4938edebf6acc81b8291635abf9a031ee4a0000000000000000000000000000fae5ec3d52a8a04342004542f73a20592f92bd71e7d7d9a806ec8460e7184419d5831110c923b9057754bc8e7fd719bdaeeaa703ca69b6cbe0b45e83ae97e6754ebd56bd6541f4fb1100769dc3a3323b5a3adba5d6ffc88379b12d73fb87a71d6059be8166888c3cd6438ab95e"]) 01:59:20 executing program 0: r0 = gettid() ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x4d) ptrace(0xffffffffffffffff, 0x0) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f0000001d40)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x10000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4080}, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='rdma.current\x00', 0x0, 0x0) ioctl$sock_proto_private(r2, 0x89e5, &(0x7f0000000600)="4856193edcfe08fc2ba35a8ef8ac0b9ddd5c461b2e6f111252f505f5850aec00473a79097ef9b3d9cdc97b169949e5e15a8ed708a127300cd1665dbe553a143e145729df749cb83d5b9f12fa9b05f6c9e60901a786d784830d4bed6751b9bc90f9ff6c3340b98e91f2b947908137cfa665daa27c1a410c6f9f21faa575d16f2748d04e10650ace1ed3d5d5f76ae4027f7bbd2399") perf_event_open(&(0x7f0000000580)={0x3, 0x80, 0x4a, 0x80, 0x1f, 0x1, 0x0, 0x4d93, 0x802, 0x5, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_config_ext={0xc447, 0x3}, 0x0, 0x1b, 0xb77e, 0x1, 0x3, 0x8, 0x4, 0x0, 0x6, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0xf, r2, 0x1) perf_event_open(&(0x7f0000000500)={0x4, 0x80, 0x40, 0x0, 0x1, 0x1, 0x0, 0x0, 0x112, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xae5, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x382, 0x2, 0x2, 0x9, 0x5, 0x0, 0xfffa, 0x0, 0x8000, 0x0, 0x9}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x2}, 0x8) setsockopt$inet_int(r3, 0x0, 0x7, &(0x7f0000000040)=0x1000, 0x4) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1e, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000"/262, 0x106, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {&(0x7f0000011800)="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", 0x15d, 0x500000}, {&(0x7f0000011a00)="00000000000000000000000000000000000000000400000000000000000100000000000000905000000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000004", 0x64, 0x500560}, {&(0x7f0000011b00)="00000000000000000000000400000000000000000000000000000000a05000000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000004", 0x5b, 0x500720}, {&(0x7f0000011c00)="000001000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed41", 0x38, 0x500840}, {&(0x7f0000011d00)="00000600000000000000000000000000000000605000000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000006", 0x52, 0x5008e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000050000000000000084ffffffffffffffff0000000000000000000007000264656661756c74000000000000000002002e2e03000000000000000000000000000000000000000000000000100000000000000000000000000000010000000000000000000000ed41000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005bbc645f00000000000000005bbc645f00000000000000005bbc645f00000000000000005bbc645f000000000000000001000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed410000000000000000000000000080ffffffff", 0x132, 0x5009e0}, {&(0x7f0000012000)="000000000000000000000600000000000000000100000000000000d05000000000000000000000000000003000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000106000000000000000b4f7fb0d0124f978a408dac5052e4f6000000000000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000005cbc645f00000000c7a335155bbc645f", 0xc1, 0x500b60}, {&(0x7f0000012100)="000000000000000000070064656661756c7401000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed41", 0x48, 0x500c80}, {&(0x7f0000012200)="0000000000000000000000000000000000000600000000000000000000000000000000005100000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000006", 0x62, 0x500d20}, {&(0x7f0000012300)="00000000000000000001000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed41", 0x3f, 0x500e40}, {&(0x7f0000012400)="0000000000000000000700000000000000000000000000000000105000000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000007", 0x59, 0x500ee0}, {&(0x7f0000012500)="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", 0x1c0, 0x501000}, {&(0x7f0000012700)="0000010000000000000500000000000000010000000000000006000000000000000200000000000000b00400000000000000010000000000000006000000000000000200000000000000b00500000000000000010000000000000006000000000000000200000000000000b00500000000000000010000000000000006000000000000000200000000000000b00500000000000000010000000000000004000000000000000200000000000000b00900000000000000010000000000000004000000000000000200000000000000b0f7ffffffffffffff010000000000000006000000000000000200000000000000b00700000000000000010000000000000006000000000000000100000000000000b205000000000000000501000000000000000000000000000001000000010000000000000007000000000000000200000000000000b0020000000000000000c000000000000000010000000000000500000000000000010000000000000007000000000000000200000000000000b00100000000000000010000000000000004000000000000000200000000000000b003000000000000000010000000000000000100000000000002", 0x1b9, 0x501e40}, {&(0x7f0000012d00)="f37badf500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200605000000000000100000000000001e1ee0d5d64d84a64be712c7636496d14060000000000000007000000000000000100000000f6ffffffffffffff8000305000000000008f0f00000c", 0x7b, 0x506000}, {&(0x7f0000012e00)="00000000000000000000000000000000000000008941f9988941f9988941f998f3", 0x21, 0x506fe0}, {&(0x7f0000013000)="b95ad41c00000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200905000000000000100000000000001e1ee0d5d64d84a64be712c7636496d140400000000000000f7ffffffffffffff02000000000001000000000000010000000000000000fb0e0000a000000000010000000000000c0001000000000000ef0e00000c", 0x94, 0x509000}, {&(0x7f0000013100)="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", 0x13b, 0x509f40}, {&(0x7f0000013300)="000000000000000000000000000000000000000000000000050000", 0x1b, 0x50afe0}, {&(0x7f0000013500)="0000010000000000000500000000000000010000000000000006000000000000000200000000000000b00400000000000000010000000000000006000000000000000200000000000000b00100000000000000010000000000000006000000000000000200000000000000b00500000000000000010000000000000006000000000000000200000000000000b00500000000000000010000000000000006000000000000000200000000000000b00500000000000000010000000000000006000000000000000200000000000000b00200000000000000010000000000000004000000000000000200000000000000b00900000000000000010000000000000004000000000000000200000000000000b0f7ffffffffffffff010000000000000006000000000000000200000000000000b00700000000000000010000000000000006000000000000000100000000000000b20500000000000000050100000000000000000000000000000100000000c000000000000000010000000000000500000000000000010000000000000004000000000000000200000000000000b00300000000000000001000000000000000010000000000000200000000000000d35bdc0e00000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200c05000000000000100000000000001e1ee0d5d64d84a64be712c7636496d140600000000000000050000000000000012000000000001000000000000010000000000000000fb0e0000a000000000010000000000000c0001000000000000ef0e00000c0000000001000000000000544bae790400000000cc0e0000230000000001000000000000546b826b1100000000a50e000027000000000100000000000054bf5d291700000000820e000023000000000100000000000054bcde42e5000000005f0e000023000000000100000000000054482d12f6000000003c0e0000230000000001000000000000600200000000000000190e0000230000000001000000000000600300000000000000f60d0000230000000001000000000000600400000000000000d30d0000230000000001000000000000600500000000000000b00d0000230000000001000000000000600600000000000000890d0000270000000101000000000000010000000000000000e90c0000a000000001010000000000000c0001000000000000da0c00000f0000000101000000000000544bae790400000000b70c000023000000010100000000000054482d12f600000000940c0000230000000101000000000000600200000000000000710c00002300000001010000000000006003000000000000004e0c000023", 0x3e4, 0x50be40}, {&(0x7f0000013900)="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", 0x400, 0x50cca0}, {&(0x7f0000000700)="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", 0x20b, 0x50e000}, {&(0x7f0000014000)="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", 0x920, 0x50e6e0}, {&(0x7f0000015600)="af6d627700000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200005100000000000100000000000001e1ee0d5d64d84a64be712c7636496d140600000000000000040000000000000004000000000000000000000000f90100000000000000730f0000280000000100000000000000cc0000100000000000430f0000300000000100000000000000cc0000500000000000130f0000300000000100000000000000cc0000690000000000e30e000030", 0xc6, 0x510000}, {&(0x7f0000015700)="00000000000000000300000000000000000100000000000000006900000000000000190000000000e1ee0d5d64d84a64be712c7636496d140300000000000000000100000000000000005000000000000000190000000000e1ee0d5d64d84a64be712c7636496d140300000000000000000100000000000000001000000000000000400000000000e1ee0d5d64d84a64be712c7636496d14", 0x98, 0x510f40}], 0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="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"]) 01:59:20 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x12d, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:20 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33}], 0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="636f6d70726573732d666f7263653d7a6c69622c001162c7bf2ada3c242ec6317802d843f45487e3574147e2ce454ccfb4134c48efc5fe21b350a76cc9a9dddb4c93fe19c5b02e5e7bea1b3a86dc4861ab96775d3cd8ec9a4d678538951988167bc888bb4fdfdb4feedcbbf2bc7045b91f74a2090bc8731759fbbda5b4dee056450a843e3fc24dfe3a2ed8e65c5252dfbf6195437a0e2d5119f6f664566598bb9eb4907945f006a1c90eda211291bae4182110b51042ba3bc3c70847174482f9405a3ad87e9b6e12ffbbe701d5a148dae5864f0db46ab5d26a82ddf530c892010400885bc07ffb00a1db5c42e71cba34fb64c4797e6e50aa57968314f81668a2d74e863f2b4a314aaeea1a902af62503739d36faecb475ffa6fdea292e81a760c2edb16aa6e7e1c2494b719f202e04795d7374b467290ecd14bfde9dbb21fe221fbfe1e0c77d5907bf010f66cc02c9bd1f2fd485c2ec3dbe8f63804c998e0857211c60ad99fc5ea88e70c49bfb9b94855c5785ad1aa4a350bf22fb85b9ab74843c3f6e9ae6e04358469f9ffca065eb35989c8cbbbf8d030e083aac0e928308eb8ba2d546cf8cf72afc0c0a54010662af6a3f43b2a74cea1e10e86bf66e5f38ae907b7d0fa418af3ff617084948647dd7a129a67f2987828c074eafa317ad9236d3b4daceea144c252ab4dff85b1d9284e8714264c502845a5d3f374bb620e4af6cbd3af133eed76c9f4f363b4cf56317c7a6a75c97cbb0d880a0a88ff569eec2dcacdbed4c53905f7f2d182b285c76209a803648e98645dcd135da01a62b626fb961ea2270d7828517ebc565a55e7de0d62aa21cdc733f0f77e3d3e3a8134254eb26000000000000000000000081000fde19730e8367654bfca91bacf5781f939f0dc498279c05a8adb0c2f4f76a8a3e3b2224b600be4659700966cdd8f94ead25b5f2202a2049314bb1bcb0c25f798b3d4ad868a32d508b823837cb10b8580ab03accc8476505ecf4f03abd70afa3ad4966043d2ef3f480d686c321b7b83d38b3393fc5d4938edebf6acc81b8291635abf9a031ee4a0000000000000000000000000000fae5ec3d52a8a04342004542f73a20592f92bd71e7d7d9a806ec8460e7184419d5831110c923b9057754bc8e7fd719bdaeeaa703ca69b6cbe0b45e83ae97e6754ebd56bd6541f4fb1100769dc3a3323b5a3adba5d6ffc88379b12d73fb87a71d6059be8166888c3cd6438ab95e"]) [ 354.550674] BTRFS error (device loop3): superblock checksum mismatch [ 354.594379] BTRFS error (device loop3): open_ctree failed 01:59:21 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x12e, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 354.749245] BTRFS error (device loop3): superblock checksum mismatch [ 354.793602] BTRFS error (device loop3): open_ctree failed 01:59:21 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, 0x0, 0x0, 0xda1, 0x0) r2 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) 01:59:21 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="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"]) 01:59:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33}], 0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="636f6d70726573732d666f7263653d7a6c69622c001162c7bf2ada3c242ec6317802d843f45487e3574147e2ce454ccfb4134c48efc5fe21b350a76cc9a9dddb4c93fe19c5b02e5e7bea1b3a86dc4861ab96775d3cd8ec9a4d678538951988167bc888bb4fdfdb4feedcbbf2bc7045b91f74a2090bc8731759fbbda5b4dee056450a843e3fc24dfe3a2ed8e65c5252dfbf6195437a0e2d5119f6f664566598bb9eb4907945f006a1c90eda211291bae4182110b51042ba3bc3c70847174482f9405a3ad87e9b6e12ffbbe701d5a148dae5864f0db46ab5d26a82ddf530c892010400885bc07ffb00a1db5c42e71cba34fb64c4797e6e50aa57968314f81668a2d74e863f2b4a314aaeea1a902af62503739d36faecb475ffa6fdea292e81a760c2edb16aa6e7e1c2494b719f202e04795d7374b467290ecd14bfde9dbb21fe221fbfe1e0c77d5907bf010f66cc02c9bd1f2fd485c2ec3dbe8f63804c998e0857211c60ad99fc5ea88e70c49bfb9b94855c5785ad1aa4a350bf22fb85b9ab74843c3f6e9ae6e04358469f9ffca065eb35989c8cbbbf8d030e083aac0e928308eb8ba2d546cf8cf72afc0c0a54010662af6a3f43b2a74cea1e10e86bf66e5f38ae907b7d0fa418af3ff617084948647dd7a129a67f2987828c074eafa317ad9236d3b4daceea144c252ab4dff85b1d9284e8714264c502845a5d3f374bb620e4af6cbd3af133eed76c9f4f363b4cf56317c7a6a75c97cbb0d880a0a88ff569eec2dcacdbed4c53905f7f2d182b285c76209a803648e98645dcd135da01a62b626fb961ea2270d7828517ebc565a55e7de0d62aa21cdc733f0f77e3d3e3a8134254eb26000000000000000000000081000fde19730e8367654bfca91bacf5781f939f0dc498279c05a8adb0c2f4f76a8a3e3b2224b600be4659700966cdd8f94ead25b5f2202a2049314bb1bcb0c25f798b3d4ad868a32d508b823837cb10b8580ab03accc8476505ecf4f03abd70afa3ad4966043d2ef3f480d686c321b7b83d38b3393fc5d4938edebf6acc81b8291635abf9a031ee4a0000000000000000000000000000fae5ec3d52a8a04342004542f73a20592f92bd71e7d7d9a806ec8460e7184419d5831110c923b9057754bc8e7fd719bdaeeaa703ca69b6cbe0b45e83ae97e6754ebd56bd6541f4fb1100769dc3a3323b5a3adba5d6ffc88379b12d73fb87a71d6059be8166888c3cd6438ab95e"]) 01:59:21 executing program 0: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {0x0, 0x0, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r2 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) 01:59:21 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x12f, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:21 executing program 3: r0 = gettid() ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x4d) ptrace(0xffffffffffffffff, 0x0) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f0000001d40)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x10000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4080}, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x1, r1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='rdma.current\x00', 0x0, 0x0) ioctl$sock_proto_private(r2, 0x89e5, &(0x7f0000000600)="4856193edcfe08fc2ba35a8ef8ac0b9ddd5c461b2e6f111252f505f5850aec00473a79097ef9b3d9cdc97b169949e5e15a8ed708a127300cd1665dbe553a143e145729df749cb83d5b9f12fa9b05f6c9e60901a786d784830d4bed6751b9bc90f9ff6c3340b98e91f2b947908137cfa665daa27c1a410c6f9f21faa575d16f2748d04e10650ace1ed3d5d5f76ae4027f7bbd2399") perf_event_open(&(0x7f0000000580)={0x3, 0x80, 0x4a, 0x80, 0x1f, 0x1, 0x0, 0x4d93, 0x802, 0x5, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_config_ext={0xc447, 0x3}, 0x0, 0x1b, 0xb77e, 0x1, 0x3, 0x8, 0x4, 0x0, 0x6, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0xf, r2, 0x1) perf_event_open(&(0x7f0000000500)={0x4, 0x80, 0x40, 0x0, 0x1, 0x1, 0x0, 0x0, 0x112, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xae5, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x382, 0x2, 0x2, 0x9, 0x5, 0x0, 0xfffa, 0x0, 0x8000, 0x0, 0x9}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000000c0)={0x0, 0x2}, 0x8) setsockopt$inet_int(r3, 0x0, 0x7, &(0x7f0000000040)=0x1000, 0x4) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1e, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d07000000000000000000500000000000001010000000000000000000000000000000000000000000000000010000000000d0000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450300000000000000000000000100000000000000000000010000000000007200000000000010000000100000001000"/262, 0x106, 0x10000}, {&(0x7f0000010200)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x00\a', 0x14, 0x10220}, {&(0x7f0000010300)="00000000000000000000000001000000000000e40000100000000000000040000000000002000000000000000000010000000000020000000000000000100000001000000010000001000000010000000000000000001000000000001a8885d61aee4febb69bd33546bd0e04", 0x6c, 0x10320}, {&(0x7f0000010400)="000000000000000000000000105000000000000500000000000000001010000000000004000000000000000020500000000000050000000000000000005000000000000400000000000000007050000000000004000000000000000080500000000000040000000000000000000001000000000080000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f050000000000006000000000000000010100000000000040000000000000000b0500000000000060000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d0000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000005000000000000700000000000000001010000000000004000000000000000010500000000000070000000000000000d050000000000006000000000000000000510000000000060000000000000000605000000000000600000000000000000000010000000000d000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000050500000000000040000000000000000101000000000000400000000000000006050000000000004000000000000000000500000000000040000000000000000705000000000000400000000000000008050000000000004000000000000000000000100000000008000000000000001", 0x274, 0x10b20}, {&(0x7f0000010800)="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", 0x226, 0x100ea0}, {&(0x7f0000010b00)="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", 0x160, 0x101ea0}, {&(0x7f0000011800)="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", 0x15d, 0x500000}, {&(0x7f0000011a00)="00000000000000000000000000000000000000000400000000000000000100000000000000905000000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000004", 0x64, 0x500560}, {&(0x7f0000011b00)="00000000000000000000000400000000000000000000000000000000a05000000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000004", 0x5b, 0x500720}, {&(0x7f0000011c00)="000001000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed41", 0x38, 0x500840}, {&(0x7f0000011d00)="00000600000000000000000000000000000000605000000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000006", 0x52, 0x5008e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000050000000000000084ffffffffffffffff0000000000000000000007000264656661756c74000000000000000002002e2e03000000000000000000000000000000000000000000000000100000000000000000000000000000010000000000000000000000ed41000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005bbc645f00000000000000005bbc645f00000000000000005bbc645f00000000000000005bbc645f000000000000000001000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed410000000000000000000000000080ffffffff", 0x132, 0x5009e0}, {&(0x7f0000012000)="000000000000000000000600000000000000000100000000000000d05000000000000000000000000000003000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000106000000000000000b4f7fb0d0124f978a408dac5052e4f6000000000000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000005cbc645f00000000c7a335155bbc645f", 0xc1, 0x500b60}, {&(0x7f0000012100)="000000000000000000070064656661756c7401000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed41", 0x48, 0x500c80}, {&(0x7f0000012200)="0000000000000000000000000000000000000600000000000000000000000000000000005100000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000006", 0x62, 0x500d20}, {&(0x7f0000012300)="00000000000000000001000000000000000000000000000000030000000000000000100000000000000000000000000000010000000000000000000000ed41", 0x3f, 0x500e40}, {&(0x7f0000012400)="0000000000000000000700000000000000000000000000000000105000000000000000000000000000001000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000007", 0x59, 0x500ee0}, {&(0x7f0000012500)="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", 0x1c0, 0x501000}, {&(0x7f0000012700)="0000010000000000000500000000000000010000000000000006000000000000000200000000000000b00400000000000000010000000000000006000000000000000200000000000000b00500000000000000010000000000000006000000000000000200000000000000b00500000000000000010000000000000006000000000000000200000000000000b00500000000000000010000000000000004000000000000000200000000000000b00900000000000000010000000000000004000000000000000200000000000000b0f7ffffffffffffff010000000000000006000000000000000200000000000000b00700000000000000010000000000000006000000000000000100000000000000b205000000000000000501000000000000000000000000000001000000010000000000000007000000000000000200000000000000b0020000000000000000c000000000000000010000000000000500000000000000010000000000000007000000000000000200000000000000b00100000000000000010000000000000004000000000000000200000000000000b003000000000000000010000000000000000100000000000002", 0x1b9, 0x501e40}, {&(0x7f0000012d00)="f37badf500000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200605000000000000100000000000001e1ee0d5d64d84a64be712c7636496d14060000000000000007000000000000000100000000f6ffffffffffffff8000305000000000008f0f00000c", 0x7b, 0x506000}, {&(0x7f0000012e00)="00000000000000000000000000000000000000008941f9988941f9988941f998f3", 0x21, 0x506fe0}, {&(0x7f0000013000)="b95ad41c00000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200905000000000000100000000000001e1ee0d5d64d84a64be712c7636496d140400000000000000f7ffffffffffffff02000000000001000000000000010000000000000000fb0e0000a000000000010000000000000c0001000000000000ef0e00000c", 0x94, 0x509000}, {&(0x7f0000013100)="0000000000000000000000000000000000000000000000000000000002002e2e04000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000ed41000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005bbc645f00000000000000005bbc645f00000000000000005bbc645f00000000000000000000000000000000000000003e94c21700000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200a05000000000000100000000000001e1ee0d5d64d84a64be712c7636496d140400000000000000090000000000000001000000000b4f7fb0d0124f97fb8a408dac5052e4f6930f000008", 0x13b, 0x509f40}, {&(0x7f0000013300)="000000000000000000000000000000000000000000000000050000", 0x1b, 0x50afe0}, {&(0x7f0000013500)="0000010000000000000500000000000000010000000000000006000000000000000200000000000000b00400000000000000010000000000000006000000000000000200000000000000b00100000000000000010000000000000006000000000000000200000000000000b00500000000000000010000000000000006000000000000000200000000000000b00500000000000000010000000000000006000000000000000200000000000000b00500000000000000010000000000000006000000000000000200000000000000b00200000000000000010000000000000004000000000000000200000000000000b00900000000000000010000000000000004000000000000000200000000000000b0f7ffffffffffffff010000000000000006000000000000000200000000000000b00700000000000000010000000000000006000000000000000100000000000000b20500000000000000050100000000000000000000000000000100000000c000000000000000010000000000000500000000000000010000000000000004000000000000000200000000000000b00300000000000000001000000000000000010000000000000200000000000000d35bdc0e00000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200c05000000000000100000000000001e1ee0d5d64d84a64be712c7636496d140600000000000000050000000000000012000000000001000000000000010000000000000000fb0e0000a000000000010000000000000c0001000000000000ef0e00000c0000000001000000000000544bae790400000000cc0e0000230000000001000000000000546b826b1100000000a50e000027000000000100000000000054bf5d291700000000820e000023000000000100000000000054bcde42e5000000005f0e000023000000000100000000000054482d12f6000000003c0e0000230000000001000000000000600200000000000000190e0000230000000001000000000000600300000000000000f60d0000230000000001000000000000600400000000000000d30d0000230000000001000000000000600500000000000000b00d0000230000000001000000000000600600000000000000890d0000270000000101000000000000010000000000000000e90c0000a000000001010000000000000c0001000000000000da0c00000f0000000101000000000000544bae790400000000b70c000023000000010100000000000054482d12f600000000940c0000230000000101000000000000600200000000000000710c00002300000001010000000000006003000000000000004e0c000023", 0x3e4, 0x50be40}, {&(0x7f0000013900)="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", 0x400, 0x50cca0}, {&(0x7f0000000700)="f816d9c600000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200e05000000000000100000000000001e1ee0d5d64d84a64be712c7636496d140600000000000000050000000000000011000000000201000000000000010000000000000000fb0e0000a000000002010000000000000c0101000000000000ec0e00000f00000002010000000000006c0000000000000000bd0a00002f04000003010000000000000100000000000000001d0a0000a000000003010000000000000c01010000000000000e0a00000f00000003010000000000006c0000000000000000d30900003b000000040100000000000001000000000000000033090000a000000004010000000000000c0001000000000000240900000f00000004010000000000001822a8f12600000000f50800002f000000040100000000000018d65ba13500000000c60800002f00000004010000000000006c0000000000000000a70800001f000000050100000000000001000000000000000007080000a000000005010000000000000c0001000000000000e90700001e00000005010000000000006c0000000000000000b407000035000000060100000000000001000000000000000014070000a000000006010000000000000c0001000000000000010700001300000006010000000000006c00000000000000008806000079", 0x20b, 0x50e000}, {&(0x7f0000014000)="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", 0x920, 0x50e6e0}, {&(0x7f0000015600)="af6d627700000000000000000000000000000000000000000000000000000000f90cac8b044b4fa88bee4b8d3da88dc200005100000000000100000000000001e1ee0d5d64d84a64be712c7636496d140600000000000000040000000000000004000000000000000000000000f90100000000000000730f0000280000000100000000000000cc0000100000000000430f0000300000000100000000000000cc0000500000000000130f0000300000000100000000000000cc0000690000000000e30e000030", 0xc6, 0x510000}, {&(0x7f0000015700)="00000000000000000300000000000000000100000000000000006900000000000000190000000000e1ee0d5d64d84a64be712c7636496d140300000000000000000100000000000000005000000000000000190000000000e1ee0d5d64d84a64be712c7636496d140300000000000000000100000000000000001000000000000000400000000000e1ee0d5d64d84a64be712c7636496d14", 0x98, 0x510f40}], 0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="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"]) 01:59:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, 0x0) 01:59:21 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="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"]) 01:59:21 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x130, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:21 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, 0x0, 0x0, 0xda1, 0x0) r2 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) [ 355.077579] audit: type=1804 audit(1630461561.373:199): pid=20935 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/190/file0/bus" dev="loop1" ino=1 res=1 01:59:21 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x131, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 355.162925] audit: type=1804 audit(1630461561.413:200): pid=20930 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir191613056/syzkaller.RalUww/283/bus" dev="sda1" ino=14466 res=1 01:59:21 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="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"]) 01:59:21 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, 0x0) 01:59:21 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x132, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:21 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x2b, 0x0, 0x0) r2 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) [ 355.478649] BTRFS error (device loop3): superblock checksum mismatch [ 355.530669] BTRFS error (device loop3): open_ctree failed 01:59:22 executing program 0 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:22 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x133, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:22 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="636f6d70726573732d666f7263653d7a6c69622c001162c7bf2ada3c242ec6317802d843f45487e3574147e2ce454ccfb4134c48efc5fe21b350a76cc9a9dddb4c93fe19c5b02e5e7bea1b3a86dc4861ab96775d3cd8ec9a4d678538951988167bc888bb4fdfdb4feedcbbf2bc7045b91f74a2090bc8731759fbbda5b4dee056450a843e3fc24dfe3a2ed8e65c5252dfbf6195437a0e2d5119f6f664566598bb9eb4907945f006a1c90eda211291bae4182110b51042ba3bc3c70847174482f9405a3ad87e9b6e12ffbbe701d5a148dae5864f0db46ab5d26a82ddf530c892010400885bc07ffb00a1db5c42e71cba34fb64c4797e6e50aa57968314f81668a2d74e863f2b4a314aaeea1a902af62503739d36faecb475ffa6fdea292e81a760c2edb16aa6e7e1c2494b719f202e04795d7374b467290ecd14bfde9dbb21fe221fbfe1e0c77d5907bf010f66cc02c9bd1f2fd485c2ec3dbe8f63804c998e0857211c60ad99fc5ea88e70c49bfb9b94855c5785ad1aa4a350bf22fb85b9ab74843c3f6e9ae6e04358469f9ffca065eb35989c8cbbbf8d030e083aac0e928308eb8ba2d546cf8cf72afc0c0a54010662af6a3f43b2a74cea1e10e86bf66e5f38ae907b7d0fa418af3ff617084948647dd7a129a67f2987828c074eafa317ad9236d3b4daceea144c252ab4dff85b1d9284e8714264c502845a5d3f374bb620e4af6cbd3af133eed76c9f4f363b4cf56317c7a6a75c97cbb0d880a0a88ff569eec2dcacdbed4c53905f7f2d182b285c76209a803648e98645dcd135da01a62b626fb961ea2270d7828517ebc565a55e7de0d62aa21cdc733f0f77e3d3e3a8134254eb26000000000000000000000081000fde19730e8367654bfca91bacf5781f939f0dc498279c05a8adb0c2f4f76a8a3e3b2224b600be4659700966cdd8f94ead25b5f2202a2049314bb1bcb0c25f798b3d4ad868a32d508b823837cb10b8580ab03accc8476505ecf4f03abd70afa3ad4966043d2ef3f480d686c321b7b83d38b3393fc5d4938edebf6acc81b8291635abf9a031ee4a0000000000000000000000000000fae5ec3d52a8a04342004542f73a20592f92bd71e7d7d9a806ec8460e7184419d5831110c923b9057754bc8e7fd719bdaeeaa703ca69b6cbe0b45e83ae97e6754ebd56bd6541f4fb1100769dc3a3323b5a3adba5d6ffc88379b12d73fb87a71d6059be8166888c3cd6438ab95e"]) 01:59:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, 0x0) 01:59:22 executing program 3 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 355.974631] FAULT_INJECTION: forcing a failure. [ 355.974631] name failslab, interval 1, probability 0, space 0, times 0 [ 356.002858] FAULT_INJECTION: forcing a failure. [ 356.002858] name failslab, interval 1, probability 0, space 0, times 0 [ 356.004771] CPU: 1 PID: 21003 Comm: syz-executor.3 Not tainted 4.19.205-syzkaller #0 [ 356.021958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 356.031315] Call Trace: [ 356.033917] dump_stack+0x1fc/0x2ef [ 356.037553] should_fail.cold+0xa/0xf [ 356.041360] ? setup_fault_attr+0x200/0x200 [ 356.045792] ? lock_acquire+0x170/0x3c0 [ 356.049783] __should_failslab+0x115/0x180 [ 356.054055] should_failslab+0x5/0x10 [ 356.057864] __kmalloc+0x2ab/0x3c0 [ 356.061568] ? __se_sys_memfd_create+0xf8/0x440 [ 356.066353] __se_sys_memfd_create+0xf8/0x440 [ 356.070880] ? memfd_file_seals_ptr+0x150/0x150 [ 356.075575] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 356.080959] ? trace_hardirqs_off_caller+0x6e/0x210 [ 356.085992] ? do_syscall_64+0x21/0x620 [ 356.090059] do_syscall_64+0xf9/0x620 [ 356.094025] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 356.099223] RIP: 0033:0x4665f9 [ 356.102459] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 356.121456] RSP: 002b:00007f8e4e2f3f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 356.129367] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665f9 [ 356.136643] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00000000004bee86 [ 356.143921] RBP: 0000000000000001 R08: 0000000000010000 R09: ffffffffffffffff [ 356.151645] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 356.158924] R13: 0000000020000100 R14: 0000000000020000 R15: 0000000020001080 [ 356.166788] CPU: 0 PID: 21008 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 356.175073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 356.184492] Call Trace: [ 356.187103] dump_stack+0x1fc/0x2ef [ 356.190745] should_fail.cold+0xa/0xf [ 356.194562] ? setup_fault_attr+0x200/0x200 [ 356.198892] ? lock_acquire+0x170/0x3c0 [ 356.202883] __should_failslab+0x115/0x180 [ 356.207262] should_failslab+0x5/0x10 [ 356.211064] __kmalloc+0x2ab/0x3c0 [ 356.214591] ? __se_sys_memfd_create+0xf8/0x440 [ 356.219265] __se_sys_memfd_create+0xf8/0x440 [ 356.223756] ? memfd_file_seals_ptr+0x150/0x150 [ 356.228461] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 356.233815] ? trace_hardirqs_off_caller+0x6e/0x210 [ 356.238833] ? do_syscall_64+0x21/0x620 [ 356.242853] do_syscall_64+0xf9/0x620 [ 356.246645] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 356.251819] RIP: 0033:0x4665f9 [ 356.255000] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 01:59:22 executing program 3 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 356.274265] RSP: 002b:00007f5e1baa9f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 356.282385] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665f9 [ 356.289646] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bee86 [ 356.297087] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 356.304363] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 356.311646] R13: 0000000020000100 R14: 0000000000020000 R15: 0000000020001080 01:59:22 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x134, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:22 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="636f6d70726573732d666f7263653d7a6c69622c001162c7bf2ada3c242ec6317802d843f45487e3574147e2ce454ccfb4134c48efc5fe21b350a76cc9a9dddb4c93fe19c5b02e5e7bea1b3a86dc4861ab96775d3cd8ec9a4d678538951988167bc888bb4fdfdb4feedcbbf2bc7045b91f74a2090bc8731759fbbda5b4dee056450a843e3fc24dfe3a2ed8e65c5252dfbf6195437a0e2d5119f6f664566598bb9eb4907945f006a1c90eda211291bae4182110b51042ba3bc3c70847174482f9405a3ad87e9b6e12ffbbe701d5a148dae5864f0db46ab5d26a82ddf530c892010400885bc07ffb00a1db5c42e71cba34fb64c4797e6e50aa57968314f81668a2d74e863f2b4a314aaeea1a902af62503739d36faecb475ffa6fdea292e81a760c2edb16aa6e7e1c2494b719f202e04795d7374b467290ecd14bfde9dbb21fe221fbfe1e0c77d5907bf010f66cc02c9bd1f2fd485c2ec3dbe8f63804c998e0857211c60ad99fc5ea88e70c49bfb9b94855c5785ad1aa4a350bf22fb85b9ab74843c3f6e9ae6e04358469f9ffca065eb35989c8cbbbf8d030e083aac0e928308eb8ba2d546cf8cf72afc0c0a54010662af6a3f43b2a74cea1e10e86bf66e5f38ae907b7d0fa418af3ff617084948647dd7a129a67f2987828c074eafa317ad9236d3b4daceea144c252ab4dff85b1d9284e8714264c502845a5d3f374bb620e4af6cbd3af133eed76c9f4f363b4cf56317c7a6a75c97cbb0d880a0a88ff569eec2dcacdbed4c53905f7f2d182b285c76209a803648e98645dcd135da01a62b626fb961ea2270d7828517ebc565a55e7de0d62aa21cdc733f0f77e3d3e3a8134254eb26000000000000000000000081000fde19730e8367654bfca91bacf5781f939f0dc498279c05a8adb0c2f4f76a8a3e3b2224b600be4659700966cdd8f94ead25b5f2202a2049314bb1bcb0c25f798b3d4ad868a32d508b823837cb10b8580ab03accc8476505ecf4f03abd70afa3ad4966043d2ef3f480d686c321b7b83d38b3393fc5d4938edebf6acc81b8291635abf9a031ee4a0000000000000000000000000000fae5ec3d52a8a04342004542f73a20592f92bd71e7d7d9a806ec8460e7184419d5831110c923b9057754bc8e7fd719bdaeeaa703ca69b6cbe0b45e83ae97e6754ebd56bd6541f4fb1100769dc3a3323b5a3adba5d6ffc88379b12d73fb87a71d6059be8166888c3cd6438ab95e"]) 01:59:22 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:22 executing program 0 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) [ 356.444530] FAULT_INJECTION: forcing a failure. [ 356.444530] name failslab, interval 1, probability 0, space 0, times 0 [ 356.504191] CPU: 1 PID: 21016 Comm: syz-executor.3 Not tainted 4.19.205-syzkaller #0 [ 356.512123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 356.521580] Call Trace: [ 356.524300] dump_stack+0x1fc/0x2ef [ 356.527950] should_fail.cold+0xa/0xf [ 356.532248] ? setup_fault_attr+0x200/0x200 [ 356.536588] ? lock_acquire+0x170/0x3c0 [ 356.540595] __should_failslab+0x115/0x180 [ 356.544849] should_failslab+0x5/0x10 [ 356.548671] kmem_cache_alloc+0x277/0x370 [ 356.552861] ? shmem_destroy_callback+0xb0/0xb0 [ 356.557739] shmem_alloc_inode+0x18/0x40 [ 356.561822] ? shmem_destroy_callback+0xb0/0xb0 [ 356.566520] alloc_inode+0x5d/0x180 [ 356.570271] new_inode+0x1d/0xf0 [ 356.573654] shmem_get_inode+0x96/0x8d0 [ 356.577744] __shmem_file_setup.part.0+0x7a/0x2b0 [ 356.582622] shmem_file_setup+0x61/0x90 [ 356.586621] __se_sys_memfd_create+0x26b/0x440 [ 356.591324] ? memfd_file_seals_ptr+0x150/0x150 [ 356.596011] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe 01:59:22 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x135, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:22 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x2b, 0x0, 0x0) r2 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) [ 356.601397] ? trace_hardirqs_off_caller+0x6e/0x210 [ 356.603018] FAULT_INJECTION: forcing a failure. [ 356.603018] name failslab, interval 1, probability 0, space 0, times 0 [ 356.606537] ? do_syscall_64+0x21/0x620 [ 356.606557] do_syscall_64+0xf9/0x620 [ 356.606578] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 356.606589] RIP: 0033:0x4665f9 [ 356.606601] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 01:59:22 executing program 3 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 356.606608] RSP: 002b:00007f8e4e2f3f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 356.606621] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665f9 [ 356.606628] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00000000004bee86 [ 356.606636] RBP: 0000000000000001 R08: 0000000000010000 R09: ffffffffffffffff [ 356.606643] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 356.606651] R13: 0000000020000100 R14: 0000000000020000 R15: 0000000020001080 [ 356.703880] CPU: 0 PID: 21031 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 356.711786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 356.721153] Call Trace: [ 356.723756] dump_stack+0x1fc/0x2ef [ 356.727399] should_fail.cold+0xa/0xf [ 356.731192] ? setup_fault_attr+0x200/0x200 [ 356.735509] ? lock_acquire+0x170/0x3c0 [ 356.739497] __should_failslab+0x115/0x180 [ 356.743746] should_failslab+0x5/0x10 [ 356.747561] kmem_cache_alloc+0x277/0x370 [ 356.751731] ? shmem_destroy_callback+0xb0/0xb0 [ 356.756430] shmem_alloc_inode+0x18/0x40 [ 356.760508] ? shmem_destroy_callback+0xb0/0xb0 [ 356.765197] alloc_inode+0x5d/0x180 [ 356.768862] new_inode+0x1d/0xf0 [ 356.772264] shmem_get_inode+0x96/0x8d0 [ 356.776369] __shmem_file_setup.part.0+0x7a/0x2b0 [ 356.781383] shmem_file_setup+0x61/0x90 [ 356.785384] __se_sys_memfd_create+0x26b/0x440 [ 356.790164] ? memfd_file_seals_ptr+0x150/0x150 [ 356.794869] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 356.800381] ? trace_hardirqs_off_caller+0x6e/0x210 [ 356.805417] ? do_syscall_64+0x21/0x620 [ 356.809415] do_syscall_64+0xf9/0x620 [ 356.813239] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 356.818442] RIP: 0033:0x4665f9 [ 356.821641] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 356.840546] RSP: 002b:00007f5e1baa9f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 356.848253] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665f9 [ 356.855564] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bee86 [ 356.862941] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 356.870212] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 356.877493] R13: 0000000020000100 R14: 0000000000020000 R15: 0000000020001080 01:59:23 executing program 0 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) [ 356.902019] FAULT_INJECTION: forcing a failure. [ 356.902019] name failslab, interval 1, probability 0, space 0, times 0 [ 356.913397] CPU: 1 PID: 21036 Comm: syz-executor.3 Not tainted 4.19.205-syzkaller #0 [ 356.921288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 356.930640] Call Trace: [ 356.933225] dump_stack+0x1fc/0x2ef [ 356.936844] should_fail.cold+0xa/0xf [ 356.940742] ? setup_fault_attr+0x200/0x200 [ 356.945059] ? lock_acquire+0x170/0x3c0 [ 356.949038] __should_failslab+0x115/0x180 [ 356.953272] should_failslab+0x5/0x10 [ 356.957062] kmem_cache_alloc+0x277/0x370 [ 356.961215] __d_alloc+0x2b/0xa10 [ 356.964667] d_alloc_pseudo+0x19/0x70 [ 356.968463] alloc_file_pseudo+0xc6/0x250 [ 356.972605] ? alloc_file+0x4d0/0x4d0 [ 356.976410] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 356.982122] ? shmem_get_inode+0x44c/0x8d0 [ 356.986375] __shmem_file_setup.part.0+0x102/0x2b0 [ 356.991309] shmem_file_setup+0x61/0x90 [ 356.995271] __se_sys_memfd_create+0x26b/0x440 [ 356.999850] ? memfd_file_seals_ptr+0x150/0x150 [ 357.004511] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 357.009885] ? trace_hardirqs_off_caller+0x6e/0x210 [ 357.014913] ? do_syscall_64+0x21/0x620 [ 357.018903] do_syscall_64+0xf9/0x620 [ 357.022715] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 357.027901] RIP: 0033:0x4665f9 [ 357.031282] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 357.050299] RSP: 002b:00007f8e4e2f3f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 357.058311] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665f9 [ 357.065686] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00000000004bee86 [ 357.074359] RBP: 0000000000000001 R08: 0000000000010000 R09: ffffffffffffffff [ 357.082401] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 357.089671] R13: 0000000020000100 R14: 0000000000020000 R15: 0000000020001080 01:59:23 executing program 3 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:23 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="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"]) 01:59:23 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x136, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 357.258371] FAULT_INJECTION: forcing a failure. [ 357.258371] name failslab, interval 1, probability 0, space 0, times 0 [ 357.264813] FAULT_INJECTION: forcing a failure. [ 357.264813] name failslab, interval 1, probability 0, space 0, times 0 [ 357.301566] CPU: 0 PID: 21050 Comm: syz-executor.3 Not tainted 4.19.205-syzkaller #0 [ 357.308589] kauditd_printk_skb: 2 callbacks suppressed [ 357.308602] audit: type=1804 audit(1630461563.603:203): pid=21049 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/193/file0/bus" dev="loop1" ino=1 res=1 [ 357.309664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 357.309669] Call Trace: [ 357.309690] dump_stack+0x1fc/0x2ef [ 357.309708] should_fail.cold+0xa/0xf [ 357.359486] ? setup_fault_attr+0x200/0x200 [ 357.363827] ? lock_acquire+0x170/0x3c0 [ 357.367915] __should_failslab+0x115/0x180 [ 357.372255] should_failslab+0x5/0x10 [ 357.376152] kmem_cache_alloc+0x277/0x370 [ 357.380353] __alloc_file+0x21/0x330 [ 357.384092] alloc_empty_file+0x6d/0x170 [ 357.388173] alloc_file+0x5e/0x4d0 [ 357.391729] alloc_file_pseudo+0x165/0x250 [ 357.395982] ? alloc_file+0x4d0/0x4d0 [ 357.399795] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 357.405429] ? shmem_get_inode+0x44c/0x8d0 [ 357.409694] __shmem_file_setup.part.0+0x102/0x2b0 [ 357.414639] shmem_file_setup+0x61/0x90 [ 357.418626] __se_sys_memfd_create+0x26b/0x440 [ 357.423217] ? memfd_file_seals_ptr+0x150/0x150 [ 357.428080] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 357.433458] ? trace_hardirqs_off_caller+0x6e/0x210 [ 357.438673] ? do_syscall_64+0x21/0x620 [ 357.442778] do_syscall_64+0xf9/0x620 [ 357.446592] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 357.451790] RIP: 0033:0x4665f9 [ 357.455012] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 357.474114] RSP: 002b:00007f8e4e2f3f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 357.481921] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665f9 [ 357.489734] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00000000004bee86 01:59:23 executing program 2 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:23 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x2b, 0x0, 0x0) r2 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) [ 357.497097] RBP: 0000000000000001 R08: 0000000000010000 R09: ffffffffffffffff [ 357.504480] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 357.511847] R13: 0000000020000100 R14: 0000000000020000 R15: 0000000020001080 [ 357.551652] CPU: 1 PID: 21048 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 357.559568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 357.569122] Call Trace: [ 357.572005] dump_stack+0x1fc/0x2ef [ 357.575877] should_fail.cold+0xa/0xf [ 357.579721] ? setup_fault_attr+0x200/0x200 [ 357.582776] FAULT_INJECTION: forcing a failure. [ 357.582776] name failslab, interval 1, probability 0, space 0, times 0 [ 357.584499] ? lock_acquire+0x170/0x3c0 [ 357.584524] __should_failslab+0x115/0x180 [ 357.584545] should_failslab+0x5/0x10 [ 357.584559] kmem_cache_alloc+0x277/0x370 [ 357.584577] __d_alloc+0x2b/0xa10 [ 357.584596] d_alloc_pseudo+0x19/0x70 [ 357.584612] alloc_file_pseudo+0xc6/0x250 [ 357.584626] ? alloc_file+0x4d0/0x4d0 [ 357.584647] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 357.633210] ? shmem_get_inode+0x44c/0x8d0 [ 357.637443] __shmem_file_setup.part.0+0x102/0x2b0 [ 357.642488] shmem_file_setup+0x61/0x90 [ 357.646477] __se_sys_memfd_create+0x26b/0x440 [ 357.651052] ? memfd_file_seals_ptr+0x150/0x150 [ 357.655720] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 357.661087] ? trace_hardirqs_off_caller+0x6e/0x210 [ 357.666416] ? do_syscall_64+0x21/0x620 [ 357.670563] do_syscall_64+0xf9/0x620 [ 357.674546] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 357.679813] RIP: 0033:0x4665f9 [ 357.683098] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 357.702136] RSP: 002b:00007f5e1baa9f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 357.709936] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665f9 [ 357.717204] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bee86 [ 357.724465] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 357.731728] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 357.738989] R13: 0000000020000100 R14: 0000000000020000 R15: 0000000020001080 [ 357.746271] CPU: 0 PID: 21063 Comm: syz-executor.2 Not tainted 4.19.205-syzkaller #0 [ 357.754161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 357.763540] Call Trace: [ 357.766151] dump_stack+0x1fc/0x2ef [ 357.769926] should_fail.cold+0xa/0xf [ 357.773903] ? setup_fault_attr+0x200/0x200 [ 357.778304] ? lock_acquire+0x170/0x3c0 [ 357.782284] __should_failslab+0x115/0x180 [ 357.786723] should_failslab+0x5/0x10 [ 357.790711] __kmalloc+0x2ab/0x3c0 [ 357.794250] ? __se_sys_memfd_create+0xf8/0x440 [ 357.799015] __se_sys_memfd_create+0xf8/0x440 [ 357.803505] ? memfd_file_seals_ptr+0x150/0x150 [ 357.808177] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 357.813537] ? trace_hardirqs_off_caller+0x6e/0x210 [ 357.818565] ? do_syscall_64+0x21/0x620 [ 357.822536] do_syscall_64+0xf9/0x620 [ 357.826382] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 357.831572] RIP: 0033:0x4665f9 01:59:24 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:59:24 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x137, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 357.834765] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 357.853685] RSP: 002b:00007fa5c30f4f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 357.861410] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665f9 [ 357.868686] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00000000004bee86 [ 357.876232] RBP: 0000000000000001 R08: 0000000000010000 R09: ffffffffffffffff [ 357.883505] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 357.890781] R13: 0000000020000100 R14: 0000000000020000 R15: 0000000020001080 01:59:24 executing program 2 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:24 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x138, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:24 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:59:24 executing program 3 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:24 executing program 0 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) [ 358.071249] FAULT_INJECTION: forcing a failure. [ 358.071249] name failslab, interval 1, probability 0, space 0, times 0 [ 358.083458] CPU: 0 PID: 21076 Comm: syz-executor.2 Not tainted 4.19.205-syzkaller #0 [ 358.091352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 358.100696] Call Trace: [ 358.103276] dump_stack+0x1fc/0x2ef [ 358.106914] should_fail.cold+0xa/0xf [ 358.110761] ? setup_fault_attr+0x200/0x200 [ 358.115077] ? lock_acquire+0x170/0x3c0 [ 358.119051] __should_failslab+0x115/0x180 [ 358.123275] should_failslab+0x5/0x10 [ 358.127070] kmem_cache_alloc+0x277/0x370 [ 358.131508] ? shmem_destroy_callback+0xb0/0xb0 [ 358.136194] shmem_alloc_inode+0x18/0x40 [ 358.140259] ? shmem_destroy_callback+0xb0/0xb0 [ 358.145040] alloc_inode+0x5d/0x180 [ 358.148670] new_inode+0x1d/0xf0 [ 358.152032] shmem_get_inode+0x96/0x8d0 [ 358.156012] __shmem_file_setup.part.0+0x7a/0x2b0 [ 358.160854] shmem_file_setup+0x61/0x90 [ 358.164841] __se_sys_memfd_create+0x26b/0x440 [ 358.169413] ? memfd_file_seals_ptr+0x150/0x150 [ 358.174066] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 358.179415] ? trace_hardirqs_off_caller+0x6e/0x210 [ 358.184572] ? do_syscall_64+0x21/0x620 [ 358.188542] do_syscall_64+0xf9/0x620 [ 358.192338] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 358.197527] RIP: 0033:0x4665f9 [ 358.200824] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 358.219797] RSP: 002b:00007fa5c30f4f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 358.227512] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665f9 [ 358.234771] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00000000004bee86 [ 358.242034] RBP: 0000000000000001 R08: 0000000000010000 R09: ffffffffffffffff [ 358.249308] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 358.256853] R13: 0000000020000100 R14: 0000000000020000 R15: 0000000020001080 01:59:24 executing program 2 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 358.379078] FAULT_INJECTION: forcing a failure. [ 358.379078] name failslab, interval 1, probability 0, space 0, times 0 [ 358.387916] FAULT_INJECTION: forcing a failure. [ 358.387916] name failslab, interval 1, probability 0, space 0, times 0 [ 358.395512] CPU: 1 PID: 21090 Comm: syz-executor.3 Not tainted 4.19.205-syzkaller #0 [ 358.409552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 358.418906] Call Trace: [ 358.421499] dump_stack+0x1fc/0x2ef [ 358.425134] should_fail.cold+0xa/0xf [ 358.428938] ? setup_fault_attr+0x200/0x200 [ 358.433517] ? lock_acquire+0x170/0x3c0 [ 358.437493] __should_failslab+0x115/0x180 [ 358.441729] should_failslab+0x5/0x10 [ 358.445611] kmem_cache_alloc_trace+0x284/0x380 [ 358.450292] apparmor_file_alloc_security+0x394/0xad0 [ 358.455493] ? apparmor_file_receive+0x160/0x160 [ 358.460245] ? __alloc_file+0x21/0x330 [ 358.464130] security_file_alloc+0x40/0x90 [ 358.468498] __alloc_file+0xc9/0x330 [ 358.472224] alloc_empty_file+0x6d/0x170 [ 358.476304] alloc_file+0x5e/0x4d0 [ 358.479931] alloc_file_pseudo+0x165/0x250 [ 358.484213] ? alloc_file+0x4d0/0x4d0 [ 358.488164] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 358.493817] ? shmem_get_inode+0x44c/0x8d0 [ 358.498067] __shmem_file_setup.part.0+0x102/0x2b0 [ 358.503002] shmem_file_setup+0x61/0x90 [ 358.506976] __se_sys_memfd_create+0x26b/0x440 [ 358.511572] ? memfd_file_seals_ptr+0x150/0x150 [ 358.516249] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 358.521628] ? trace_hardirqs_off_caller+0x6e/0x210 [ 358.526648] ? do_syscall_64+0x21/0x620 [ 358.530646] do_syscall_64+0xf9/0x620 [ 358.534527] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 358.539715] RIP: 0033:0x4665f9 [ 358.542909] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 358.561938] RSP: 002b:00007f8e4e2f3f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 358.569732] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665f9 01:59:24 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x139, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 358.577038] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00000000004bee86 [ 358.584391] RBP: 0000000000000001 R08: 0000000000010000 R09: ffffffffffffffff [ 358.591660] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 358.598929] R13: 0000000020000100 R14: 0000000000020000 R15: 0000000020001080 [ 358.621054] CPU: 0 PID: 21089 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 358.628967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 358.638324] Call Trace: [ 358.640923] dump_stack+0x1fc/0x2ef [ 358.644578] should_fail.cold+0xa/0xf [ 358.648422] ? setup_fault_attr+0x200/0x200 [ 358.652752] ? lock_acquire+0x170/0x3c0 [ 358.656830] __should_failslab+0x115/0x180 [ 358.661067] should_failslab+0x5/0x10 [ 358.664883] kmem_cache_alloc+0x277/0x370 [ 358.669048] __alloc_file+0x21/0x330 [ 358.672771] alloc_empty_file+0x6d/0x170 [ 358.676914] alloc_file+0x5e/0x4d0 [ 358.680459] alloc_file_pseudo+0x165/0x250 [ 358.684715] ? alloc_file+0x4d0/0x4d0 [ 358.688608] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 358.694231] ? shmem_get_inode+0x44c/0x8d0 [ 358.698455] __shmem_file_setup.part.0+0x102/0x2b0 [ 358.703494] shmem_file_setup+0x61/0x90 [ 358.707471] __se_sys_memfd_create+0x26b/0x440 [ 358.712197] ? memfd_file_seals_ptr+0x150/0x150 [ 358.716958] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 358.722315] ? trace_hardirqs_off_caller+0x6e/0x210 [ 358.727342] ? do_syscall_64+0x21/0x620 [ 358.731323] do_syscall_64+0xf9/0x620 [ 358.735114] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 358.740306] RIP: 0033:0x4665f9 [ 358.743512] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 358.762563] RSP: 002b:00007f5e1baa9f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 358.770372] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665f9 [ 358.777989] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bee86 [ 358.785453] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 358.793051] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 358.800351] R13: 0000000020000100 R14: 0000000000020000 R15: 0000000020001080 01:59:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 01:59:25 executing program 0 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:25 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r2 = open(0x0, 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) 01:59:25 executing program 3 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 358.874686] FAULT_INJECTION: forcing a failure. [ 358.874686] name failslab, interval 1, probability 0, space 0, times 0 [ 358.903710] CPU: 1 PID: 21100 Comm: syz-executor.2 Not tainted 4.19.205-syzkaller #0 [ 358.911623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 358.920989] Call Trace: [ 358.923601] dump_stack+0x1fc/0x2ef [ 358.927256] should_fail.cold+0xa/0xf [ 358.931085] ? setup_fault_attr+0x200/0x200 [ 358.935428] ? lock_acquire+0x170/0x3c0 [ 358.939427] __should_failslab+0x115/0x180 [ 358.943670] should_failslab+0x5/0x10 [ 358.947472] kmem_cache_alloc+0x277/0x370 [ 358.951637] __d_alloc+0x2b/0xa10 [ 358.955090] d_alloc_pseudo+0x19/0x70 [ 358.958879] alloc_file_pseudo+0xc6/0x250 [ 358.963031] ? alloc_file+0x4d0/0x4d0 [ 358.966853] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 358.972504] ? shmem_get_inode+0x44c/0x8d0 [ 358.976893] __shmem_file_setup.part.0+0x102/0x2b0 [ 358.981836] shmem_file_setup+0x61/0x90 [ 358.985809] __se_sys_memfd_create+0x26b/0x440 [ 358.990391] ? memfd_file_seals_ptr+0x150/0x150 [ 358.995060] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 359.000440] ? trace_hardirqs_off_caller+0x6e/0x210 [ 359.005466] ? do_syscall_64+0x21/0x620 [ 359.009434] do_syscall_64+0xf9/0x620 [ 359.013229] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 359.018638] RIP: 0033:0x4665f9 [ 359.021960] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 359.040859] RSP: 002b:00007fa5c30f4f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 359.048928] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665f9 [ 359.056372] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00000000004bee86 [ 359.063635] RBP: 0000000000000001 R08: 0000000000010000 R09: ffffffffffffffff 01:59:25 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x13a, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 359.070921] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 359.078200] R13: 0000000020000100 R14: 0000000000020000 R15: 0000000020001080 01:59:25 executing program 2 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 359.175095] FAULT_INJECTION: forcing a failure. [ 359.175095] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 359.193850] CPU: 1 PID: 21119 Comm: syz-executor.3 Not tainted 4.19.205-syzkaller #0 [ 359.201764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 359.211133] Call Trace: [ 359.213740] dump_stack+0x1fc/0x2ef [ 359.217385] should_fail.cold+0xa/0xf [ 359.221185] ? lock_acquire+0x170/0x3c0 [ 359.225174] ? setup_fault_attr+0x200/0x200 [ 359.229495] __alloc_pages_nodemask+0x239/0x2890 [ 359.234240] ? __lock_acquire+0x6de/0x3ff0 [ 359.238471] ? static_obj+0x50/0x50 [ 359.242095] ? __lock_acquire+0x6de/0x3ff0 [ 359.246321] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 359.251297] ? __lock_acquire+0x6de/0x3ff0 [ 359.255536] ? mark_held_locks+0xf0/0xf0 [ 359.259599] ? unwind_next_frame+0xeee/0x1400 [ 359.264102] ? mark_held_locks+0xf0/0xf0 [ 359.268160] ? deref_stack_reg+0x134/0x1d0 [ 359.272404] ? get_reg+0x176/0x1f0 [ 359.275961] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 359.281971] alloc_pages_vma+0xf2/0x780 [ 359.285977] shmem_alloc_page+0x11c/0x1f0 [ 359.290148] ? shmem_swapin+0x220/0x220 [ 359.294148] ? percpu_counter_add_batch+0x126/0x180 [ 359.299197] ? __vm_enough_memory+0x316/0x650 [ 359.303692] shmem_alloc_and_acct_page+0x15a/0x850 [ 359.308775] shmem_getpage_gfp+0x4e9/0x37f0 [ 359.313107] ? shmem_alloc_and_acct_page+0x850/0x850 [ 359.318221] ? mark_held_locks+0xa6/0xf0 [ 359.322408] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 359.327613] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 359.332800] shmem_write_begin+0xff/0x1e0 [ 359.336962] generic_perform_write+0x1f8/0x4d0 [ 359.341553] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 359.346223] ? current_time+0x1c0/0x1c0 [ 359.350211] ? lock_acquire+0x170/0x3c0 [ 359.354183] __generic_file_write_iter+0x24b/0x610 [ 359.359123] generic_file_write_iter+0x3f8/0x730 [ 359.363889] __vfs_write+0x51b/0x770 [ 359.367598] ? kernel_read+0x110/0x110 [ 359.371487] ? check_preemption_disabled+0x41/0x280 [ 359.376508] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 359.381531] vfs_write+0x1f3/0x540 [ 359.385067] __x64_sys_pwrite64+0x1f7/0x250 [ 359.389378] ? ksys_pwrite64+0x1a0/0x1a0 [ 359.393429] ? trace_hardirqs_off_caller+0x6e/0x210 [ 359.398433] ? do_syscall_64+0x21/0x620 [ 359.402831] do_syscall_64+0xf9/0x620 [ 359.406624] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 359.411814] RIP: 0033:0x419797 [ 359.415008] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 359.433905] RSP: 002b:00007f8e4e2f3f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 359.441601] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419797 [ 359.448859] RDX: 0000000000000048 RSI: 0000000020010000 RDI: 0000000000000004 [ 359.456117] RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffff [ 359.463374] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 359.470631] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 01:59:25 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:25 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x13b, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 359.520885] FAULT_INJECTION: forcing a failure. [ 359.520885] name failslab, interval 1, probability 0, space 0, times 0 01:59:25 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r2 = open(0x0, 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) 01:59:25 executing program 3 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 359.598126] FAULT_INJECTION: forcing a failure. [ 359.598126] name failslab, interval 1, probability 0, space 0, times 0 [ 359.604183] CPU: 0 PID: 21128 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 359.617298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 359.626743] Call Trace: [ 359.629422] dump_stack+0x1fc/0x2ef [ 359.633046] should_fail.cold+0xa/0xf [ 359.636859] ? setup_fault_attr+0x200/0x200 [ 359.641174] ? lock_acquire+0x170/0x3c0 [ 359.645235] __should_failslab+0x115/0x180 [ 359.649463] should_failslab+0x5/0x10 [ 359.653255] kmem_cache_alloc_trace+0x284/0x380 [ 359.657941] apparmor_file_alloc_security+0x394/0xad0 [ 359.663150] ? apparmor_file_receive+0x160/0x160 [ 359.667912] ? __alloc_file+0x21/0x330 [ 359.671817] security_file_alloc+0x40/0x90 [ 359.676062] __alloc_file+0xc9/0x330 [ 359.679905] alloc_empty_file+0x6d/0x170 [ 359.683998] alloc_file+0x5e/0x4d0 [ 359.687629] alloc_file_pseudo+0x165/0x250 [ 359.691867] ? alloc_file+0x4d0/0x4d0 [ 359.695685] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 359.701313] ? shmem_get_inode+0x44c/0x8d0 [ 359.705558] __shmem_file_setup.part.0+0x102/0x2b0 [ 359.710503] shmem_file_setup+0x61/0x90 [ 359.714475] __se_sys_memfd_create+0x26b/0x440 [ 359.719067] ? memfd_file_seals_ptr+0x150/0x150 [ 359.723741] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 359.729103] ? trace_hardirqs_off_caller+0x6e/0x210 [ 359.734123] ? do_syscall_64+0x21/0x620 [ 359.738115] do_syscall_64+0xf9/0x620 [ 359.741929] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 359.747133] RIP: 0033:0x4665f9 [ 359.750328] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 359.769252] RSP: 002b:00007f5e1baa9f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 359.776986] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665f9 [ 359.784249] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bee86 [ 359.791521] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 359.798787] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000008100000 [ 359.806049] R13: 0000000020000100 R14: 0000000000020000 R15: 0000000020001080 [ 359.813328] CPU: 1 PID: 21131 Comm: syz-executor.2 Not tainted 4.19.205-syzkaller #0 [ 359.821222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 359.830578] Call Trace: [ 359.833176] dump_stack+0x1fc/0x2ef [ 359.836818] should_fail.cold+0xa/0xf [ 359.840633] ? setup_fault_attr+0x200/0x200 [ 359.844966] ? lock_acquire+0x170/0x3c0 01:59:26 executing program 0 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) [ 359.848957] __should_failslab+0x115/0x180 [ 359.853377] should_failslab+0x5/0x10 [ 359.857189] kmem_cache_alloc+0x277/0x370 [ 359.861356] __alloc_file+0x21/0x330 [ 359.865086] alloc_empty_file+0x6d/0x170 [ 359.869167] alloc_file+0x5e/0x4d0 [ 359.872732] alloc_file_pseudo+0x165/0x250 [ 359.876981] ? alloc_file+0x4d0/0x4d0 [ 359.880803] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 359.886453] ? shmem_get_inode+0x44c/0x8d0 [ 359.890731] __shmem_file_setup.part.0+0x102/0x2b0 01:59:26 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x13c, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 359.895688] shmem_file_setup+0x61/0x90 [ 359.899697] __se_sys_memfd_create+0x26b/0x440 [ 359.904300] ? memfd_file_seals_ptr+0x150/0x150 [ 359.908986] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 359.914540] ? trace_hardirqs_off_caller+0x6e/0x210 [ 359.919570] ? do_syscall_64+0x21/0x620 [ 359.923567] do_syscall_64+0xf9/0x620 [ 359.927271] FAULT_INJECTION: forcing a failure. [ 359.927271] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 359.927382] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 359.944340] RIP: 0033:0x4665f9 [ 359.947550] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 359.966895] RSP: 002b:00007fa5c30f4f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 359.974609] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665f9 [ 359.981968] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00000000004bee86 [ 359.989322] RBP: 0000000000000001 R08: 0000000000010000 R09: ffffffffffffffff [ 359.996582] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 360.003867] R13: 0000000020000100 R14: 0000000000020000 R15: 0000000020001080 [ 360.011168] CPU: 0 PID: 21139 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 360.019230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 360.028582] Call Trace: [ 360.031178] dump_stack+0x1fc/0x2ef [ 360.034824] should_fail.cold+0xa/0xf [ 360.038641] ? lock_acquire+0x170/0x3c0 [ 360.042630] ? setup_fault_attr+0x200/0x200 [ 360.046980] __alloc_pages_nodemask+0x239/0x2890 [ 360.051762] ? __lock_acquire+0x6de/0x3ff0 [ 360.056045] ? static_obj+0x50/0x50 [ 360.060063] ? __lock_acquire+0x6de/0x3ff0 [ 360.064312] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 360.069176] ? __lock_acquire+0x6de/0x3ff0 [ 360.073520] ? mark_held_locks+0xf0/0xf0 [ 360.077625] ? unwind_next_frame+0xeee/0x1400 [ 360.082207] ? mark_held_locks+0xf0/0xf0 [ 360.086283] ? deref_stack_reg+0x134/0x1d0 [ 360.090540] ? get_reg+0x176/0x1f0 [ 360.094098] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 360.100092] alloc_pages_vma+0xf2/0x780 [ 360.104106] shmem_alloc_page+0x11c/0x1f0 [ 360.108277] ? shmem_swapin+0x220/0x220 [ 360.112285] ? percpu_counter_add_batch+0x126/0x180 [ 360.117350] ? __vm_enough_memory+0x316/0x650 [ 360.122000] shmem_alloc_and_acct_page+0x15a/0x850 [ 360.126955] shmem_getpage_gfp+0x4e9/0x37f0 [ 360.131396] ? shmem_alloc_and_acct_page+0x850/0x850 [ 360.136741] ? mark_held_locks+0xa6/0xf0 [ 360.140821] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 360.146032] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 360.151248] shmem_write_begin+0xff/0x1e0 [ 360.155420] generic_perform_write+0x1f8/0x4d0 [ 360.160029] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 360.164713] ? current_time+0x1c0/0x1c0 [ 360.168702] ? lock_acquire+0x170/0x3c0 [ 360.172686] __generic_file_write_iter+0x24b/0x610 [ 360.177719] generic_file_write_iter+0x3f8/0x730 [ 360.182676] __vfs_write+0x51b/0x770 [ 360.186497] ? kernel_read+0x110/0x110 [ 360.190397] ? check_preemption_disabled+0x41/0x280 [ 360.195404] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 360.200410] vfs_write+0x1f3/0x540 [ 360.203945] __x64_sys_pwrite64+0x1f7/0x250 [ 360.208255] ? ksys_pwrite64+0x1a0/0x1a0 [ 360.212303] ? trace_hardirqs_off_caller+0x6e/0x210 [ 360.217306] ? do_syscall_64+0x21/0x620 [ 360.221273] do_syscall_64+0xf9/0x620 [ 360.225071] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 360.230270] RIP: 0033:0x419797 01:59:26 executing program 2 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 360.233452] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 360.252340] RSP: 002b:00007f5e1baa9f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 360.260034] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419797 [ 360.267303] RDX: 0000000000000048 RSI: 0000000020010000 RDI: 0000000000000004 [ 360.274585] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 360.281847] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 360.289369] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 01:59:26 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x13d, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:26 executing program 0 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) [ 360.436062] FAULT_INJECTION: forcing a failure. [ 360.436062] name failslab, interval 1, probability 0, space 0, times 0 [ 360.442177] FAULT_INJECTION: forcing a failure. [ 360.442177] name failslab, interval 1, probability 0, space 0, times 0 [ 360.458804] CPU: 0 PID: 21156 Comm: syz-executor.3 Not tainted 4.19.205-syzkaller #0 [ 360.466700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 360.476057] Call Trace: [ 360.478660] dump_stack+0x1fc/0x2ef [ 360.482308] should_fail.cold+0xa/0xf [ 360.486130] ? setup_fault_attr+0x200/0x200 [ 360.490463] ? __lock_acquire+0x6de/0x3ff0 [ 360.494710] __should_failslab+0x115/0x180 [ 360.498954] should_failslab+0x5/0x10 [ 360.502825] kmem_cache_alloc+0x3f/0x370 [ 360.506903] radix_tree_node_alloc.constprop.0+0x1e4/0x320 [ 360.512542] __radix_tree_create+0x314/0x540 [ 360.516984] __radix_tree_insert+0xbb/0x5f0 [ 360.521318] ? __radix_tree_create+0x540/0x540 [ 360.525914] ? lock_acquire+0x170/0x3c0 [ 360.529996] ? shmem_add_to_page_cache+0x306/0xbb0 [ 360.535030] shmem_add_to_page_cache+0x616/0xbb0 [ 360.539906] ? shmem_recalc_inode+0x310/0x310 [ 360.544410] ? __radix_tree_preload+0x1fe/0x280 [ 360.549105] shmem_getpage_gfp+0x2004/0x37f0 [ 360.553554] ? shmem_alloc_and_acct_page+0x850/0x850 [ 360.558665] ? mark_held_locks+0xa6/0xf0 [ 360.562730] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 360.567932] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 360.573141] shmem_write_begin+0xff/0x1e0 [ 360.577326] generic_perform_write+0x1f8/0x4d0 [ 360.581928] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 360.586598] ? current_time+0x1c0/0x1c0 [ 360.590578] ? lock_acquire+0x170/0x3c0 [ 360.594638] __generic_file_write_iter+0x24b/0x610 [ 360.599701] generic_file_write_iter+0x3f8/0x730 [ 360.604470] __vfs_write+0x51b/0x770 [ 360.608185] ? kernel_read+0x110/0x110 [ 360.612080] ? check_preemption_disabled+0x41/0x280 [ 360.617131] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 360.622170] vfs_write+0x1f3/0x540 [ 360.625892] __x64_sys_pwrite64+0x1f7/0x250 [ 360.630214] ? ksys_pwrite64+0x1a0/0x1a0 [ 360.634272] ? trace_hardirqs_off_caller+0x6e/0x210 [ 360.639392] ? do_syscall_64+0x21/0x620 [ 360.643363] do_syscall_64+0xf9/0x620 [ 360.647211] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 360.652498] RIP: 0033:0x419797 [ 360.655692] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 360.674594] RSP: 002b:00007f8e4e2f3f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 01:59:27 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r2 = open(0x0, 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) [ 360.682323] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419797 [ 360.689602] RDX: 0000000000000048 RSI: 0000000020010000 RDI: 0000000000000004 [ 360.696874] RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffff [ 360.704137] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 360.711416] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 360.752349] CPU: 1 PID: 21155 Comm: syz-executor.2 Not tainted 4.19.205-syzkaller #0 [ 360.760271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 360.769632] Call Trace: [ 360.772318] dump_stack+0x1fc/0x2ef [ 360.775961] should_fail.cold+0xa/0xf [ 360.777753] FAULT_INJECTION: forcing a failure. [ 360.777753] name failslab, interval 1, probability 0, space 0, times 0 [ 360.779808] ? setup_fault_attr+0x200/0x200 [ 360.795334] ? lock_acquire+0x170/0x3c0 [ 360.799351] __should_failslab+0x115/0x180 [ 360.803590] should_failslab+0x5/0x10 [ 360.807396] kmem_cache_alloc_trace+0x284/0x380 [ 360.812079] apparmor_file_alloc_security+0x394/0xad0 [ 360.817358] ? apparmor_file_receive+0x160/0x160 [ 360.822116] ? __alloc_file+0x21/0x330 [ 360.826012] security_file_alloc+0x40/0x90 [ 360.830250] __alloc_file+0xc9/0x330 [ 360.833964] alloc_empty_file+0x6d/0x170 [ 360.838019] alloc_file+0x5e/0x4d0 [ 360.841560] alloc_file_pseudo+0x165/0x250 [ 360.845789] ? alloc_file+0x4d0/0x4d0 [ 360.849586] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 360.855204] ? shmem_get_inode+0x44c/0x8d0 [ 360.859456] __shmem_file_setup.part.0+0x102/0x2b0 [ 360.864392] shmem_file_setup+0x61/0x90 [ 360.868372] __se_sys_memfd_create+0x26b/0x440 [ 360.872955] ? memfd_file_seals_ptr+0x150/0x150 [ 360.877636] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 360.883003] ? trace_hardirqs_off_caller+0x6e/0x210 [ 360.888638] ? do_syscall_64+0x21/0x620 [ 360.892615] do_syscall_64+0xf9/0x620 [ 360.896434] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 360.901618] RIP: 0033:0x4665f9 [ 360.904912] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 360.923836] RSP: 002b:00007fa5c30f4f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 360.931539] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665f9 [ 360.938818] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00000000004bee86 [ 360.946095] RBP: 0000000000000001 R08: 0000000000010000 R09: ffffffffffffffff [ 360.953399] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 360.961441] R13: 0000000020000100 R14: 0000000000020000 R15: 0000000020001080 [ 360.968721] CPU: 0 PID: 21166 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 360.976606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 360.986328] Call Trace: [ 360.988929] dump_stack+0x1fc/0x2ef [ 360.992574] should_fail.cold+0xa/0xf [ 360.996387] ? setup_fault_attr+0x200/0x200 [ 361.000724] ? __lock_acquire+0x6de/0x3ff0 [ 361.004976] __should_failslab+0x115/0x180 [ 361.009236] should_failslab+0x5/0x10 [ 361.013043] kmem_cache_alloc+0x3f/0x370 [ 361.017223] radix_tree_node_alloc.constprop.0+0x1e4/0x320 [ 361.022877] __radix_tree_create+0x314/0x540 [ 361.027313] __radix_tree_insert+0xbb/0x5f0 [ 361.031767] ? __radix_tree_create+0x540/0x540 [ 361.036551] ? lock_acquire+0x170/0x3c0 [ 361.040518] ? shmem_add_to_page_cache+0x306/0xbb0 [ 361.045466] shmem_add_to_page_cache+0x616/0xbb0 [ 361.050341] ? shmem_recalc_inode+0x310/0x310 [ 361.054936] ? __radix_tree_preload+0x1fe/0x280 [ 361.059614] shmem_getpage_gfp+0x2004/0x37f0 [ 361.064029] ? shmem_alloc_and_acct_page+0x850/0x850 [ 361.069232] ? mark_held_locks+0xa6/0xf0 [ 361.073467] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 361.078674] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 361.084084] shmem_write_begin+0xff/0x1e0 [ 361.088243] generic_perform_write+0x1f8/0x4d0 [ 361.092877] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 361.097759] ? current_time+0x1c0/0x1c0 [ 361.101740] ? lock_acquire+0x170/0x3c0 [ 361.105829] __generic_file_write_iter+0x24b/0x610 [ 361.110755] generic_file_write_iter+0x3f8/0x730 [ 361.115500] __vfs_write+0x51b/0x770 [ 361.119481] ? kernel_read+0x110/0x110 [ 361.123481] ? check_preemption_disabled+0x41/0x280 [ 361.128557] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 361.133563] vfs_write+0x1f3/0x540 [ 361.137091] __x64_sys_pwrite64+0x1f7/0x250 [ 361.141416] ? ksys_pwrite64+0x1a0/0x1a0 [ 361.145595] ? trace_hardirqs_off_caller+0x6e/0x210 [ 361.150616] ? do_syscall_64+0x21/0x620 [ 361.154587] do_syscall_64+0xf9/0x620 [ 361.158472] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 361.163920] RIP: 0033:0x419797 [ 361.167110] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 361.186271] RSP: 002b:00007f5e1baa9f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 361.193965] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419797 01:59:27 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x13e, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:27 executing program 2 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 361.201223] RDX: 0000000000000048 RSI: 0000000020010000 RDI: 0000000000000004 [ 361.208490] RBP: 0000000000000003 R08: 0000000000000000 R09: ffffffffffffffff [ 361.215760] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 361.223023] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 361.323621] FAULT_INJECTION: forcing a failure. [ 361.323621] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 361.336545] CPU: 1 PID: 21173 Comm: syz-executor.2 Not tainted 4.19.205-syzkaller #0 [ 361.344441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 361.353935] Call Trace: [ 361.356533] dump_stack+0x1fc/0x2ef [ 361.360182] should_fail.cold+0xa/0xf [ 361.363998] ? lock_acquire+0x170/0x3c0 [ 361.367985] ? setup_fault_attr+0x200/0x200 01:59:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 361.372324] __alloc_pages_nodemask+0x239/0x2890 [ 361.377356] ? __lock_acquire+0x6de/0x3ff0 [ 361.381610] ? static_obj+0x50/0x50 [ 361.385348] ? __lock_acquire+0x6de/0x3ff0 [ 361.389596] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 361.394461] ? __lock_acquire+0x6de/0x3ff0 [ 361.398724] ? mark_held_locks+0xf0/0xf0 [ 361.402800] ? unwind_next_frame+0xeee/0x1400 [ 361.407303] ? mark_held_locks+0xf0/0xf0 [ 361.411369] ? deref_stack_reg+0x134/0x1d0 [ 361.415609] ? get_reg+0x176/0x1f0 01:59:27 executing program 0 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) [ 361.419163] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 361.425058] alloc_pages_vma+0xf2/0x780 [ 361.429055] shmem_alloc_page+0x11c/0x1f0 [ 361.433212] ? shmem_swapin+0x220/0x220 [ 361.437208] ? percpu_counter_add_batch+0x126/0x180 [ 361.442234] ? __vm_enough_memory+0x316/0x650 [ 361.446743] shmem_alloc_and_acct_page+0x15a/0x850 [ 361.451693] shmem_getpage_gfp+0x4e9/0x37f0 [ 361.456042] ? shmem_alloc_and_acct_page+0x850/0x850 [ 361.459748] FAULT_INJECTION: forcing a failure. [ 361.459748] name failslab, interval 1, probability 0, space 0, times 0 [ 361.461171] ? mark_held_locks+0xa6/0xf0 [ 361.461189] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 361.461206] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 361.461229] shmem_write_begin+0xff/0x1e0 [ 361.491142] generic_perform_write+0x1f8/0x4d0 [ 361.495741] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 361.500419] ? current_time+0x1c0/0x1c0 [ 361.504398] ? lock_acquire+0x170/0x3c0 [ 361.508379] __generic_file_write_iter+0x24b/0x610 [ 361.513311] generic_file_write_iter+0x3f8/0x730 [ 361.518091] __vfs_write+0x51b/0x770 [ 361.521864] ? kernel_read+0x110/0x110 [ 361.525764] ? check_preemption_disabled+0x41/0x280 [ 361.531151] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 361.536179] vfs_write+0x1f3/0x540 [ 361.539735] __x64_sys_pwrite64+0x1f7/0x250 [ 361.544060] ? ksys_pwrite64+0x1a0/0x1a0 [ 361.548131] ? trace_hardirqs_off_caller+0x6e/0x210 [ 361.553153] ? do_syscall_64+0x21/0x620 [ 361.557134] do_syscall_64+0xf9/0x620 [ 361.560942] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 361.566125] RIP: 0033:0x419797 [ 361.569321] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 361.588230] RSP: 002b:00007fa5c30f4f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 361.595960] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419797 [ 361.603230] RDX: 0000000000000033 RSI: 0000000020010000 RDI: 0000000000000004 [ 361.610675] RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffff [ 361.618379] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 361.625648] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 [ 361.632943] CPU: 0 PID: 21179 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 361.640835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 361.650373] Call Trace: [ 361.652974] dump_stack+0x1fc/0x2ef [ 361.656652] should_fail.cold+0xa/0xf [ 361.660474] ? setup_fault_attr+0x200/0x200 [ 361.664824] ? lock_acquire+0x170/0x3c0 [ 361.668821] __should_failslab+0x115/0x180 01:59:27 executing program 5 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 361.673066] should_failslab+0x5/0x10 [ 361.676880] kmem_cache_alloc+0x277/0x370 [ 361.681061] getname_flags+0xce/0x590 [ 361.684949] do_sys_open+0x26c/0x520 [ 361.688756] ? filp_open+0x70/0x70 [ 361.692365] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 361.697972] ? trace_hardirqs_off_caller+0x6e/0x210 [ 361.703135] ? do_syscall_64+0x21/0x620 [ 361.707100] do_syscall_64+0xf9/0x620 [ 361.710909] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 361.716160] RIP: 0033:0x4196e4 [ 361.719380] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 361.738771] RSP: 002b:00007f5e1baa9ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 361.746475] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196e4 [ 361.753763] RDX: 0000000000000002 RSI: 00007f5e1baaa000 RDI: 00000000ffffff9c [ 361.761146] RBP: 00007f5e1baaa000 R08: 0000000000000000 R09: ffffffffffffffff [ 361.768493] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 01:59:28 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x13f, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:28 executing program 0 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) [ 361.775760] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 01:59:28 executing program 2 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 361.872831] FAULT_INJECTION: forcing a failure. [ 361.872831] name failslab, interval 1, probability 0, space 0, times 0 [ 361.891036] CPU: 1 PID: 21194 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 361.898946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 361.899124] FAULT_INJECTION: forcing a failure. [ 361.899124] name failslab, interval 1, probability 0, space 0, times 0 [ 361.908420] Call Trace: [ 361.908462] dump_stack+0x1fc/0x2ef [ 361.908484] should_fail.cold+0xa/0xf [ 361.908501] ? setup_fault_attr+0x200/0x200 [ 361.908516] ? lock_acquire+0x170/0x3c0 [ 361.908534] __should_failslab+0x115/0x180 [ 361.908549] should_failslab+0x5/0x10 [ 361.908563] kmem_cache_alloc+0x277/0x370 [ 361.908579] getname_flags+0xce/0x590 [ 361.908595] do_sys_open+0x26c/0x520 [ 361.908609] ? filp_open+0x70/0x70 [ 361.908628] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 361.908646] ? trace_hardirqs_off_caller+0x6e/0x210 01:59:28 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x140, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:28 executing program 0 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) [ 361.908661] ? do_syscall_64+0x21/0x620 [ 361.908678] do_syscall_64+0xf9/0x620 [ 361.908697] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 361.908707] RIP: 0033:0x4196e4 [ 361.908722] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 361.908730] RSP: 002b:00007f5e1baa9ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 361.908744] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196e4 [ 361.908752] RDX: 0000000000000002 RSI: 00007f5e1baaa000 RDI: 00000000ffffff9c [ 361.908761] RBP: 00007f5e1baaa000 R08: 0000000000000000 R09: ffffffffffffffff [ 361.908768] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 361.908776] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 362.057161] CPU: 1 PID: 21197 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 362.065155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.067729] FAULT_INJECTION: forcing a failure. [ 362.067729] name failslab, interval 1, probability 0, space 0, times 0 [ 362.074527] Call Trace: [ 362.088319] dump_stack+0x1fc/0x2ef [ 362.091957] should_fail.cold+0xa/0xf [ 362.095788] ? setup_fault_attr+0x200/0x200 [ 362.100121] ? lock_acquire+0x170/0x3c0 [ 362.104103] __should_failslab+0x115/0x180 [ 362.108399] should_failslab+0x5/0x10 [ 362.112218] __kmalloc+0x2ab/0x3c0 [ 362.115778] ? __se_sys_memfd_create+0xf8/0x440 [ 362.120482] __se_sys_memfd_create+0xf8/0x440 [ 362.124992] ? memfd_file_seals_ptr+0x150/0x150 [ 362.129679] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 362.135054] ? trace_hardirqs_off_caller+0x6e/0x210 [ 362.140322] ? do_syscall_64+0x21/0x620 [ 362.144296] do_syscall_64+0xf9/0x620 [ 362.148110] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 362.153305] RIP: 0033:0x4665f9 [ 362.156507] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 362.175423] RSP: 002b:00007fbaf0827f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 362.183152] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665f9 [ 362.190445] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00000000004bee86 [ 362.197730] RBP: 0000000000000001 R08: 0000000000010000 R09: ffffffffffffffff [ 362.204999] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 362.212278] R13: 0000000020000100 R14: 0000000000020000 R15: 0000000020001080 [ 362.219588] CPU: 0 PID: 21204 Comm: syz-executor.2 Not tainted 4.19.205-syzkaller #0 [ 362.227483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.236843] Call Trace: [ 362.239454] dump_stack+0x1fc/0x2ef [ 362.243109] should_fail.cold+0xa/0xf [ 362.246929] ? setup_fault_attr+0x200/0x200 [ 362.251263] ? __lock_acquire+0x6de/0x3ff0 [ 362.255508] __should_failslab+0x115/0x180 [ 362.259763] should_failslab+0x5/0x10 [ 362.263575] kmem_cache_alloc+0x3f/0x370 [ 362.267652] radix_tree_node_alloc.constprop.0+0x1e4/0x320 [ 362.273292] __radix_tree_create+0x314/0x540 [ 362.277719] __radix_tree_insert+0xbb/0x5f0 [ 362.282234] ? __radix_tree_create+0x540/0x540 [ 362.286831] ? lock_acquire+0x170/0x3c0 [ 362.290821] ? shmem_add_to_page_cache+0x306/0xbb0 [ 362.295778] shmem_add_to_page_cache+0x616/0xbb0 [ 362.300552] ? shmem_recalc_inode+0x310/0x310 [ 362.305059] ? __radix_tree_preload+0x1fe/0x280 [ 362.309738] shmem_getpage_gfp+0x2004/0x37f0 [ 362.314167] ? shmem_alloc_and_acct_page+0x850/0x850 [ 362.319279] ? mark_held_locks+0xa6/0xf0 [ 362.323349] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 362.328555] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 362.333758] shmem_write_begin+0xff/0x1e0 [ 362.337921] generic_perform_write+0x1f8/0x4d0 [ 362.342503] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 362.347163] ? current_time+0x1c0/0x1c0 [ 362.351150] ? lock_acquire+0x170/0x3c0 [ 362.355122] __generic_file_write_iter+0x24b/0x610 [ 362.360061] generic_file_write_iter+0x3f8/0x730 [ 362.364820] __vfs_write+0x51b/0x770 [ 362.368554] ? kernel_read+0x110/0x110 [ 362.372443] ? check_preemption_disabled+0x41/0x280 [ 362.377458] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 362.382482] vfs_write+0x1f3/0x540 [ 362.386023] __x64_sys_pwrite64+0x1f7/0x250 [ 362.390511] ? ksys_pwrite64+0x1a0/0x1a0 [ 362.394653] ? trace_hardirqs_off_caller+0x6e/0x210 [ 362.399685] ? do_syscall_64+0x21/0x620 [ 362.403652] do_syscall_64+0xf9/0x620 [ 362.407446] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 362.412884] RIP: 0033:0x419797 [ 362.416066] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 362.435072] RSP: 002b:00007fa5c30f4f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 362.442771] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419797 [ 362.450037] RDX: 0000000000000033 RSI: 0000000020010000 RDI: 0000000000000004 [ 362.457390] RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffff [ 362.464654] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 362.471921] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 01:59:28 executing program 5 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:28 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r2 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x8400fffffffa) [ 362.527178] FAULT_INJECTION: forcing a failure. [ 362.527178] name failslab, interval 1, probability 0, space 0, times 0 [ 362.556993] CPU: 1 PID: 21209 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 362.565170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.574527] Call Trace: 01:59:28 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:28 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x141, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 362.577253] dump_stack+0x1fc/0x2ef [ 362.580903] should_fail.cold+0xa/0xf [ 362.584720] ? setup_fault_attr+0x200/0x200 [ 362.589048] ? lock_acquire+0x170/0x3c0 [ 362.593037] __should_failslab+0x115/0x180 [ 362.597282] should_failslab+0x5/0x10 [ 362.601088] kmem_cache_alloc+0x277/0x370 [ 362.605253] __alloc_file+0x21/0x330 [ 362.608986] alloc_empty_file+0x6d/0x170 [ 362.613044] path_openat+0xe9/0x2df0 [ 362.616760] ? __lock_acquire+0x6de/0x3ff0 [ 362.620992] ? path_lookupat+0x8d0/0x8d0 [ 362.625040] ? mark_held_locks+0xf0/0xf0 [ 362.629101] do_filp_open+0x18c/0x3f0 [ 362.632914] ? may_open_dev+0xf0/0xf0 [ 362.636706] ? __alloc_fd+0x28d/0x570 [ 362.640501] ? lock_downgrade+0x720/0x720 [ 362.644639] ? lock_acquire+0x170/0x3c0 [ 362.648599] ? __alloc_fd+0x34/0x570 [ 362.652315] ? do_raw_spin_unlock+0x171/0x230 [ 362.656824] ? _raw_spin_unlock+0x29/0x40 [ 362.661016] ? __alloc_fd+0x28d/0x570 [ 362.664814] do_sys_open+0x3b3/0x520 [ 362.668520] ? filp_open+0x70/0x70 [ 362.672059] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 362.677411] ? trace_hardirqs_off_caller+0x6e/0x210 [ 362.682448] ? do_syscall_64+0x21/0x620 [ 362.686413] do_syscall_64+0xf9/0x620 [ 362.690300] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 362.695482] RIP: 0033:0x4196e4 [ 362.698809] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 362.717697] RSP: 002b:00007f5e1baa9ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 362.725407] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196e4 [ 362.732897] RDX: 0000000000000002 RSI: 00007f5e1baaa000 RDI: 00000000ffffff9c [ 362.740161] RBP: 00007f5e1baaa000 R08: 0000000000000000 R09: ffffffffffffffff [ 362.747612] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 362.754878] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 01:59:29 executing program 0 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) [ 362.774240] FAULT_INJECTION: forcing a failure. [ 362.774240] name failslab, interval 1, probability 0, space 0, times 0 [ 362.796175] CPU: 1 PID: 21217 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 362.804082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 362.813438] Call Trace: [ 362.816030] dump_stack+0x1fc/0x2ef [ 362.819653] should_fail.cold+0xa/0xf [ 362.823451] ? setup_fault_attr+0x200/0x200 [ 362.827779] ? lock_acquire+0x170/0x3c0 [ 362.831764] __should_failslab+0x115/0x180 [ 362.835990] should_failslab+0x5/0x10 [ 362.839796] kmem_cache_alloc+0x277/0x370 [ 362.843953] ? shmem_destroy_callback+0xb0/0xb0 [ 362.848635] shmem_alloc_inode+0x18/0x40 [ 362.852706] ? shmem_destroy_callback+0xb0/0xb0 [ 362.857379] alloc_inode+0x5d/0x180 [ 362.861003] new_inode+0x1d/0xf0 [ 362.864366] shmem_get_inode+0x96/0x8d0 [ 362.868343] __shmem_file_setup.part.0+0x7a/0x2b0 [ 362.873185] shmem_file_setup+0x61/0x90 [ 362.877156] __se_sys_memfd_create+0x26b/0x440 [ 362.881744] ? memfd_file_seals_ptr+0x150/0x150 [ 362.886592] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 362.891970] ? trace_hardirqs_off_caller+0x6e/0x210 [ 362.896989] ? do_syscall_64+0x21/0x620 [ 362.900971] do_syscall_64+0xf9/0x620 [ 362.904776] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 362.909956] RIP: 0033:0x4665f9 [ 362.913141] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 362.932031] RSP: 002b:00007fbaf0827f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 362.939726] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665f9 [ 362.946986] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00000000004bee86 [ 362.954261] RBP: 0000000000000001 R08: 0000000000010000 R09: ffffffffffffffff [ 362.961691] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 362.968948] R13: 0000000020000100 R14: 0000000000020000 R15: 0000000020001080 01:59:29 executing program 5 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 363.075347] FAULT_INJECTION: forcing a failure. [ 363.075347] name failslab, interval 1, probability 0, space 0, times 0 [ 363.088248] CPU: 1 PID: 21223 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 363.096150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.105514] Call Trace: [ 363.108118] dump_stack+0x1fc/0x2ef [ 363.111761] should_fail.cold+0xa/0xf [ 363.115574] ? setup_fault_attr+0x200/0x200 [ 363.117644] FAULT_INJECTION: forcing a failure. [ 363.117644] name failslab, interval 1, probability 0, space 0, times 0 [ 363.119906] ? lock_acquire+0x170/0x3c0 [ 363.119933] __should_failslab+0x115/0x180 [ 363.119960] should_failslab+0x5/0x10 [ 363.143212] __kmalloc+0x2ab/0x3c0 [ 363.146746] ? inotify_handle_event+0x203/0x5e0 [ 363.151413] inotify_handle_event+0x203/0x5e0 [ 363.155942] fsnotify+0x657/0xe10 [ 363.159406] ? fsnotify_first_mark+0x200/0x200 [ 363.164007] __fput+0x528/0x890 [ 363.167292] task_work_run+0x148/0x1c0 [ 363.171192] exit_to_usermode_loop+0x251/0x2a0 [ 363.175790] do_syscall_64+0x538/0x620 [ 363.179783] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 363.184975] RIP: 0033:0x41940b [ 363.188387] Code: 0f 05 48 3d 00 f0 ff ff 77 45 c3 0f 1f 40 00 48 83 ec 18 89 7c 24 0c e8 63 fc ff ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 a1 fc ff ff 8b 44 [ 363.207292] RSP: 002b:00007f5e1baa9f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 363.214999] RAX: 0000000000000000 RBX: 00007f5e1baaa6bc RCX: 000000000041940b [ 363.222268] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 363.229642] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 363.236910] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000010 [ 363.244170] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 [ 363.251452] CPU: 0 PID: 21230 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 363.259343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.268695] Call Trace: [ 363.271050] audit: type=1804 audit(1630461569.564:204): pid=21227 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/198/file0/bus" dev="loop1" ino=1 res=1 [ 363.271289] dump_stack+0x1fc/0x2ef [ 363.299156] should_fail.cold+0xa/0xf [ 363.302974] ? setup_fault_attr+0x200/0x200 [ 363.307320] ? lock_acquire+0x170/0x3c0 [ 363.311308] __should_failslab+0x115/0x180 [ 363.315717] should_failslab+0x5/0x10 [ 363.319556] kmem_cache_alloc+0x277/0x370 [ 363.323721] __d_alloc+0x2b/0xa10 [ 363.327215] d_alloc_pseudo+0x19/0x70 [ 363.331034] alloc_file_pseudo+0xc6/0x250 [ 363.335204] ? alloc_file+0x4d0/0x4d0 [ 363.339021] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 363.344656] ? shmem_get_inode+0x44c/0x8d0 [ 363.348907] __shmem_file_setup.part.0+0x102/0x2b0 [ 363.354030] shmem_file_setup+0x61/0x90 [ 363.358017] __se_sys_memfd_create+0x26b/0x440 [ 363.362612] ? memfd_file_seals_ptr+0x150/0x150 [ 363.367297] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 363.372669] ? trace_hardirqs_off_caller+0x6e/0x210 [ 363.377698] ? do_syscall_64+0x21/0x620 [ 363.381693] do_syscall_64+0xf9/0x620 [ 363.385540] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 363.390742] RIP: 0033:0x4665f9 [ 363.393943] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 363.412942] RSP: 002b:00007fbaf0827f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 01:59:29 executing program 0 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:29 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r2 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x8400fffffffa) [ 363.420686] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665f9 [ 363.428063] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00000000004bee86 [ 363.435342] RBP: 0000000000000001 R08: 0000000000010000 R09: ffffffffffffffff [ 363.442706] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 363.449986] R13: 0000000020000100 R14: 0000000000020000 R15: 0000000020001080 01:59:29 executing program 5 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:29 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x142, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:29 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 363.541363] FAULT_INJECTION: forcing a failure. [ 363.541363] name failslab, interval 1, probability 0, space 0, times 0 [ 363.574749] CPU: 0 PID: 21245 Comm: syz-executor.0 Not tainted 4.19.205-syzkaller #0 [ 363.582791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.592137] Call Trace: [ 363.594794] dump_stack+0x1fc/0x2ef [ 363.598511] should_fail.cold+0xa/0xf [ 363.602303] ? setup_fault_attr+0x200/0x200 [ 363.606617] ? lock_acquire+0x170/0x3c0 [ 363.610739] __should_failslab+0x115/0x180 [ 363.614963] should_failslab+0x5/0x10 [ 363.618754] __kmalloc+0x2ab/0x3c0 [ 363.622288] ? inotify_handle_event+0x203/0x5e0 [ 363.626971] inotify_handle_event+0x203/0x5e0 [ 363.631457] fsnotify+0x657/0xe10 [ 363.634900] ? fsnotify_first_mark+0x200/0x200 [ 363.639475] __fput+0x528/0x890 [ 363.642744] task_work_run+0x148/0x1c0 [ 363.646637] exit_to_usermode_loop+0x251/0x2a0 [ 363.651202] do_syscall_64+0x538/0x620 [ 363.655098] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 363.660281] RIP: 0033:0x41940b [ 363.663454] Code: 0f 05 48 3d 00 f0 ff ff 77 45 c3 0f 1f 40 00 48 83 ec 18 89 7c 24 0c e8 63 fc ff ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 a1 fc ff ff 8b 44 [ 363.682448] RSP: 002b:00007f5e1baa9f30 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 363.690156] RAX: 0000000000000000 RBX: 00007f5e1baaa6bc RCX: 000000000041940b [ 363.697578] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 363.704861] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 363.712123] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000010 [ 363.719382] R13: 0000000000000004 R14: 0000000020000248 R15: 0000000000000003 01:59:30 executing program 0 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:30 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x143, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 363.778276] FAULT_INJECTION: forcing a failure. [ 363.778276] name failslab, interval 1, probability 0, space 0, times 0 [ 363.798500] CPU: 1 PID: 21256 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 363.806524] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 363.815881] Call Trace: [ 363.818486] dump_stack+0x1fc/0x2ef [ 363.822337] should_fail.cold+0xa/0xf 01:59:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 363.826158] ? setup_fault_attr+0x200/0x200 [ 363.830493] ? lock_acquire+0x170/0x3c0 [ 363.834486] __should_failslab+0x115/0x180 [ 363.838734] should_failslab+0x5/0x10 [ 363.842538] kmem_cache_alloc+0x277/0x370 [ 363.846698] __alloc_file+0x21/0x330 [ 363.850411] alloc_empty_file+0x6d/0x170 [ 363.854564] alloc_file+0x5e/0x4d0 [ 363.858091] alloc_file_pseudo+0x165/0x250 [ 363.862317] ? alloc_file+0x4d0/0x4d0 [ 363.866113] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 363.871750] ? shmem_get_inode+0x44c/0x8d0 [ 363.876069] __shmem_file_setup.part.0+0x102/0x2b0 [ 363.881006] shmem_file_setup+0x61/0x90 [ 363.884979] __se_sys_memfd_create+0x26b/0x440 [ 363.889583] ? memfd_file_seals_ptr+0x150/0x150 [ 363.894248] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 363.899752] ? trace_hardirqs_off_caller+0x6e/0x210 [ 363.904760] ? do_syscall_64+0x21/0x620 [ 363.908731] do_syscall_64+0xf9/0x620 [ 363.912648] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 363.917835] RIP: 0033:0x4665f9 [ 363.921016] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 363.939908] RSP: 002b:00007fbaf0827f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 363.947727] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665f9 [ 363.955104] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00000000004bee86 [ 363.962608] RBP: 0000000000000001 R08: 0000000000010000 R09: ffffffffffffffff [ 363.969892] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 01:59:30 executing program 5 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 363.977154] R13: 0000000020000100 R14: 0000000000020000 R15: 0000000020001080 [ 364.003346] audit: type=1804 audit(1630461570.294:205): pid=21266 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/199/file0/bus" dev="sda1" ino=14035 res=1 01:59:30 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r2 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x8400fffffffa) 01:59:30 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 364.120477] FAULT_INJECTION: forcing a failure. [ 364.120477] name failslab, interval 1, probability 0, space 0, times 0 [ 364.136136] CPU: 0 PID: 21281 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 364.144317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 364.153712] Call Trace: [ 364.156357] dump_stack+0x1fc/0x2ef [ 364.160022] should_fail.cold+0xa/0xf [ 364.163992] ? setup_fault_attr+0x200/0x200 [ 364.168358] ? lock_acquire+0x170/0x3c0 [ 364.172817] __should_failslab+0x115/0x180 [ 364.177066] should_failslab+0x5/0x10 [ 364.180893] kmem_cache_alloc_trace+0x284/0x380 [ 364.185796] apparmor_file_alloc_security+0x394/0xad0 [ 364.191000] ? do_raw_spin_unlock+0x171/0x230 [ 364.195508] ? apparmor_file_receive+0x160/0x160 [ 364.200318] ? __alloc_file+0x21/0x330 [ 364.204230] security_file_alloc+0x40/0x90 [ 364.208488] __alloc_file+0xc9/0x330 [ 364.212207] alloc_empty_file+0x6d/0x170 [ 364.216727] alloc_file+0x5e/0x4d0 01:59:30 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x144, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 364.220681] alloc_file_pseudo+0x165/0x250 [ 364.225118] ? alloc_file+0x4d0/0x4d0 [ 364.228954] ? lockdep_annotate_inode_mutex_key+0x43/0x130 [ 364.234597] ? shmem_get_inode+0x44c/0x8d0 [ 364.238853] __shmem_file_setup.part.0+0x102/0x2b0 [ 364.243795] shmem_file_setup+0x61/0x90 [ 364.247786] __se_sys_memfd_create+0x26b/0x440 [ 364.252432] ? memfd_file_seals_ptr+0x150/0x150 [ 364.257118] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 364.262506] ? trace_hardirqs_off_caller+0x6e/0x210 [ 364.267542] ? do_syscall_64+0x21/0x620 [ 364.271534] do_syscall_64+0xf9/0x620 [ 364.275352] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 364.280546] RIP: 0033:0x4665f9 [ 364.283760] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 364.302990] RSP: 002b:00007fbaf0827f48 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 364.310883] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004665f9 01:59:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) [ 364.318294] RDX: 0000000000020000 RSI: 0000000000000000 RDI: 00000000004bee86 [ 364.325573] RBP: 0000000000000001 R08: 0000000000010000 R09: ffffffffffffffff [ 364.332845] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000008100000 [ 364.340678] R13: 0000000020000100 R14: 0000000000020000 R15: 0000000020001080 01:59:30 executing program 5 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:30 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x145, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:30 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) [ 364.490545] FAULT_INJECTION: forcing a failure. [ 364.490545] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 364.525932] CPU: 1 PID: 21303 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 01:59:30 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x146, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 364.533979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 364.543629] Call Trace: [ 364.546315] dump_stack+0x1fc/0x2ef [ 364.549951] should_fail.cold+0xa/0xf [ 364.554017] ? lock_acquire+0x170/0x3c0 [ 364.558248] ? setup_fault_attr+0x200/0x200 [ 364.562668] __alloc_pages_nodemask+0x239/0x2890 [ 364.567631] ? __lock_acquire+0x6de/0x3ff0 [ 364.571969] ? static_obj+0x50/0x50 [ 364.575654] ? __lock_acquire+0x6de/0x3ff0 [ 364.579896] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 364.584744] ? __lock_acquire+0x6de/0x3ff0 [ 364.585399] audit: type=1804 audit(1630461570.824:206): pid=21309 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/200/file0/bus" dev="loop1" ino=1 res=1 [ 364.588995] ? mark_held_locks+0xf0/0xf0 [ 364.589014] ? unwind_next_frame+0xeee/0x1400 [ 364.589030] ? mark_held_locks+0xf0/0xf0 [ 364.589041] ? deref_stack_reg+0x134/0x1d0 [ 364.589056] ? get_reg+0x176/0x1f0 [ 364.633471] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 364.639351] alloc_pages_vma+0xf2/0x780 [ 364.643413] shmem_alloc_page+0x11c/0x1f0 [ 364.647561] ? shmem_swapin+0x220/0x220 [ 364.651537] ? percpu_counter_add_batch+0x126/0x180 [ 364.656541] ? __vm_enough_memory+0x316/0x650 [ 364.661976] shmem_alloc_and_acct_page+0x15a/0x850 [ 364.666910] shmem_getpage_gfp+0x4e9/0x37f0 [ 364.671232] ? shmem_alloc_and_acct_page+0x850/0x850 [ 364.676429] ? mark_held_locks+0xa6/0xf0 [ 364.680541] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 364.685730] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 364.690912] shmem_write_begin+0xff/0x1e0 [ 364.695066] generic_perform_write+0x1f8/0x4d0 [ 364.699893] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 364.704769] ? current_time+0x1c0/0x1c0 [ 364.708776] ? lock_acquire+0x170/0x3c0 [ 364.712763] __generic_file_write_iter+0x24b/0x610 [ 364.717960] generic_file_write_iter+0x3f8/0x730 [ 364.722704] __vfs_write+0x51b/0x770 [ 364.726543] ? kernel_read+0x110/0x110 [ 364.730516] ? check_preemption_disabled+0x41/0x280 [ 364.735564] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 364.740707] vfs_write+0x1f3/0x540 [ 364.744233] __x64_sys_pwrite64+0x1f7/0x250 [ 364.748538] ? ksys_pwrite64+0x1a0/0x1a0 [ 364.752586] ? trace_hardirqs_off_caller+0x6e/0x210 [ 364.757728] ? do_syscall_64+0x21/0x620 [ 364.761697] do_syscall_64+0xf9/0x620 [ 364.765663] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 364.770848] RIP: 0033:0x419797 [ 364.774197] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 364.793183] RSP: 002b:00007fbaf0827f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 364.800987] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419797 [ 364.808385] RDX: 0000000000000048 RSI: 0000000020010000 RDI: 0000000000000004 [ 364.815639] RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffff [ 364.822895] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 364.830163] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 01:59:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:31 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x2b, 0xda1, 0x0) open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8400fffffffa) 01:59:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:31 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x147, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:31 executing program 5 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:31 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x148, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 365.120858] audit: type=1804 audit(1630461571.414:207): pid=21340 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/201/file0/bus" dev="loop1" ino=1 res=1 [ 365.152078] FAULT_INJECTION: forcing a failure. [ 365.152078] name failslab, interval 1, probability 0, space 0, times 0 01:59:31 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x149, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 365.163431] CPU: 1 PID: 21356 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 365.171318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 365.180676] Call Trace: [ 365.183377] dump_stack+0x1fc/0x2ef [ 365.187019] should_fail.cold+0xa/0xf [ 365.190829] ? setup_fault_attr+0x200/0x200 [ 365.195176] ? __lock_acquire+0x6de/0x3ff0 [ 365.199433] __should_failslab+0x115/0x180 [ 365.203680] should_failslab+0x5/0x10 [ 365.207485] kmem_cache_alloc+0x3f/0x370 [ 365.211563] radix_tree_node_alloc.constprop.0+0x1e4/0x320 [ 365.217184] __radix_tree_create+0x314/0x540 [ 365.221581] __radix_tree_insert+0xbb/0x5f0 [ 365.226501] ? __radix_tree_create+0x540/0x540 [ 365.231343] ? lock_acquire+0x170/0x3c0 [ 365.235328] ? shmem_add_to_page_cache+0x306/0xbb0 [ 365.240516] shmem_add_to_page_cache+0x616/0xbb0 [ 365.245261] ? shmem_recalc_inode+0x310/0x310 [ 365.249748] ? __radix_tree_preload+0x1fe/0x280 [ 365.254409] shmem_getpage_gfp+0x2004/0x37f0 [ 365.258932] ? shmem_alloc_and_acct_page+0x850/0x850 [ 365.264042] ? mark_held_locks+0xa6/0xf0 [ 365.268096] ? ktime_get_coarse_real_ts64+0x1c7/0x290 [ 365.273288] ? iov_iter_fault_in_readable+0x1fc/0x3f0 [ 365.278474] shmem_write_begin+0xff/0x1e0 [ 365.282615] generic_perform_write+0x1f8/0x4d0 [ 365.287362] ? filemap_page_mkwrite+0x2f0/0x2f0 [ 365.292016] ? current_time+0x1c0/0x1c0 [ 365.296086] ? lock_acquire+0x170/0x3c0 [ 365.300059] __generic_file_write_iter+0x24b/0x610 [ 365.304974] generic_file_write_iter+0x3f8/0x730 [ 365.309955] __vfs_write+0x51b/0x770 [ 365.313654] ? kernel_read+0x110/0x110 [ 365.317538] ? check_preemption_disabled+0x41/0x280 [ 365.322559] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 365.327568] vfs_write+0x1f3/0x540 [ 365.331237] __x64_sys_pwrite64+0x1f7/0x250 [ 365.335566] ? ksys_pwrite64+0x1a0/0x1a0 [ 365.339634] ? trace_hardirqs_off_caller+0x6e/0x210 [ 365.344847] ? do_syscall_64+0x21/0x620 [ 365.348813] do_syscall_64+0xf9/0x620 [ 365.352961] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 365.358143] RIP: 0033:0x419797 [ 365.361320] Code: 08 89 3c 24 48 89 4c 24 18 e8 e5 f8 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 12 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 15 f9 ff ff 48 8b [ 365.380429] RSP: 002b:00007fbaf0827f20 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 365.388119] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 0000000000419797 [ 365.395369] RDX: 0000000000000048 RSI: 0000000020010000 RDI: 0000000000000004 [ 365.402626] RBP: 0000000000000001 R08: 0000000000000000 R09: ffffffffffffffff [ 365.409883] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 01:59:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) [ 365.417140] R13: 0000000000000004 R14: 0000000020000200 R15: 0000000000000000 01:59:31 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x2b, 0xda1, 0x0) open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8400fffffffa) 01:59:31 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:31 executing program 5 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:31 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x14a, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:31 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) [ 365.641302] FAULT_INJECTION: forcing a failure. [ 365.641302] name failslab, interval 1, probability 0, space 0, times 0 [ 365.656938] CPU: 0 PID: 21390 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 365.664855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 365.674235] Call Trace: [ 365.676835] dump_stack+0x1fc/0x2ef [ 365.680520] should_fail.cold+0xa/0xf [ 365.684318] ? setup_fault_attr+0x200/0x200 [ 365.688654] ? lock_acquire+0x170/0x3c0 [ 365.692655] __should_failslab+0x115/0x180 [ 365.696895] should_failslab+0x5/0x10 [ 365.700707] kmem_cache_alloc+0x277/0x370 [ 365.705177] getname_flags+0xce/0x590 [ 365.708991] do_sys_open+0x26c/0x520 [ 365.712758] ? filp_open+0x70/0x70 [ 365.716323] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 365.721709] ? trace_hardirqs_off_caller+0x6e/0x210 [ 365.727106] ? do_syscall_64+0x21/0x620 [ 365.731356] do_syscall_64+0xf9/0x620 [ 365.735317] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 365.740538] RIP: 0033:0x4196e4 [ 365.743727] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 365.762827] RSP: 002b:00007fbaf0827ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 365.770553] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196e4 [ 365.777999] RDX: 0000000000000002 RSI: 00007fbaf0828000 RDI: 00000000ffffff9c [ 365.785263] RBP: 00007fbaf0828000 R08: 0000000000000000 R09: ffffffffffffffff 01:59:32 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x14b, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 365.793263] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 365.800603] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 01:59:32 executing program 5 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:32 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x2b, 0xda1, 0x0) open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x8400fffffffa) [ 365.834972] audit: type=1804 audit(1630461572.124:208): pid=21377 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/202/file0/bus" dev="loop1" ino=1 res=1 01:59:32 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x14c, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 365.942618] FAULT_INJECTION: forcing a failure. [ 365.942618] name failslab, interval 1, probability 0, space 0, times 0 [ 365.954978] CPU: 1 PID: 21405 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 365.962866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 365.972351] Call Trace: [ 365.974931] dump_stack+0x1fc/0x2ef [ 365.978550] should_fail.cold+0xa/0xf [ 365.982345] ? setup_fault_attr+0x200/0x200 [ 365.986663] ? lock_acquire+0x170/0x3c0 [ 365.990641] __should_failslab+0x115/0x180 [ 365.995078] should_failslab+0x5/0x10 [ 365.998874] kmem_cache_alloc+0x277/0x370 [ 366.003025] __alloc_file+0x21/0x330 [ 366.006743] alloc_empty_file+0x6d/0x170 [ 366.010863] path_openat+0xe9/0x2df0 [ 366.014578] ? __lock_acquire+0x6de/0x3ff0 [ 366.018805] ? path_lookupat+0x8d0/0x8d0 [ 366.022870] ? mark_held_locks+0xf0/0xf0 [ 366.026940] ? mark_held_locks+0xf0/0xf0 [ 366.030998] do_filp_open+0x18c/0x3f0 [ 366.034891] ? may_open_dev+0xf0/0xf0 [ 366.038692] ? __alloc_fd+0x28d/0x570 [ 366.042515] ? lock_downgrade+0x720/0x720 [ 366.046673] ? lock_acquire+0x170/0x3c0 [ 366.050798] ? __alloc_fd+0x34/0x570 [ 366.054521] ? do_raw_spin_unlock+0x171/0x230 [ 366.059142] ? _raw_spin_unlock+0x29/0x40 [ 366.063909] ? __alloc_fd+0x28d/0x570 [ 366.067703] do_sys_open+0x3b3/0x520 [ 366.071652] ? filp_open+0x70/0x70 [ 366.075334] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 366.080706] ? trace_hardirqs_off_caller+0x6e/0x210 [ 366.085715] ? do_syscall_64+0x21/0x620 [ 366.089700] do_syscall_64+0xf9/0x620 [ 366.093634] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 366.098931] RIP: 0033:0x4196e4 [ 366.102134] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 366.122317] RSP: 002b:00007fbaf0827ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 366.130106] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196e4 [ 366.137818] RDX: 0000000000000002 RSI: 00007fbaf0828000 RDI: 00000000ffffff9c [ 366.145203] RBP: 00007fbaf0828000 R08: 0000000000000000 R09: ffffffffffffffff [ 366.152609] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 366.159877] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 01:59:32 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x14d, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:32 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:32 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:32 executing program 5 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:32 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x14e, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 366.314792] audit: type=1804 audit(1630461572.604:209): pid=21415 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/203/file0/bus" dev="loop1" ino=1 res=1 01:59:32 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r2 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x0) [ 366.357780] FAULT_INJECTION: forcing a failure. [ 366.357780] name failslab, interval 1, probability 0, space 0, times 0 [ 366.369891] CPU: 0 PID: 21424 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 366.377793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 366.387247] Call Trace: [ 366.389834] dump_stack+0x1fc/0x2ef [ 366.393465] should_fail.cold+0xa/0xf [ 366.397273] ? setup_fault_attr+0x200/0x200 [ 366.401702] ? lock_acquire+0x170/0x3c0 [ 366.405672] __should_failslab+0x115/0x180 [ 366.409897] should_failslab+0x5/0x10 [ 366.413692] kmem_cache_alloc_trace+0x284/0x380 [ 366.418369] apparmor_file_alloc_security+0x394/0xad0 [ 366.423582] ? apparmor_file_receive+0x160/0x160 [ 366.428350] ? __alloc_file+0x21/0x330 [ 366.432240] security_file_alloc+0x40/0x90 [ 366.436571] __alloc_file+0xc9/0x330 [ 366.440306] alloc_empty_file+0x6d/0x170 [ 366.444371] path_openat+0xe9/0x2df0 [ 366.448198] ? __lock_acquire+0x6de/0x3ff0 [ 366.452430] ? path_lookupat+0x8d0/0x8d0 [ 366.456494] ? mark_held_locks+0xf0/0xf0 [ 366.460754] ? mark_held_locks+0xf0/0xf0 [ 366.465182] do_filp_open+0x18c/0x3f0 [ 366.469100] ? may_open_dev+0xf0/0xf0 [ 366.473009] ? __alloc_fd+0x28d/0x570 [ 366.476853] ? lock_downgrade+0x720/0x720 [ 366.481054] ? lock_acquire+0x170/0x3c0 [ 366.485196] ? __alloc_fd+0x34/0x570 [ 366.488907] ? do_raw_spin_unlock+0x171/0x230 [ 366.493391] ? _raw_spin_unlock+0x29/0x40 [ 366.497549] ? __alloc_fd+0x28d/0x570 [ 366.501407] do_sys_open+0x3b3/0x520 [ 366.505122] ? filp_open+0x70/0x70 [ 366.508662] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 366.514235] ? trace_hardirqs_off_caller+0x6e/0x210 [ 366.519336] ? do_syscall_64+0x21/0x620 [ 366.523535] do_syscall_64+0xf9/0x620 [ 366.527357] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 366.532652] RIP: 0033:0x4196e4 [ 366.535961] Code: 84 00 00 00 00 00 44 89 54 24 0c e8 96 f9 ff ff 44 8b 54 24 0c 44 89 e2 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 89 44 24 0c e8 c8 f9 ff ff 8b 44 [ 366.555519] RSP: 002b:00007fbaf0827ed0 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 366.563459] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004196e4 [ 366.571105] RDX: 0000000000000002 RSI: 00007fbaf0828000 RDI: 00000000ffffff9c [ 366.578386] RBP: 00007fbaf0828000 R08: 0000000000000000 R09: ffffffffffffffff [ 366.585652] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 366.592907] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 01:59:32 executing program 5 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:32 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x14f, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xb, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:33 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x150, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 366.773367] FAULT_INJECTION: forcing a failure. [ 366.773367] name failslab, interval 1, probability 0, space 0, times 0 [ 366.785434] CPU: 1 PID: 21451 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 366.793449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 366.803017] Call Trace: [ 366.805740] dump_stack+0x1fc/0x2ef [ 366.809424] should_fail.cold+0xa/0xf [ 366.813211] ? setup_fault_attr+0x200/0x200 [ 366.817528] ? lock_acquire+0x170/0x3c0 [ 366.821494] __should_failslab+0x115/0x180 [ 366.825829] should_failslab+0x5/0x10 [ 366.829623] kmem_cache_alloc_trace+0x284/0x380 [ 366.834290] ? loop_info64_to_compat+0x5e0/0x5e0 [ 366.839039] __kthread_create_on_node+0xd2/0x410 [ 366.843968] ? lock_downgrade+0x720/0x720 [ 366.848114] ? kthread_parkme+0xa0/0xa0 [ 366.852103] ? __mutex_lock+0x365/0x1200 [ 366.852321] audit: type=1804 audit(1630461573.084:210): pid=21463 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/204/file0/bus" dev="sda1" ino=14291 res=1 [ 366.856175] ? loop_info64_to_compat+0x5e0/0x5e0 [ 366.856232] kthread_create_on_node+0xbb/0xf0 [ 366.890024] ? __kthread_create_on_node+0x410/0x410 [ 366.895053] ? __fget+0x356/0x510 [ 366.898567] ? __lockdep_init_map+0x100/0x5a0 [ 366.903047] ? __lockdep_init_map+0x100/0x5a0 [ 366.907533] lo_ioctl+0xae5/0x20e0 [ 366.911063] ? loop_set_status64+0x110/0x110 [ 366.915730] blkdev_ioctl+0x5cb/0x1a80 [ 366.919613] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 366.925205] ? blkpg_ioctl+0x9d0/0x9d0 [ 366.929204] ? mark_held_locks+0xf0/0xf0 [ 366.933256] ? mark_held_locks+0xf0/0xf0 [ 366.937630] ? debug_check_no_obj_freed+0x201/0x490 [ 366.942680] ? lock_downgrade+0x720/0x720 [ 366.946868] block_ioctl+0xe9/0x130 [ 366.950534] ? blkdev_fallocate+0x3f0/0x3f0 [ 366.954842] do_vfs_ioctl+0xcdb/0x12e0 [ 366.958717] ? lock_downgrade+0x720/0x720 [ 366.962852] ? check_preemption_disabled+0x41/0x280 [ 366.967865] ? ioctl_preallocate+0x200/0x200 [ 366.972656] ? __fget+0x356/0x510 [ 366.976277] ? do_dup2+0x450/0x450 [ 366.980446] ? do_sys_open+0x2bf/0x520 [ 366.984588] ksys_ioctl+0x9b/0xc0 [ 366.988035] __x64_sys_ioctl+0x6f/0xb0 [ 366.991957] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 366.996787] do_syscall_64+0xf9/0x620 [ 367.000781] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 367.006132] RIP: 0033:0x4663b7 [ 367.009317] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 367.028696] RSP: 002b:00007fbaf0827f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 367.037234] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 367.044527] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 367.051784] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 367.059039] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 367.066344] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 01:59:33 executing program 5 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:33 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r2 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x0) 01:59:33 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x151, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:33 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:33 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x152, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 367.305743] FAULT_INJECTION: forcing a failure. [ 367.305743] name failslab, interval 1, probability 0, space 0, times 0 [ 367.317653] CPU: 0 PID: 21475 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 367.325541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 367.334890] Call Trace: [ 367.337500] dump_stack+0x1fc/0x2ef [ 367.341159] should_fail.cold+0xa/0xf [ 367.344990] ? setup_fault_attr+0x200/0x200 [ 367.349345] ? lock_acquire+0x170/0x3c0 [ 367.353326] __should_failslab+0x115/0x180 [ 367.357706] should_failslab+0x5/0x10 [ 367.362083] kmem_cache_alloc_trace+0x284/0x380 [ 367.366741] ? loop_info64_to_compat+0x5e0/0x5e0 [ 367.371482] __kthread_create_on_node+0xd2/0x410 [ 367.376230] ? kthread_parkme+0xa0/0xa0 [ 367.380219] ? lo_ioctl+0x1bb/0x20e0 [ 367.383924] ? __mutex_lock+0x365/0x1200 [ 367.387970] ? lock_downgrade+0x720/0x720 [ 367.392104] ? loop_info64_to_compat+0x5e0/0x5e0 [ 367.396936] kthread_create_on_node+0xbb/0xf0 [ 367.401420] ? __kthread_create_on_node+0x410/0x410 [ 367.406450] ? __fget+0x356/0x510 [ 367.409885] ? do_dup2+0x450/0x450 [ 367.413410] ? __lockdep_init_map+0x100/0x5a0 [ 367.417896] ? __lockdep_init_map+0x100/0x5a0 [ 367.422398] lo_ioctl+0xae5/0x20e0 [ 367.426018] ? loop_set_status64+0x110/0x110 [ 367.430421] blkdev_ioctl+0x5cb/0x1a80 [ 367.434298] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 367.439673] ? blkpg_ioctl+0x9d0/0x9d0 [ 367.443688] ? mark_held_locks+0xf0/0xf0 [ 367.447743] ? mark_held_locks+0xf0/0xf0 [ 367.451814] ? debug_check_no_obj_freed+0x201/0x490 [ 367.456841] ? lock_downgrade+0x720/0x720 [ 367.461011] block_ioctl+0xe9/0x130 [ 367.464633] ? blkdev_fallocate+0x3f0/0x3f0 [ 367.469212] do_vfs_ioctl+0xcdb/0x12e0 [ 367.473088] ? lock_downgrade+0x720/0x720 [ 367.477242] ? check_preemption_disabled+0x41/0x280 [ 367.482264] ? ioctl_preallocate+0x200/0x200 [ 367.486835] ? __fget+0x356/0x510 [ 367.490287] ? do_dup2+0x450/0x450 [ 367.493808] ? do_sys_open+0x2bf/0x520 [ 367.497702] ksys_ioctl+0x9b/0xc0 [ 367.501159] __x64_sys_ioctl+0x6f/0xb0 [ 367.505030] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 367.509616] do_syscall_64+0xf9/0x620 [ 367.513608] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 367.518796] RIP: 0033:0x4663b7 [ 367.521992] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 367.541111] RSP: 002b:00007fbaf0827f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 367.548884] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 01:59:33 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 367.556259] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 367.563636] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 367.571034] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 367.578384] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 01:59:33 executing program 5 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:34 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x153, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x300, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 367.768410] FAULT_INJECTION: forcing a failure. [ 367.768410] name failslab, interval 1, probability 0, space 0, times 0 [ 367.785448] CPU: 0 PID: 21502 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 367.793453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 367.803140] Call Trace: [ 367.805738] dump_stack+0x1fc/0x2ef [ 367.809372] should_fail.cold+0xa/0xf [ 367.813184] ? setup_fault_attr+0x200/0x200 [ 367.817499] ? lock_acquire+0x170/0x3c0 [ 367.821465] __should_failslab+0x115/0x180 [ 367.825683] should_failslab+0x5/0x10 [ 367.829475] kmem_cache_alloc+0x277/0x370 [ 367.833809] __kernfs_new_node+0xd2/0x680 [ 367.837952] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 367.842697] ? __cpu_to_node+0x7b/0xa0 [ 367.846744] ? account_entity_enqueue+0x2e5/0x440 [ 367.851677] ? mark_held_locks+0xf0/0xf0 [ 367.855733] ? enqueue_entity+0xf86/0x3850 [ 367.860103] ? set_user_nice.part.0+0x3b9/0xab0 [ 367.864851] kernfs_create_dir_ns+0x9e/0x230 [ 367.869375] internal_create_group+0x1c1/0xb20 [ 367.874087] ? sysfs_remove_link_from_group+0x70/0x70 [ 367.879352] ? lock_downgrade+0x720/0x720 [ 367.883492] lo_ioctl+0xf7c/0x20e0 [ 367.887023] ? loop_set_status64+0x110/0x110 [ 367.891583] blkdev_ioctl+0x5cb/0x1a80 [ 367.895517] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 367.900873] ? blkpg_ioctl+0x9d0/0x9d0 [ 367.904844] ? mark_held_locks+0xf0/0xf0 [ 367.908917] ? mark_held_locks+0xf0/0xf0 [ 367.912969] ? debug_check_no_obj_freed+0x201/0x490 [ 367.917978] ? lock_downgrade+0x720/0x720 [ 367.922114] block_ioctl+0xe9/0x130 [ 367.925757] ? blkdev_fallocate+0x3f0/0x3f0 [ 367.930081] do_vfs_ioctl+0xcdb/0x12e0 [ 367.933966] ? lock_downgrade+0x720/0x720 [ 367.938118] ? check_preemption_disabled+0x41/0x280 [ 367.943123] ? ioctl_preallocate+0x200/0x200 [ 367.947665] ? __fget+0x356/0x510 [ 367.951127] ? do_dup2+0x450/0x450 [ 367.954657] ? do_sys_open+0x2bf/0x520 [ 367.958583] ksys_ioctl+0x9b/0xc0 [ 367.962148] __x64_sys_ioctl+0x6f/0xb0 [ 367.966025] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 367.970606] do_syscall_64+0xf9/0x620 [ 367.974596] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 367.979796] RIP: 0033:0x4663b7 [ 367.982978] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 368.001873] RSP: 002b:00007fbaf0827f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 368.009762] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 368.017252] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 368.025307] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 368.033219] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 368.040661] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 01:59:34 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r2 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x0) 01:59:34 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x154, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x600, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:34 executing program 5 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:34 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x155, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:34 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x48, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:34 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x156, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 368.341988] FAULT_INJECTION: forcing a failure. [ 368.341988] name failslab, interval 1, probability 0, space 0, times 0 [ 368.361861] CPU: 1 PID: 21544 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 368.370555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 368.380009] Call Trace: [ 368.382598] dump_stack+0x1fc/0x2ef [ 368.386390] should_fail.cold+0xa/0xf [ 368.390400] ? setup_fault_attr+0x200/0x200 [ 368.394720] ? lock_acquire+0x170/0x3c0 [ 368.398680] __should_failslab+0x115/0x180 [ 368.402902] should_failslab+0x5/0x10 [ 368.406794] kmem_cache_alloc+0x277/0x370 [ 368.410936] __kernfs_new_node+0xd2/0x680 [ 368.415071] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 368.419944] ? kernfs_activate+0x2c/0x1d0 [ 368.424186] ? lock_downgrade+0x720/0x720 [ 368.428409] ? kernfs_add_one+0x51/0x4c0 [ 368.432465] ? mutex_trylock+0x1a0/0x1a0 [ 368.436532] ? __mutex_unlock_slowpath+0xea/0x610 [ 368.441423] kernfs_new_node+0x92/0x120 [ 368.445394] __kernfs_create_file+0x51/0x340 [ 368.449797] sysfs_add_file_mode_ns+0x226/0x540 [ 368.454456] internal_create_group+0x355/0xb20 [ 368.459039] ? sysfs_remove_link_from_group+0x70/0x70 [ 368.464305] ? lock_downgrade+0x720/0x720 [ 368.468444] lo_ioctl+0xf7c/0x20e0 [ 368.471970] ? loop_set_status64+0x110/0x110 [ 368.476376] blkdev_ioctl+0x5cb/0x1a80 [ 368.480264] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 368.485621] ? blkpg_ioctl+0x9d0/0x9d0 [ 368.489499] ? mark_held_locks+0xf0/0xf0 [ 368.493539] ? mark_held_locks+0xf0/0xf0 [ 368.497686] ? debug_check_no_obj_freed+0x201/0x490 [ 368.502699] ? lock_downgrade+0x720/0x720 [ 368.506834] block_ioctl+0xe9/0x130 [ 368.510633] ? blkdev_fallocate+0x3f0/0x3f0 [ 368.515104] do_vfs_ioctl+0xcdb/0x12e0 [ 368.518994] ? lock_downgrade+0x720/0x720 [ 368.523133] ? check_preemption_disabled+0x41/0x280 [ 368.528309] ? ioctl_preallocate+0x200/0x200 [ 368.532718] ? __fget+0x356/0x510 [ 368.536179] ? do_dup2+0x450/0x450 [ 368.539730] ? do_sys_open+0x2bf/0x520 [ 368.543620] ksys_ioctl+0x9b/0xc0 [ 368.547076] __x64_sys_ioctl+0x6f/0xb0 [ 368.550947] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 368.555554] do_syscall_64+0xf9/0x620 [ 368.559360] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 368.564624] RIP: 0033:0x4663b7 [ 368.567817] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 368.587275] RSP: 002b:00007fbaf0827f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 368.595032] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 368.602303] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 368.609564] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 368.617100] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 368.624357] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 01:59:34 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x700, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) [ 368.667877] audit: type=1804 audit(1630461574.964:211): pid=21538 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/206/file0/bus" dev="loop1" ino=1 res=1 01:59:35 executing program 5 (fault-call:0 fault-nth:14): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:35 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x157, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:35 executing program 1 (fault-call:9 fault-nth:0): syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r2 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) 01:59:35 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x158, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 368.874527] FAULT_INJECTION: forcing a failure. [ 368.874527] name failslab, interval 1, probability 0, space 0, times 0 [ 368.886399] CPU: 0 PID: 21573 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 368.894368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 368.903716] Call Trace: [ 368.906319] dump_stack+0x1fc/0x2ef [ 368.909945] should_fail.cold+0xa/0xf [ 368.913835] ? setup_fault_attr+0x200/0x200 [ 368.918197] ? lock_acquire+0x170/0x3c0 [ 368.922175] __should_failslab+0x115/0x180 [ 368.926421] should_failslab+0x5/0x10 [ 368.930232] kmem_cache_alloc+0x277/0x370 [ 368.934395] __kernfs_new_node+0xd2/0x680 [ 368.938546] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 368.943454] ? __mutex_unlock_slowpath+0xea/0x610 [ 368.948308] ? wait_for_completion_io+0x10/0x10 [ 368.952994] ? kernfs_next_descendant_post+0x19c/0x290 [ 368.958269] kernfs_new_node+0x92/0x120 [ 368.962298] __kernfs_create_file+0x51/0x340 [ 368.966723] sysfs_add_file_mode_ns+0x226/0x540 [ 368.971424] internal_create_group+0x355/0xb20 [ 368.976005] ? sysfs_remove_link_from_group+0x70/0x70 [ 368.981191] ? lock_downgrade+0x720/0x720 [ 368.985356] lo_ioctl+0xf7c/0x20e0 [ 368.988904] ? loop_set_status64+0x110/0x110 [ 368.993328] blkdev_ioctl+0x5cb/0x1a80 [ 368.997211] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 369.002594] ? blkpg_ioctl+0x9d0/0x9d0 [ 369.006489] ? mark_held_locks+0xf0/0xf0 [ 369.010637] ? mark_held_locks+0xf0/0xf0 [ 369.014689] ? debug_check_no_obj_freed+0x201/0x490 [ 369.019716] ? lock_downgrade+0x720/0x720 [ 369.023867] block_ioctl+0xe9/0x130 [ 369.027536] ? blkdev_fallocate+0x3f0/0x3f0 [ 369.031855] do_vfs_ioctl+0xcdb/0x12e0 [ 369.035729] ? lock_downgrade+0x720/0x720 [ 369.039920] ? check_preemption_disabled+0x41/0x280 [ 369.045332] ? ioctl_preallocate+0x200/0x200 [ 369.049769] ? __fget+0x356/0x510 [ 369.053331] ? do_dup2+0x450/0x450 [ 369.056986] ? do_sys_open+0x2bf/0x520 [ 369.060963] ksys_ioctl+0x9b/0xc0 [ 369.064522] __x64_sys_ioctl+0x6f/0xb0 [ 369.068410] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 369.072991] do_syscall_64+0xf9/0x620 [ 369.076837] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 369.082017] RIP: 0033:0x4663b7 [ 369.085204] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 369.104227] RSP: 002b:00007fbaf0827f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 369.111932] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 369.119314] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 369.126671] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 369.133942] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 369.141487] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 369.223187] audit: type=1804 audit(1630461575.514:212): pid=21581 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/207/bus" dev="sda1" ino=15063 res=1 [ 369.223845] FAULT_INJECTION: forcing a failure. [ 369.223845] name failslab, interval 1, probability 0, space 0, times 0 01:59:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4c, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xb00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) [ 369.279302] CPU: 0 PID: 21581 Comm: syz-executor.1 Not tainted 4.19.205-syzkaller #0 [ 369.287319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 369.296766] Call Trace: [ 369.299369] dump_stack+0x1fc/0x2ef [ 369.303021] should_fail.cold+0xa/0xf [ 369.306837] ? setup_fault_attr+0x200/0x200 [ 369.311167] ? lock_acquire+0x170/0x3c0 [ 369.315159] __should_failslab+0x115/0x180 [ 369.319488] should_failslab+0x5/0x10 [ 369.323303] kmem_cache_alloc_trace+0x284/0x380 [ 369.327981] alloc_pipe_info+0xb8/0x470 [ 369.331955] splice_direct_to_actor+0x6dd/0x8d0 [ 369.336829] ? apparmor_getprocattr+0x11d0/0x11d0 [ 369.341686] ? check_preemption_disabled+0x41/0x280 [ 369.346710] ? mark_held_locks+0xf0/0xf0 [ 369.350767] ? generic_pipe_buf_nosteal+0x10/0x10 [ 369.355638] ? do_splice_to+0x160/0x160 [ 369.359618] ? security_file_permission+0x1c0/0x220 [ 369.364628] do_splice_direct+0x1a7/0x270 [ 369.368766] ? splice_direct_to_actor+0x8d0/0x8d0 [ 369.373645] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 369.378650] do_sendfile+0x550/0xc30 [ 369.382355] ? do_compat_pwritev64+0x1b0/0x1b0 [ 369.386935] ? vfs_write+0x393/0x540 [ 369.390647] __se_sys_sendfile64+0x147/0x160 [ 369.395057] ? __se_sys_sendfile+0x180/0x180 [ 369.399451] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 369.404801] ? trace_hardirqs_off_caller+0x6e/0x210 [ 369.409954] ? do_syscall_64+0x21/0x620 [ 369.414024] do_syscall_64+0xf9/0x620 [ 369.417826] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 369.423003] RIP: 0033:0x4665f9 [ 369.426202] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 369.445467] RSP: 002b:00007f9ea2239188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 369.453246] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 369.460528] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000005 [ 369.467806] RBP: 00007f9ea22391d0 R08: 0000000000000000 R09: 0000000000000000 01:59:35 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x159, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 369.475386] R10: 00008400fffffffa R11: 0000000000000246 R12: 0000000000000001 [ 369.482656] R13: 00007ffc2fdc92df R14: 00007f9ea2239300 R15: 0000000000022000 01:59:35 executing program 1 (fault-call:9 fault-nth:1): syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r2 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) 01:59:35 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x15a, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:35 executing program 5 (fault-call:0 fault-nth:15): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:35 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:35 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x68, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:36 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x15b, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 369.760193] audit: type=1804 audit(1630461576.054:213): pid=21619 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/208/file0/bus" dev="loop1" ino=1 res=1 [ 369.787690] FAULT_INJECTION: forcing a failure. [ 369.787690] name failslab, interval 1, probability 0, space 0, times 0 [ 369.805560] FAULT_INJECTION: forcing a failure. [ 369.805560] name failslab, interval 1, probability 0, space 0, times 0 [ 369.812190] CPU: 1 PID: 21619 Comm: syz-executor.1 Not tainted 4.19.205-syzkaller #0 [ 369.825618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 369.834991] Call Trace: [ 369.837584] dump_stack+0x1fc/0x2ef [ 369.841303] should_fail.cold+0xa/0xf [ 369.845110] ? setup_fault_attr+0x200/0x200 [ 369.849427] ? lock_acquire+0x170/0x3c0 [ 369.853401] __should_failslab+0x115/0x180 [ 369.857650] should_failslab+0x5/0x10 [ 369.861449] __kmalloc+0x2ab/0x3c0 [ 369.864989] ? alloc_pipe_info+0x193/0x470 [ 369.869229] alloc_pipe_info+0x193/0x470 [ 369.873406] splice_direct_to_actor+0x6dd/0x8d0 [ 369.878090] ? apparmor_getprocattr+0x11d0/0x11d0 [ 369.882953] ? check_preemption_disabled+0x41/0x280 [ 369.887976] ? mark_held_locks+0xf0/0xf0 [ 369.892037] ? generic_pipe_buf_nosteal+0x10/0x10 [ 369.896954] ? do_splice_to+0x160/0x160 [ 369.900926] ? security_file_permission+0x1c0/0x220 [ 369.905942] do_splice_direct+0x1a7/0x270 [ 369.910097] ? splice_direct_to_actor+0x8d0/0x8d0 [ 369.915031] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 369.920168] do_sendfile+0x550/0xc30 [ 369.923987] ? do_compat_pwritev64+0x1b0/0x1b0 [ 369.928598] ? vfs_write+0x393/0x540 [ 369.932327] __se_sys_sendfile64+0x147/0x160 [ 369.936923] ? __se_sys_sendfile+0x180/0x180 [ 369.941369] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 369.946738] ? trace_hardirqs_off_caller+0x6e/0x210 [ 369.951758] ? do_syscall_64+0x21/0x620 [ 369.955754] do_syscall_64+0xf9/0x620 [ 369.959558] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 369.964742] RIP: 0033:0x4665f9 [ 369.967936] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 369.986841] RSP: 002b:00007f9ea2239188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 369.994553] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 370.001823] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000003 [ 370.009090] RBP: 00007f9ea22391d0 R08: 0000000000000000 R09: 0000000000000000 [ 370.016531] R10: 00008400fffffffa R11: 0000000000000246 R12: 0000000000000001 [ 370.023817] R13: 00007ffc2fdc92df R14: 00007f9ea2239300 R15: 0000000000022000 [ 370.031210] CPU: 0 PID: 21621 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 370.039102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 370.048459] Call Trace: [ 370.051330] dump_stack+0x1fc/0x2ef [ 370.054984] should_fail.cold+0xa/0xf 01:59:36 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x15c, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:36 executing program 1 (fault-call:9 fault-nth:2): syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r2 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) [ 370.058801] ? setup_fault_attr+0x200/0x200 [ 370.063398] ? lock_acquire+0x170/0x3c0 [ 370.067386] __should_failslab+0x115/0x180 [ 370.071646] should_failslab+0x5/0x10 [ 370.075453] kmem_cache_alloc+0x277/0x370 [ 370.079614] __kernfs_new_node+0xd2/0x680 [ 370.083772] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 370.088638] ? __mutex_unlock_slowpath+0xea/0x610 [ 370.093476] ? wait_for_completion_io+0x10/0x10 [ 370.098158] ? kernfs_next_descendant_post+0x19c/0x290 [ 370.103530] kernfs_new_node+0x92/0x120 [ 370.107498] __kernfs_create_file+0x51/0x340 [ 370.111893] sysfs_add_file_mode_ns+0x226/0x540 [ 370.116572] internal_create_group+0x355/0xb20 [ 370.121182] ? sysfs_remove_link_from_group+0x70/0x70 [ 370.126371] ? lock_downgrade+0x720/0x720 [ 370.130525] lo_ioctl+0xf7c/0x20e0 [ 370.134064] ? loop_set_status64+0x110/0x110 [ 370.138465] blkdev_ioctl+0x5cb/0x1a80 [ 370.142367] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 370.147826] ? blkpg_ioctl+0x9d0/0x9d0 [ 370.151815] ? mark_held_locks+0xf0/0xf0 [ 370.155991] ? mark_held_locks+0xf0/0xf0 [ 370.160072] ? debug_check_no_obj_freed+0x201/0x490 [ 370.165109] ? lock_downgrade+0x720/0x720 [ 370.169449] block_ioctl+0xe9/0x130 [ 370.173083] ? blkdev_fallocate+0x3f0/0x3f0 [ 370.177409] do_vfs_ioctl+0xcdb/0x12e0 [ 370.181296] ? lock_downgrade+0x720/0x720 [ 370.185437] ? check_preemption_disabled+0x41/0x280 [ 370.190454] ? ioctl_preallocate+0x200/0x200 [ 370.194995] ? __fget+0x356/0x510 [ 370.198457] ? do_dup2+0x450/0x450 [ 370.202021] ? do_sys_open+0x2bf/0x520 [ 370.205947] ksys_ioctl+0x9b/0xc0 [ 370.209486] __x64_sys_ioctl+0x6f/0xb0 [ 370.213368] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 370.217948] do_syscall_64+0xf9/0x620 [ 370.221836] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 370.227013] RIP: 0033:0x4663b7 [ 370.230572] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 370.249465] RSP: 002b:00007fbaf0827f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 370.257199] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 370.264473] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 370.271733] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 370.279000] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 370.286267] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 01:59:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3f00, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:36 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x15d, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:36 executing program 5 (fault-call:0 fault-nth:16): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:36 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6c, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 370.534032] audit: type=1804 audit(1630461576.824:214): pid=21653 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/209/file0/bus" dev="loop1" ino=1 res=1 [ 370.535366] FAULT_INJECTION: forcing a failure. [ 370.535366] name fail_page_alloc, interval 1, probability 0, space 0, times 0 01:59:36 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x15e, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 370.588481] FAULT_INJECTION: forcing a failure. [ 370.588481] name failslab, interval 1, probability 0, space 0, times 0 [ 370.610605] CPU: 1 PID: 21670 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 370.618517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 370.627877] Call Trace: [ 370.630534] dump_stack+0x1fc/0x2ef [ 370.634175] should_fail.cold+0xa/0xf [ 370.637989] ? setup_fault_attr+0x200/0x200 [ 370.642486] ? lock_acquire+0x170/0x3c0 [ 370.646470] __should_failslab+0x115/0x180 [ 370.650708] should_failslab+0x5/0x10 [ 370.654507] kmem_cache_alloc+0x277/0x370 [ 370.658661] __kernfs_new_node+0xd2/0x680 [ 370.662810] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 370.667568] ? __mutex_unlock_slowpath+0xea/0x610 [ 370.672405] ? wait_for_completion_io+0x10/0x10 [ 370.677200] ? kernfs_next_descendant_post+0x19c/0x290 [ 370.682484] kernfs_new_node+0x92/0x120 [ 370.686461] __kernfs_create_file+0x51/0x340 [ 370.690868] sysfs_add_file_mode_ns+0x226/0x540 [ 370.695543] internal_create_group+0x355/0xb20 [ 370.700124] ? sysfs_remove_link_from_group+0x70/0x70 [ 370.705308] ? lock_downgrade+0x720/0x720 [ 370.709463] lo_ioctl+0xf7c/0x20e0 [ 370.713004] ? loop_set_status64+0x110/0x110 [ 370.717409] blkdev_ioctl+0x5cb/0x1a80 [ 370.721289] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 370.726657] ? blkpg_ioctl+0x9d0/0x9d0 [ 370.730550] ? mark_held_locks+0xf0/0xf0 [ 370.734692] ? mark_held_locks+0xf0/0xf0 [ 370.738762] ? debug_check_no_obj_freed+0x201/0x490 [ 370.743917] ? lock_downgrade+0x720/0x720 [ 370.748084] block_ioctl+0xe9/0x130 [ 370.751796] ? blkdev_fallocate+0x3f0/0x3f0 [ 370.756124] do_vfs_ioctl+0xcdb/0x12e0 [ 370.760028] ? lock_downgrade+0x720/0x720 [ 370.764191] ? check_preemption_disabled+0x41/0x280 [ 370.769217] ? ioctl_preallocate+0x200/0x200 [ 370.773637] ? __fget+0x356/0x510 [ 370.777107] ? do_dup2+0x450/0x450 [ 370.780758] ? do_sys_open+0x2bf/0x520 [ 370.784665] ksys_ioctl+0x9b/0xc0 [ 370.788171] __x64_sys_ioctl+0x6f/0xb0 [ 370.792062] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 370.796647] do_syscall_64+0xf9/0x620 [ 370.800453] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 370.805636] RIP: 0033:0x4663b7 [ 370.808822] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 370.827724] RSP: 002b:00007fbaf0827f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 01:59:36 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xeffd, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x23, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 370.835458] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 370.842835] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 370.850299] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 370.857570] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 370.864840] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 370.872222] CPU: 0 PID: 21653 Comm: syz-executor.1 Not tainted 4.19.205-syzkaller #0 [ 370.880113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 370.889484] Call Trace: [ 370.892092] dump_stack+0x1fc/0x2ef [ 370.895743] should_fail.cold+0xa/0xf [ 370.899558] ? lock_acquire+0x170/0x3c0 [ 370.903548] ? setup_fault_attr+0x200/0x200 [ 370.907894] __alloc_pages_nodemask+0x239/0x2890 [ 370.912668] ? __radix_tree_lookup+0x216/0x370 [ 370.917263] ? mark_held_locks+0xf0/0xf0 [ 370.921336] ? find_get_entry+0x4cd/0x8a0 [ 370.925503] ? lock_downgrade+0x720/0x720 [ 370.929667] ? __radix_tree_lookup+0x370/0x370 [ 370.934263] ? check_preemption_disabled+0x41/0x280 [ 370.939295] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 370.944157] ? find_get_pages_range_tag+0xc50/0xc50 [ 370.949298] ? ondemand_readahead.isra.0+0x575/0xd40 [ 370.954409] alloc_pages_current+0x193/0x2a0 [ 370.958820] generic_file_read_iter+0x1ffb/0x2b60 [ 370.963689] generic_file_splice_read+0x44a/0x6d0 [ 370.968532] ? add_to_pipe+0x360/0x360 [ 370.972681] ? generic_splice_sendpage+0x140/0x140 [ 370.977609] ? security_file_permission+0x1c0/0x220 [ 370.982626] ? add_to_pipe+0x360/0x360 [ 370.986510] do_splice_to+0x10e/0x160 [ 370.990311] splice_direct_to_actor+0x2b9/0x8d0 [ 370.994979] ? generic_pipe_buf_nosteal+0x10/0x10 [ 370.999816] ? do_splice_to+0x160/0x160 [ 371.003785] do_splice_direct+0x1a7/0x270 [ 371.007922] ? splice_direct_to_actor+0x8d0/0x8d0 [ 371.012771] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 371.017797] do_sendfile+0x550/0xc30 [ 371.021513] ? do_compat_pwritev64+0x1b0/0x1b0 [ 371.026101] ? vfs_write+0x393/0x540 [ 371.029825] __se_sys_sendfile64+0x147/0x160 [ 371.034236] ? __se_sys_sendfile+0x180/0x180 [ 371.038655] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 371.044035] ? trace_hardirqs_off_caller+0x6e/0x210 [ 371.049067] ? do_syscall_64+0x21/0x620 [ 371.053127] do_syscall_64+0xf9/0x620 [ 371.056936] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 371.062122] RIP: 0033:0x4665f9 [ 371.065489] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 371.084586] RSP: 002b:00007f9ea2239188 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 371.092285] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665f9 [ 371.099822] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000006 [ 371.107099] RBP: 00007f9ea22391d0 R08: 0000000000000000 R09: 0000000000000000 [ 371.114359] R10: 00008400fffffffa R11: 0000000000000246 R12: 0000000000000001 [ 371.121626] R13: 00007ffc2fdc92df R14: 00007f9ea2239300 R15: 0000000000022000 01:59:37 executing program 1 (fault-call:9 fault-nth:3): syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r2 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) 01:59:37 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x15f, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:37 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfdef, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:37 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x160, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:37 executing program 5 (fault-call:0 fault-nth:17): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:37 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x74, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 371.412072] FAULT_INJECTION: forcing a failure. [ 371.412072] name failslab, interval 1, probability 0, space 0, times 0 [ 371.429279] CPU: 0 PID: 21700 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 371.437267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 371.446703] Call Trace: [ 371.449300] dump_stack+0x1fc/0x2ef [ 371.453199] should_fail.cold+0xa/0xf [ 371.456991] ? setup_fault_attr+0x200/0x200 [ 371.461325] ? lock_acquire+0x170/0x3c0 [ 371.465322] __should_failslab+0x115/0x180 [ 371.469576] should_failslab+0x5/0x10 [ 371.473571] kmem_cache_alloc+0x277/0x370 [ 371.477714] __kernfs_new_node+0xd2/0x680 [ 371.481964] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 371.486929] ? __mutex_unlock_slowpath+0xea/0x610 [ 371.491867] ? wait_for_completion_io+0x10/0x10 [ 371.496674] ? kernfs_next_descendant_post+0x19c/0x290 [ 371.501971] kernfs_new_node+0x92/0x120 [ 371.505953] __kernfs_create_file+0x51/0x340 [ 371.510468] sysfs_add_file_mode_ns+0x226/0x540 [ 371.515431] internal_create_group+0x355/0xb20 [ 371.520033] ? sysfs_remove_link_from_group+0x70/0x70 [ 371.525238] ? lock_downgrade+0x720/0x720 [ 371.529543] lo_ioctl+0xf7c/0x20e0 [ 371.533190] ? loop_set_status64+0x110/0x110 [ 371.537749] blkdev_ioctl+0x5cb/0x1a80 [ 371.541680] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 371.547161] ? blkpg_ioctl+0x9d0/0x9d0 [ 371.551151] ? mark_held_locks+0xf0/0xf0 [ 371.555374] ? mark_held_locks+0xf0/0xf0 [ 371.559445] ? debug_check_no_obj_freed+0x201/0x490 [ 371.564519] ? lock_downgrade+0x720/0x720 [ 371.568686] block_ioctl+0xe9/0x130 [ 371.572311] ? blkdev_fallocate+0x3f0/0x3f0 [ 371.576788] do_vfs_ioctl+0xcdb/0x12e0 [ 371.580692] ? lock_downgrade+0x720/0x720 [ 371.584931] ? check_preemption_disabled+0x41/0x280 [ 371.589947] ? ioctl_preallocate+0x200/0x200 [ 371.594353] ? __fget+0x356/0x510 [ 371.597800] ? do_dup2+0x450/0x450 [ 371.601323] ? do_sys_open+0x2bf/0x520 [ 371.605226] ksys_ioctl+0x9b/0xc0 [ 371.608704] __x64_sys_ioctl+0x6f/0xb0 [ 371.612596] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 371.617169] do_syscall_64+0xf9/0x620 [ 371.620973] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 371.626163] RIP: 0033:0x4663b7 [ 371.629566] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 371.648589] RSP: 002b:00007fbaf0827f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 371.656393] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 371.664202] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 371.671535] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 371.678809] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 371.686094] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 01:59:38 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x161, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:38 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r2 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) 01:59:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:38 executing program 5 (fault-call:0 fault-nth:18): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:38 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x162, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:38 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x163, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 371.959880] FAULT_INJECTION: forcing a failure. [ 371.959880] name failslab, interval 1, probability 0, space 0, times 0 [ 371.971720] CPU: 1 PID: 21734 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 371.979620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 371.988967] Call Trace: [ 371.991550] dump_stack+0x1fc/0x2ef [ 371.995168] should_fail.cold+0xa/0xf [ 371.998965] ? setup_fault_attr+0x200/0x200 [ 372.003328] ? lock_acquire+0x170/0x3c0 [ 372.007295] __should_failslab+0x115/0x180 [ 372.011614] should_failslab+0x5/0x10 [ 372.015478] kmem_cache_alloc+0x277/0x370 [ 372.019728] __kernfs_new_node+0xd2/0x680 [ 372.023879] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 372.028791] ? __mutex_unlock_slowpath+0xea/0x610 [ 372.033625] ? wait_for_completion_io+0x10/0x10 [ 372.038289] ? kernfs_next_descendant_post+0x19c/0x290 [ 372.043560] kernfs_new_node+0x92/0x120 [ 372.047535] __kernfs_create_file+0x51/0x340 [ 372.051941] sysfs_add_file_mode_ns+0x226/0x540 [ 372.056715] internal_create_group+0x355/0xb20 [ 372.061454] ? sysfs_remove_link_from_group+0x70/0x70 [ 372.066765] ? lock_downgrade+0x720/0x720 [ 372.071118] lo_ioctl+0xf7c/0x20e0 [ 372.074814] ? loop_set_status64+0x110/0x110 [ 372.079228] blkdev_ioctl+0x5cb/0x1a80 [ 372.083188] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 372.088669] ? blkpg_ioctl+0x9d0/0x9d0 [ 372.092547] ? mark_held_locks+0xf0/0xf0 [ 372.096677] ? mark_held_locks+0xf0/0xf0 [ 372.100856] ? debug_check_no_obj_freed+0x201/0x490 [ 372.105870] ? lock_downgrade+0x720/0x720 [ 372.110012] block_ioctl+0xe9/0x130 [ 372.113863] ? blkdev_fallocate+0x3f0/0x3f0 [ 372.118339] do_vfs_ioctl+0xcdb/0x12e0 [ 372.122481] ? lock_downgrade+0x720/0x720 [ 372.126751] ? check_preemption_disabled+0x41/0x280 [ 372.131774] ? ioctl_preallocate+0x200/0x200 [ 372.136182] ? __fget+0x356/0x510 [ 372.139799] ? do_dup2+0x450/0x450 [ 372.143336] ? do_sys_open+0x2bf/0x520 [ 372.147224] ksys_ioctl+0x9b/0xc0 [ 372.151030] __x64_sys_ioctl+0x6f/0xb0 [ 372.155047] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 372.159628] do_syscall_64+0xf9/0x620 [ 372.163439] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 372.168688] RIP: 0033:0x4663b7 [ 372.171943] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 372.190952] RSP: 002b:00007fbaf0827f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 372.198883] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 372.206170] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 372.213428] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 372.220682] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 372.227935] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 01:59:38 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x164, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 372.270127] audit: type=1804 audit(1630461578.564:215): pid=21745 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/211/bus" dev="sda1" ino=14291 res=1 01:59:38 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x165, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:38 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7a, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:38 executing program 5 (fault-call:0 fault-nth:19): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:38 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x200000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:38 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x166, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 372.562172] FAULT_INJECTION: forcing a failure. [ 372.562172] name failslab, interval 1, probability 0, space 0, times 0 [ 372.581138] CPU: 1 PID: 21779 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 372.589192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 372.598544] Call Trace: [ 372.601145] dump_stack+0x1fc/0x2ef [ 372.604791] should_fail.cold+0xa/0xf [ 372.608615] ? setup_fault_attr+0x200/0x200 [ 372.613039] ? lock_acquire+0x170/0x3c0 [ 372.617037] __should_failslab+0x115/0x180 [ 372.621277] should_failslab+0x5/0x10 [ 372.625081] kmem_cache_alloc+0x277/0x370 [ 372.629238] __kernfs_new_node+0xd2/0x680 [ 372.633530] ? kernfs_dop_revalidate+0x3a0/0x3a0 [ 372.638450] ? __mutex_unlock_slowpath+0xea/0x610 [ 372.643305] ? wait_for_completion_io+0x10/0x10 [ 372.648003] ? kernfs_next_descendant_post+0x19c/0x290 [ 372.653308] kernfs_new_node+0x92/0x120 [ 372.657439] __kernfs_create_file+0x51/0x340 [ 372.661845] sysfs_add_file_mode_ns+0x226/0x540 [ 372.666526] internal_create_group+0x355/0xb20 [ 372.671132] ? sysfs_remove_link_from_group+0x70/0x70 [ 372.676410] ? lock_downgrade+0x720/0x720 [ 372.680596] lo_ioctl+0xf7c/0x20e0 [ 372.684203] ? loop_set_status64+0x110/0x110 [ 372.688618] blkdev_ioctl+0x5cb/0x1a80 [ 372.692500] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 372.697933] ? blkpg_ioctl+0x9d0/0x9d0 [ 372.701955] ? mark_held_locks+0xf0/0xf0 [ 372.706031] ? mark_held_locks+0xf0/0xf0 [ 372.710554] ? debug_check_no_obj_freed+0x201/0x490 [ 372.715576] ? lock_downgrade+0x720/0x720 [ 372.719730] block_ioctl+0xe9/0x130 [ 372.723356] ? blkdev_fallocate+0x3f0/0x3f0 [ 372.727843] do_vfs_ioctl+0xcdb/0x12e0 [ 372.731739] ? lock_downgrade+0x720/0x720 [ 372.735984] ? check_preemption_disabled+0x41/0x280 [ 372.741002] ? ioctl_preallocate+0x200/0x200 [ 372.745412] ? __fget+0x356/0x510 [ 372.748871] ? do_dup2+0x450/0x450 [ 372.752906] ? do_sys_open+0x2bf/0x520 [ 372.757116] ksys_ioctl+0x9b/0xc0 [ 372.760626] __x64_sys_ioctl+0x6f/0xb0 [ 372.764526] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 372.769121] do_syscall_64+0xf9/0x620 [ 372.772977] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 372.778262] RIP: 0033:0x4663b7 [ 372.781465] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 372.800376] RSP: 002b:00007fbaf0827f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 372.808298] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 372.815854] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 372.823246] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 372.830586] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 372.838226] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 01:59:39 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') connect(0xffffffffffffffff, &(0x7f0000000080)=@nl=@proc={0x10, 0x0, 0x25dfdbfb, 0x40}, 0x80) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r2 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) 01:59:39 executing program 5 (fault-call:0 fault-nth:20): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x500, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:39 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x167, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:39 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x168, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 373.059679] FAULT_INJECTION: forcing a failure. [ 373.059679] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 373.071603] CPU: 0 PID: 21807 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 373.079471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 373.088838] Call Trace: [ 373.091491] dump_stack+0x1fc/0x2ef [ 373.095221] should_fail.cold+0xa/0xf [ 373.099221] ? setup_fault_attr+0x200/0x200 [ 373.103524] ? lock_acquire+0x170/0x3c0 [ 373.107500] ? kernfs_activate+0x2c/0x1d0 [ 373.111773] __alloc_pages_nodemask+0x239/0x2890 [ 373.116521] ? __mutex_lock+0x365/0x1200 [ 373.120568] ? kernfs_add_one+0x36a/0x4c0 [ 373.124712] ? __lock_acquire+0x6de/0x3ff0 [ 373.128951] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 373.133874] ? __mutex_unlock_slowpath+0xea/0x610 [ 373.138701] ? kernfs_next_descendant_post+0x19c/0x290 [ 373.143987] ? kernfs_add_one+0x124/0x4c0 [ 373.148218] cache_grow_begin+0xa4/0x8a0 [ 373.152288] ? setup_fault_attr+0x200/0x200 [ 373.156603] ? lock_acquire+0x170/0x3c0 [ 373.160591] cache_alloc_refill+0x273/0x340 [ 373.165015] kmem_cache_alloc_trace+0x354/0x380 [ 373.169706] ? dev_uevent_filter+0xd0/0xd0 [ 373.174067] kobject_uevent_env+0x236/0x1480 [ 373.178499] lo_ioctl+0xff9/0x20e0 [ 373.182041] ? loop_set_status64+0x110/0x110 [ 373.186455] blkdev_ioctl+0x5cb/0x1a80 [ 373.190443] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 373.195806] ? blkpg_ioctl+0x9d0/0x9d0 [ 373.199928] ? mark_held_locks+0xf0/0xf0 [ 373.203975] ? mark_held_locks+0xf0/0xf0 [ 373.208041] ? debug_check_no_obj_freed+0x201/0x490 [ 373.213156] ? lock_downgrade+0x720/0x720 [ 373.217303] block_ioctl+0xe9/0x130 [ 373.220925] ? blkdev_fallocate+0x3f0/0x3f0 [ 373.225241] do_vfs_ioctl+0xcdb/0x12e0 [ 373.229185] ? lock_downgrade+0x720/0x720 [ 373.233323] ? check_preemption_disabled+0x41/0x280 [ 373.238339] ? ioctl_preallocate+0x200/0x200 [ 373.242813] ? __fget+0x356/0x510 [ 373.246278] ? do_dup2+0x450/0x450 [ 373.249812] ? do_sys_open+0x2bf/0x520 [ 373.253684] ksys_ioctl+0x9b/0xc0 [ 373.257142] __x64_sys_ioctl+0x6f/0xb0 [ 373.261025] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 373.265608] do_syscall_64+0xf9/0x620 [ 373.269420] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 373.274733] RIP: 0033:0x4663b7 [ 373.277912] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 373.297301] RSP: 002b:00007fbaf0827f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 01:59:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x600, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 373.305016] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 373.312282] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 373.319541] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 373.326807] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 373.334396] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 373.365730] audit: type=1804 audit(1630461579.664:216): pid=21814 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/212/bus" dev="sda1" ino=13921 res=1 01:59:39 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) getresgid(&(0x7f0000000140), &(0x7f0000000200)=0x0, &(0x7f0000000240)) chown(&(0x7f0000000080)='./bus\x00', r1, r2) chdir(&(0x7f0000000040)='./file0\x00') r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r3, 0x800) lseek(r3, 0x0, 0x2) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r5) preadv(r4, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r6 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000340)='./bus\x00', &(0x7f0000000380), 0x241400, &(0x7f00000003c0)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x7fffffff}}, {@max_read={'max_read', 0x3d, 0x9c9b}}, {@blksize={'blksize', 0x3d, 0xe00}}], [{@audit}]}}) open(&(0x7f00000000c0)='./file0\x00', 0x46801, 0x44) sendfile(r3, r6, 0x0, 0x8400fffffffa) 01:59:39 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x169, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 373.436814] audit: type=1804 audit(1630461579.704:217): pid=21815 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/212/bus" dev="sda1" ino=13921 res=1 01:59:39 executing program 5 (fault-call:0 fault-nth:21): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:39 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x500, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:39 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:39 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x16a, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 373.658096] FAULT_INJECTION: forcing a failure. [ 373.658096] name failslab, interval 1, probability 0, space 0, times 0 [ 373.674797] CPU: 0 PID: 21852 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 373.682700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 373.692134] Call Trace: [ 373.694718] dump_stack+0x1fc/0x2ef [ 373.698343] should_fail.cold+0xa/0xf [ 373.702138] ? setup_fault_attr+0x200/0x200 [ 373.706537] ? lock_acquire+0x170/0x3c0 [ 373.710596] __should_failslab+0x115/0x180 [ 373.714827] should_failslab+0x5/0x10 [ 373.718622] kmem_cache_alloc_node+0x245/0x3b0 [ 373.723205] __alloc_skb+0x71/0x560 [ 373.726868] alloc_uevent_skb+0x7b/0x210 [ 373.730926] kobject_uevent_env+0xa90/0x1480 [ 373.735345] lo_ioctl+0xff9/0x20e0 [ 373.738900] ? loop_set_status64+0x110/0x110 [ 373.743304] blkdev_ioctl+0x5cb/0x1a80 [ 373.747174] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 373.752516] ? blkpg_ioctl+0x9d0/0x9d0 [ 373.756397] ? mark_held_locks+0xf0/0xf0 [ 373.760458] ? mark_held_locks+0xf0/0xf0 [ 373.764919] ? debug_check_no_obj_freed+0x201/0x490 [ 373.769935] ? lock_downgrade+0x720/0x720 [ 373.774095] block_ioctl+0xe9/0x130 [ 373.777727] ? blkdev_fallocate+0x3f0/0x3f0 [ 373.782051] do_vfs_ioctl+0xcdb/0x12e0 [ 373.785945] ? lock_downgrade+0x720/0x720 [ 373.790096] ? check_preemption_disabled+0x41/0x280 [ 373.795132] ? ioctl_preallocate+0x200/0x200 [ 373.799559] ? __fget+0x356/0x510 [ 373.803011] ? do_dup2+0x450/0x450 [ 373.806535] ? do_sys_open+0x2bf/0x520 [ 373.810672] ksys_ioctl+0x9b/0xc0 [ 373.814111] __x64_sys_ioctl+0x6f/0xb0 [ 373.817994] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 373.822585] do_syscall_64+0xf9/0x620 [ 373.826476] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 373.831655] RIP: 0033:0x4663b7 [ 373.834830] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 01:59:40 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x700, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:40 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x16b, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 373.854148] RSP: 002b:00007fbaf0827f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 373.861857] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 373.869367] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 373.876631] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 373.884102] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 373.891478] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 01:59:40 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x16c, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:40 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000002580)=[{&(0x7f0000002600)="00040000100001bf5da6b0d255871386ffffff7f800000005a4d527fbe0a026a420d45c9d77b45606b4dcc3b4508f45c8e9ae5732421d714e4b723133bc84374a9ecc65fa5ea06253c041f03539a71c40b1516452d8789e5d571cb3bb0daf3932dde719466dd6b83c8c8e2ec1e8268fac11d50d7a1392cf949a0af05bb36b02ede84c859c4357853a21b4d7e09d8b448a9abc864fa30fa93eaea2ad9962679af8b89b72a22baa48014a1e6", 0xab, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}, {&(0x7f0000002480)="a59bbc907205906ce86ccecff3f22bfa407bda4e76831b2f2ebd7f71556acab9a52715d7eeff4b9262a62f0352cb9742bd6e97ec4bc8f70e1968d013670681cb2059403801769205d23231b4584927cbbfb61fffaa0cb8c6f1809d494711738f55db5627438faf113f8003033e0ce8907c3ea937f7b90257c95e4c94e80fc449b121419ee8608c68f40a4cc81f8cf0e8eef3513cfb518039b402682d0a3594cab4423458d21f74bce4a1cecb8e1e0db84b5e0d29f72c48fc5336964b8a5fecf39ca9b9316c08060a", 0xc8, 0x8}], 0x0, &(0x7f0000000200)=ANY=[]) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000780)={{{@in, @in6=@ipv4={""/10, ""/2, @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@private2}}, &(0x7f00000005c0)=0xe8) syz_mount_image$pvfs2(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x4, 0x9, &(0x7f0000000680)=[{&(0x7f0000000200)="51d9f3ad268e320288cbd3b67b485dbfacee45c3f68056d13ff86f1bc1e95f045d3fa3662b0021823f81733d461528f67beb2559011626a3f602118b7315d2699c2b2d1ab2a8f848c1bbac20ca9c5ac9fad17c215b9b8f91e90f4eaa56042d", 0x5f, 0x4}, {&(0x7f0000000140)="2aa1ba7acf25f9be2a7fe40615780a3c9e3c75961947cb37f588efc166fb4c16be536e601aca908db2c2fcdcc0", 0x2d, 0x6}, {&(0x7f0000000280)="a9743ee062a5c65edac55047a52ffba132780ffb5a0423ffdc213715d6b1a7190e6f56cf5384ebe6cfb74994fc856377b5e7425866d6ced510699f887e8de9f080ceb63eaf022b114d93", 0x4a, 0x9}, {&(0x7f0000000300)='<', 0x1, 0xa59}, {&(0x7f0000000340)="a894f0594bbfb0ede2382d8d37ab14e96182219048bf01fd3cde11d4071ac98caeefb87804f5e4b9a64af27c394ecd062c46e0c64d82c2cc28181b12687554c4e7db369cd2918769a3f1b003a904e8a76f4c0306787e21fe8e6dffa6de4929a876c296b51199f282226163", 0x6b, 0xa2dd}, {&(0x7f00000003c0)="d945f7391f8b8e7acd19cf7a41dffefb7e310ccb28813d199b3d6cd5b8552a33071397d37458f9e07a434192b03bcae493852e904a7cdad4444c8582c3a7c4215a0f2c4182ae1c1c02988e67580a47d13b02aeddf742dfb27b69d53784e97848150b6b2ddf76069834b627c95f05c609933100d169ddc05a42828f804ff8830714c8112fd9c8f073c7c1d489fe5969cfb62480e9f0fadd392455d1e86040e6d3d26d89ed012003b6f3e760e4ab49ef21124ea7eaabee8a00c7170e999ae0cfef80b636d2755d330dabf4544e6de128a5cf4144d601c660a0a1ec32cdf16d", 0xde, 0xeb8}, {&(0x7f00000004c0)="c0ae22248c66862f6d735ddf47f35304d85caaff8d696b8de14f41cf50a99c77e826812a51c0385bc738495479c3f2ba7aee9b0efbb41c4511a62887b74ddb3e2fc1e162d7cae09e49d97c34fea272ac89728c024d5d5c9481ed4e2961c79d3570d3dd6f9212511b26872148d403b7624a2d3949e1272f418f658292e40cbaeaee1aa64acd9d3144800b945aef467253aff30a962a7ad0579646f3fcae2a016e5f682981caf96cc2e7766dd78db38e41bb6df1", 0xb3, 0x3}, {&(0x7f0000000580)="29a4e9cd1b154efb0778026eb03da326", 0x10, 0x1}, {&(0x7f00000011c0)="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", 0x1000, 0x3}], 0x400, &(0x7f0000000880)={[{'minix\x00'}, {'minix\x00'}, {}], [{@dont_hash}, {@smackfsroot}, {@obj_role}, {@subj_type}, {@fowner_gt={'fowner>', r0}}, {@smackfsfloor}]}) chdir(&(0x7f0000000040)='./file0\x00') r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) execve(&(0x7f0000000600)='./file0\x00', &(0x7f00000009c0)=[&(0x7f0000000900)=',\x00', &(0x7f0000000940)='dont_hash', &(0x7f0000000980)='pvfs2\x00'], &(0x7f00000022c0)=[&(0x7f00000021c0)='minix\x00', &(0x7f0000002200)='dont_hash', &(0x7f0000002240)=')}\x00', &(0x7f0000002280)='+\xe2)*\x00']) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f00000002c0)=[@in={0x2, 0x0, @broadcast}]}, &(0x7f00000001c0)=0x10) socket$inet(0x2, 0x3, 0x88) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000002340)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x74, &(0x7f0000000500)={r4, 0x0, 0x30}, &(0x7f0000000540)=0x18) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000002380)={0x0, 0x4, 0x3f, 0x23, 0x5, 0x7f, 0x100, 0x6, {r4, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0xc0000, 0xe1, 0x20, 0x101, 0x3}}, &(0x7f0000002440)=0xb0) r5 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r1, r5, 0x0, 0x8400fffffffa) 01:59:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x600, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:40 executing program 5 (fault-call:0 fault-nth:22): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:40 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x16d, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 374.124361] FAULT_INJECTION: forcing a failure. [ 374.124361] name failslab, interval 1, probability 0, space 0, times 0 [ 374.139467] CPU: 1 PID: 21886 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 374.147534] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 374.156887] Call Trace: [ 374.159461] dump_stack+0x1fc/0x2ef [ 374.163190] should_fail.cold+0xa/0xf [ 374.166991] ? setup_fault_attr+0x200/0x200 [ 374.171310] ? lock_acquire+0x170/0x3c0 [ 374.175509] __should_failslab+0x115/0x180 [ 374.179824] should_failslab+0x5/0x10 [ 374.183625] kmem_cache_alloc+0x277/0x370 [ 374.187764] skb_clone+0x151/0x3d0 [ 374.191305] netlink_broadcast_filtered+0x8e5/0xbc0 [ 374.196661] netlink_broadcast+0x35/0x40 [ 374.200804] kobject_uevent_env+0xa56/0x1480 [ 374.205383] lo_ioctl+0xff9/0x20e0 [ 374.208920] ? loop_set_status64+0x110/0x110 [ 374.213317] blkdev_ioctl+0x5cb/0x1a80 [ 374.217568] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 374.222940] ? blkpg_ioctl+0x9d0/0x9d0 [ 374.226833] ? mark_held_locks+0xf0/0xf0 [ 374.230982] ? mark_held_locks+0xf0/0xf0 [ 374.235130] ? debug_check_no_obj_freed+0x201/0x490 [ 374.240221] ? lock_downgrade+0x720/0x720 [ 374.244366] block_ioctl+0xe9/0x130 [ 374.247994] ? blkdev_fallocate+0x3f0/0x3f0 [ 374.252308] do_vfs_ioctl+0xcdb/0x12e0 [ 374.256183] ? lock_downgrade+0x720/0x720 [ 374.260313] ? check_preemption_disabled+0x41/0x280 [ 374.265317] ? ioctl_preallocate+0x200/0x200 [ 374.269719] ? __fget+0x356/0x510 [ 374.273382] ? do_dup2+0x450/0x450 [ 374.277627] ? do_sys_open+0x2bf/0x520 [ 374.281606] ksys_ioctl+0x9b/0xc0 [ 374.285065] __x64_sys_ioctl+0x6f/0xb0 [ 374.289097] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 374.293676] do_syscall_64+0xf9/0x620 [ 374.297669] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 374.302940] RIP: 0033:0x4663b7 01:59:40 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x16e, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 374.306135] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 374.325726] RSP: 002b:00007fbaf0827f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 374.333947] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 374.341212] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 374.348466] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 374.355714] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 374.363163] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 01:59:40 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x900, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 374.407950] audit: type=1804 audit(1630461580.704:218): pid=21901 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/214/bus" dev="sda1" ino=15089 res=1 01:59:40 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x16f, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:40 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:40 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x700, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:40 executing program 5 (fault-call:0 fault-nth:23): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:40 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x170, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 374.811169] FAULT_INJECTION: forcing a failure. [ 374.811169] name failslab, interval 1, probability 0, space 0, times 0 [ 374.840158] CPU: 1 PID: 21940 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 374.848244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 374.857689] Call Trace: [ 374.860280] dump_stack+0x1fc/0x2ef [ 374.863914] should_fail.cold+0xa/0xf [ 374.867726] ? setup_fault_attr+0x200/0x200 [ 374.872143] ? lock_acquire+0x170/0x3c0 [ 374.876365] __should_failslab+0x115/0x180 [ 374.880705] should_failslab+0x5/0x10 [ 374.884957] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 374.890243] __kmalloc_node_track_caller+0x38/0x70 [ 374.895354] __alloc_skb+0xae/0x560 [ 374.898990] alloc_uevent_skb+0x7b/0x210 [ 374.903047] kobject_uevent_env+0xa90/0x1480 [ 374.907475] lo_ioctl+0xff9/0x20e0 [ 374.911019] ? loop_set_status64+0x110/0x110 [ 374.915434] blkdev_ioctl+0x5cb/0x1a80 [ 374.919330] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 374.924717] ? blkpg_ioctl+0x9d0/0x9d0 [ 374.928692] ? mark_held_locks+0xf0/0xf0 [ 374.932760] ? mark_held_locks+0xf0/0xf0 [ 374.937259] ? debug_check_no_obj_freed+0x201/0x490 [ 374.942294] ? lock_downgrade+0x720/0x720 [ 374.946439] block_ioctl+0xe9/0x130 [ 374.950091] ? blkdev_fallocate+0x3f0/0x3f0 [ 374.954647] do_vfs_ioctl+0xcdb/0x12e0 [ 374.958552] ? lock_downgrade+0x720/0x720 [ 374.962721] ? check_preemption_disabled+0x41/0x280 [ 374.968130] ? ioctl_preallocate+0x200/0x200 [ 374.972558] ? __fget+0x356/0x510 [ 374.976233] ? do_dup2+0x450/0x450 [ 374.979782] ? do_sys_open+0x2bf/0x520 [ 374.983681] ksys_ioctl+0x9b/0xc0 [ 374.987288] __x64_sys_ioctl+0x6f/0xb0 [ 374.991243] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 374.995859] do_syscall_64+0xf9/0x620 [ 374.999676] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 375.004876] RIP: 0033:0x4663b7 [ 375.008070] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 375.027124] RSP: 002b:00007fbaf0827f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 375.034996] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 375.042662] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 375.050485] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 375.058248] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 375.066112] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 [ 375.239286] MINIX-fs: bad superblock or unable to read bitmaps 01:59:41 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x171, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:41 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:41 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:41 executing program 5 (fault-call:0 fault-nth:24): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:41 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1f00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:41 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000280)='./file0\x00', 0x140) ftruncate(r0, 0x800) getxattr(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)=@random={'osx.', '&@\x00'}, &(0x7f0000000200)=""/81, 0x51) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r2 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) [ 375.268592] audit: type=1804 audit(1630461581.564:219): pid=21956 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/214/bus" dev="sda1" ino=15089 res=1 [ 375.309551] audit: type=1804 audit(1630461581.604:220): pid=21901 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/214/bus" dev="sda1" ino=15089 res=1 01:59:41 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x172, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 375.416678] FAULT_INJECTION: forcing a failure. [ 375.416678] name failslab, interval 1, probability 0, space 0, times 0 [ 375.428767] CPU: 0 PID: 21969 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 375.436811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 375.446171] Call Trace: [ 375.448937] dump_stack+0x1fc/0x2ef [ 375.452657] should_fail.cold+0xa/0xf [ 375.456478] ? setup_fault_attr+0x200/0x200 [ 375.460838] ? lock_acquire+0x170/0x3c0 [ 375.464805] __should_failslab+0x115/0x180 [ 375.469040] should_failslab+0x5/0x10 [ 375.472851] kmem_cache_alloc+0x277/0x370 [ 375.477001] skb_clone+0x151/0x3d0 [ 375.480563] netlink_broadcast_filtered+0x8e5/0xbc0 [ 375.485727] netlink_broadcast+0x35/0x40 [ 375.489918] kobject_uevent_env+0xa56/0x1480 [ 375.494340] lo_ioctl+0xff9/0x20e0 [ 375.497894] ? loop_set_status64+0x110/0x110 [ 375.502313] blkdev_ioctl+0x5cb/0x1a80 [ 375.506212] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 375.511571] ? blkpg_ioctl+0x9d0/0x9d0 [ 375.515473] ? mark_held_locks+0xf0/0xf0 [ 375.519555] ? mark_held_locks+0xf0/0xf0 [ 375.523731] ? debug_check_no_obj_freed+0x201/0x490 [ 375.528767] ? lock_downgrade+0x720/0x720 [ 375.533089] block_ioctl+0xe9/0x130 [ 375.536711] ? blkdev_fallocate+0x3f0/0x3f0 [ 375.541113] do_vfs_ioctl+0xcdb/0x12e0 [ 375.545021] ? lock_downgrade+0x720/0x720 [ 375.549297] ? check_preemption_disabled+0x41/0x280 [ 375.554354] ? ioctl_preallocate+0x200/0x200 [ 375.559054] ? __fget+0x356/0x510 [ 375.562733] ? do_dup2+0x450/0x450 [ 375.566482] ? do_sys_open+0x2bf/0x520 [ 375.570585] ksys_ioctl+0x9b/0xc0 [ 375.574152] __x64_sys_ioctl+0x6f/0xb0 [ 375.578049] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 375.582628] do_syscall_64+0xf9/0x620 [ 375.586541] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 375.591727] RIP: 0033:0x4663b7 [ 375.594906] Code: 3c 1c 48 f7 d8 49 39 c4 72 b8 e8 a4 48 02 00 85 c0 78 bd 48 83 c4 08 4c 89 e0 5b 41 5c c3 0f 1f 44 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 375.614436] RSP: 002b:00007fbaf0827f48 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 375.622131] RAX: ffffffffffffffda RBX: 00000000004afcc0 RCX: 00000000004663b7 [ 375.629387] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 375.636647] RBP: 0000000000000005 R08: 0000000000000000 R09: ffffffffffffffff [ 375.644012] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 375.651668] R13: 0000000000000004 R14: 0000000020000218 R15: 0000000000000001 01:59:42 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:42 executing program 5 (fault-call:0 fault-nth:25): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:42 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x173, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:42 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:42 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2300, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:42 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000240), r1) sendmsg$DEVLINK_CMD_TRAP_SET(r2, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)=ANY=[@ANYBLOB="dc000000", @ANYRES16=r3, @ANYBLOB="100025bd7000fbdbdf253e000000080001007063690011000200303030303a8200736f757263655f6d61635f69735f6d756c7469636173740005008300000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000001c008200736f757263655f6d61635f69735f6d756c7469636173740005008300000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000001c008200736f757263755f6d61635f69735f6d756c746963617374000500830001000000e948f087146a88d252a12ec5e2e59dba407d9d09dc3f29417d4542988600"/243], 0xdc}, 0x1, 0x0, 0x0, 0x80c1}, 0x4048010) preadv(r1, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r4 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r0, r4, 0x0, 0x8400fffffffa) r5 = accept$nfc_llcp(r4, &(0x7f0000000080), &(0x7f0000000140)=0x60) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r5, 0x942e, 0x0) 01:59:42 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x174, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 375.943479] FAULT_INJECTION: forcing a failure. [ 375.943479] name failslab, interval 1, probability 0, space 0, times 0 [ 375.962995] CPU: 1 PID: 22007 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 375.970910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 375.980270] Call Trace: [ 375.982885] dump_stack+0x1fc/0x2ef [ 375.986528] should_fail.cold+0xa/0xf [ 375.990463] ? setup_fault_attr+0x200/0x200 [ 375.994882] ? lock_acquire+0x170/0x3c0 [ 375.999283] __should_failslab+0x115/0x180 [ 376.003529] should_failslab+0x5/0x10 [ 376.007337] kmem_cache_alloc+0x277/0x370 [ 376.011504] getname_flags+0xce/0x590 [ 376.015320] do_mkdirat+0x8d/0x2d0 [ 376.018871] ? __ia32_sys_mknod+0x120/0x120 [ 376.023209] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 376.028585] ? trace_hardirqs_off_caller+0x6e/0x210 [ 376.033616] ? do_syscall_64+0x21/0x620 [ 376.037679] do_syscall_64+0xf9/0x620 [ 376.041506] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 376.046797] RIP: 0033:0x465707 [ 376.050011] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 376.069116] RSP: 002b:00007fbaf0827fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 376.076947] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465707 [ 376.084232] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 01:59:42 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x175, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 376.091610] RBP: 00007fbaf0828040 R08: 0000000000000000 R09: ffffffffffffffff [ 376.098891] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 376.106191] R13: 0000000020000100 R14: 00007fbaf0828000 R15: 0000000020001080 [ 376.113937] audit: type=1804 audit(1630461582.254:221): pid=22020 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/216/file0/bus" dev="loop1" ino=1 res=1 01:59:42 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xedc0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:42 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000003400)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$vxfs(&(0x7f00000002c0), &(0x7f00000005c0)='./file0\x00', 0xc000000000000000, 0x1, &(0x7f0000000600)=[{&(0x7f0000003200)="963aa2c6b0d3914f9b6e3042b8dc1fe01541e414d3b3fc6cfc9adc40223e371309861750a65e69e56dd320eda86331da7b704a32f8d8f7e8d7043d29ca7885d9cb387618f16f5f6e6456162be75db189ec2a9677fe7bc5b9a278230e4dd6fed418dde1a8e825e88ef80290610983e4bbc8a1", 0x72, 0x3}], 0x4, &(0x7f0000003480)={[{',-}'}, {'&%)}'}, {'\\)--]({'}, {'MAY_READ'}, {'('}, {'.'}, {'rootcontext'}], [{@obj_role={'obj_role', 0x3d, ')\xc8\xc3\xb3\xe6\xde\x95\x9b7nqU?!k\x88)\xf8:i\xb7\xc2\x8f;9\xe7\xdb\v\v\xd2\x97\xf4J\x0eG\x81=\xbe\t\xde\x97\xe9\x05g\xc9\x87\\\b\x94\x17\xe1\xca\xdd\x95\xbcY\xe0S s\xe0\xc9,\xc2\xa3/\xf2\x11n\x94\t\xcf\xdaR\xe7u$&6\xda\xbf\xb0X\xf6\xa4\xd2\xe2\xb5y_\t\"d\xcf\x7fb\xee\x02+b}\x87#8\xe3\x8d\xf5\xa9\xb0\xf88\x94\xc2\x82\xfa\bo*\xdd\x84\n\x96\x87c\x82\xdd\xd5gA\xa7\x02\xde\xd9jd\xdeb\xb8&B\x94\xc9?\xbe\x81tx0x0}, 0x2020) r5 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) syz_mount_image$qnx4(&(0x7f00000000c0), &(0x7f0000000140)='./bus\x00', 0x0, 0xa, &(0x7f00000008c0)=[{&(0x7f0000000200)="83926042b7b231a9c9064b398b3325e8f98ead2216c5788d99f392a581d4e40bbaabe1cf38c4bf1f4e1619be964234b1903a36fda9699a01c24cb9f1f7771a96a7eaf19181ac0646c31da25798b7e151704b1c2cfd15e21642b4f7e1a957c57c817e6d8911bdd7c430120f931f39600b0f3e2010c662bd25014857a5b4faec322ce6e448db78983d2f90d9bdaa594c733d73", 0x92, 0x5}, {&(0x7f00000002c0), 0x0, 0x7}, {&(0x7f0000000300)="134e4e284111afc5ba969214f91e4f1b77d3e19f430e8d70c5824011b1444486743c763f97946b32867cfd360967637cd5d3fb66c2be94585fdbf2f5d5fd5f4522ed615ffd9211154d605dfa069fc35521cbc36482fcbd3a3ca8d31bb881fe79ee34f5634eed0e3cc4c1cef98b85300a22088c3938a357fcbd1adb4134748799b2e42d0910be4b6c20816d0a896549c3fcd1e8321a2ffaeeb2dd8ffe5547335be82e524e46a929222b98bf5c1d14aacb15ac0cd9d41cf49624eecaa5c044e891df9f8d6e57", 0xc5, 0x5}, {&(0x7f0000000400)="b1dca28e1add29a72a0c5938e0f998ddc54b70a0b08fa76bda859bc26d2e7e5303a9ec5f66f6477f851e2301692ca0fe79fc40fe344817a27cbac5d38981e60e4c82ef8002fb96016d77885e3a9c1bf4e7804400e5a5b2cf3a18a03a98d7de1a9973c78f4cb945a5a9da13d5ee0ff126074af0340e75996ba67fb4724d814fe428974114727bf15c494582992ab8e9304ca8ce883807687d", 0x98, 0x9}, {&(0x7f00000004c0)="1599fec496000880a5a70c16caf5d8f624f3fc0f5004bc9788e517bbf875ae19c7f58f1811b42c5cd9e23e9fa71ac617508e529efa49088c49c54e3024d2fecba8093e7a5249499d3e1a707f2c93936bbd6c3ea72e5e76eec48b05c6be9c6f2755d9e62de21f8cc2a333d01ded9d6c536b6d95e85c3afcad616bea2ca84ffab72e1ff9fd01dbe68d50d575865d0e262076cb1e4094495887c92b8b64e61e0c8438b65a4db049507415b85ed0078780628f6512fe71fe7084a7be443bb971492f3b2e488c543f06b67932f83da283f07c93", 0xd1, 0xd0c}, {&(0x7f00000005c0), 0x0, 0x1}, {&(0x7f0000000680)="53bd2da85cf1d64c95262087087ca814ac5c5462c1a4326ef80a3d30bdcde24f9bc3455c19a6ac8c32705f49578d8259dd8439d376471739133e9d47f20eff8c5779e424002259467a6f1bd367a3efc554d43afe158b596bf353ec0878c01eef51a7bfc50d6d0e4583886dcda519842a07b869873fadec2c28ac43ed618cf7", 0x7f, 0x200}, {&(0x7f0000000700)="e30284d877b15cc96180dfc64d96d2627f3d3e6e0b76dcd0b659e42e232ec89165d8df85def80c765355e5302d34d3fafe98b2f5cd833d8b75e9554056315be6202188d4e8b2457d9fec2d50d7bfcca50b08aab67119136c08a0184e2718afb4187d1bb20927f5", 0x67, 0x3}, {&(0x7f0000000780)="91ffcdbaabd00244803c01e50ce9bdb0873f4042826f06c64698c052f176bfff6d901268b0a16e16c82b042c5f50f9c212aaf75644d94bb1b462949ca9eb0fe9e0c42d6d0936277126f6206dd1f2181cf0f24de82dac381816497c8b875abd6cc8d9faedbd9d224ccc86066847b6ef72d59e", 0x72, 0x101}, {&(0x7f0000000800)="dadfc62e8a120edf499fe99fbab282ee9eb87107e455f843f3a11be48680f352ed4d86ce72953e22db7733f23fa6ebe172340c2227781001265704855b052e6eb0a3edbb6cf416c18aabdd5087024bf1a59e2fce6c4f437a2b2c46618bef7b32a448cc2e1abd61addfbef8fc3e8b2baa810cb9127bf39cc3f9a61609dc87a95465db15fb88849ae0c0cc166a3847ee83a0c42271374706852bc9d1f0780f9e7d952f647087dc12a326618ff43f7ca0e5719c42ebd4b7cb611af03104fe7c", 0xbe, 0xfffffffffffffff8}], 0x0, &(0x7f0000003280)={[{')\xc8\xc3\xb3\xe6\xde\x95\x9b7nqU?!k\x88)\xf8:i\xb7\xc2\x8f;9\xe7\xdb\v\v\xd2\x97\xf4J\x0eG\x81=\xbe\t\xde\x97\xe9\x05g\xc9\x87\\\b\x94\x17\xe1\xca\xdd\x95\xbcY\xe0S s\xe0\xc9,\xc2\xa3/\xf2\x11n\x94\t\xcf\xdaR\xe7u$&6\xda\xbf\xb0X\xf6\xa4\xd2\xe2\xb5y_\t\"d\xcf\x7fb\xee\x02+b}\x87#8\xe3\x8d\xf5\xa9\xb0\xf88\x94\xc2\x82\xfa\bo*\xdd\x84\n\x96\x87c\x82\xdd\xd5gA\xa7\x02\xde\xd9jd\xdeb\xb8&B\x94\xc9?\xbe\x81tx 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 376.658870] RSP: 002b:00007fbaf0827fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 376.666585] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465707 [ 376.673860] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 376.681154] RBP: 00007fbaf0828040 R08: 0000000000000000 R09: ffffffffffffffff [ 376.688564] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 376.695212] audit: type=1804 audit(1630461582.784:223): pid=22068 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/217/file0/bus" dev="sda1" ino=14680 res=1 [ 376.695833] R13: 0000000020000100 R14: 00007fbaf0828000 R15: 0000000020001080 [ 376.784432] audit: type=1804 audit(1630461583.074:224): pid=22092 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/217/file0/bus" dev="sda1" ino=14680 res=1 01:59:43 executing program 1: syz_mount_image$minix(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r2 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) 01:59:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xeffdffff, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:43 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:43 executing program 5 (fault-call:0 fault-nth:27): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:43 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x17b, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:43 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:43 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x17c, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 376.995981] FAULT_INJECTION: forcing a failure. [ 376.995981] name failslab, interval 1, probability 0, space 0, times 0 [ 377.008059] CPU: 0 PID: 22104 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 377.016145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 377.025498] Call Trace: [ 377.028099] dump_stack+0x1fc/0x2ef [ 377.031739] should_fail.cold+0xa/0xf [ 377.035676] ? setup_fault_attr+0x200/0x200 [ 377.040073] ? lock_acquire+0x170/0x3c0 [ 377.044044] __should_failslab+0x115/0x180 [ 377.048376] should_failslab+0x5/0x10 [ 377.052180] kmem_cache_alloc+0x277/0x370 [ 377.056335] __d_alloc+0x2b/0xa10 [ 377.059918] d_alloc+0x4a/0x230 [ 377.063207] __lookup_hash+0xc8/0x180 [ 377.067005] filename_create+0x186/0x490 [ 377.071191] ? kern_path_mountpoint+0x40/0x40 [ 377.075755] ? strncpy_from_user+0x2a2/0x350 [ 377.080678] ? getname_flags+0x25b/0x590 [ 377.084858] do_mkdirat+0xa0/0x2d0 [ 377.088673] ? __ia32_sys_mknod+0x120/0x120 [ 377.093347] ? trace_hardirqs_off_caller+0x6e/0x210 [ 377.098362] ? do_syscall_64+0x21/0x620 [ 377.102668] do_syscall_64+0xf9/0x620 [ 377.106601] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 377.111796] RIP: 0033:0x465707 [ 377.114971] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 377.134171] RSP: 002b:00007fbaf0827fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 377.141951] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465707 [ 377.149220] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 377.156503] RBP: 00007fbaf0828040 R08: 0000000000000000 R09: ffffffffffffffff [ 377.163977] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 377.171290] R13: 0000000020000100 R14: 00007fbaf0828000 R15: 0000000020001080 01:59:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:43 executing program 5 (fault-call:0 fault-nth:28): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:43 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x17d, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 377.354095] audit: type=1804 audit(1630461583.644:225): pid=22122 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/218/file0/bus" dev="loop1" ino=1 res=1 01:59:43 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfcfdffff, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:43 executing program 1: r0 = syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) getdents(r0, &(0x7f0000000080)=""/15, 0xf) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r3 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x8400fffffffa) [ 377.411965] audit: type=1804 audit(1630461583.704:226): pid=22143 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/218/file0/bus" dev="loop1" ino=1 res=1 [ 377.437928] FAULT_INJECTION: forcing a failure. [ 377.437928] name failslab, interval 1, probability 0, space 0, times 0 01:59:43 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x17e, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:43 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4800, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 377.490547] CPU: 1 PID: 22139 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 377.499396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 377.509188] Call Trace: [ 377.511790] dump_stack+0x1fc/0x2ef [ 377.515448] should_fail.cold+0xa/0xf [ 377.519276] ? setup_fault_attr+0x200/0x200 [ 377.524101] __should_failslab+0x115/0x180 [ 377.528953] should_failslab+0x5/0x10 [ 377.533007] kmem_cache_alloc+0x277/0x370 [ 377.537158] ? ext4_sync_fs+0x8d0/0x8d0 [ 377.541389] ext4_alloc_inode+0x1a/0x630 [ 377.545771] ? ext4_sync_fs+0x8d0/0x8d0 [ 377.549824] alloc_inode+0x5d/0x180 [ 377.553457] new_inode+0x1d/0xf0 [ 377.557020] __ext4_new_inode+0x400/0x5a20 [ 377.561256] ? putname+0xe1/0x120 [ 377.564691] ? do_mkdirat+0xa0/0x2d0 [ 377.568791] ? ext4_free_inode+0x1780/0x1780 [ 377.573530] ? debug_check_no_obj_freed+0x201/0x490 [ 377.578885] ? __dquot_initialize+0x298/0xb70 [ 377.583529] ? lock_acquire+0x170/0x3c0 [ 377.587577] ? dquot_initialize_needed+0x290/0x290 [ 377.593222] ? trace_hardirqs_off+0x64/0x200 [ 377.597631] ? common_perm+0x4be/0x800 [ 377.601549] ext4_mkdir+0x396/0xe10 [ 377.605181] ? putname+0xe1/0x120 [ 377.609161] ? ext4_init_dot_dotdot+0x600/0x600 [ 377.614091] ? generic_permission+0x116/0x4d0 [ 377.618575] ? security_inode_permission+0xc5/0xf0 [ 377.623579] ? inode_permission.part.0+0x10c/0x450 [ 377.628565] vfs_mkdir+0x508/0x7a0 [ 377.632088] do_mkdirat+0x262/0x2d0 [ 377.635971] ? __ia32_sys_mknod+0x120/0x120 [ 377.640388] ? trace_hardirqs_off_caller+0x6e/0x210 [ 377.645486] ? do_syscall_64+0x21/0x620 [ 377.649548] do_syscall_64+0xf9/0x620 [ 377.653367] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 377.658544] RIP: 0033:0x465707 [ 377.662169] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 377.681083] RSP: 002b:00007fbaf0827fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 377.688894] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465707 [ 377.696651] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 377.704098] RBP: 00007fbaf0828040 R08: 0000000000000000 R09: ffffffffffffffff [ 377.711458] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 377.718948] R13: 0000000020000100 R14: 00007fbaf0828000 R15: 0000000020001080 01:59:44 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x17f, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x100000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfdfdffff, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:44 executing program 5 (fault-call:0 fault-nth:29): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:44 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x180, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 378.010487] audit: type=1804 audit(1630461584.304:227): pid=22170 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/219/file0/bus" dev="loop1" ino=1 res=1 01:59:44 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x110, r1, 0x8193000) symlink(&(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='./file0\x00') preadv(r1, &(0x7f0000000280), 0x2b, 0xda1, 0x0) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000200)=""/205, 0xcd}, {&(0x7f0000000300)=""/80, 0x50}], 0x2, 0xfff, 0x4) r2 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) 01:59:44 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4c00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfeffffff, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:44 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x181, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 378.125507] FAULT_INJECTION: forcing a failure. [ 378.125507] name failslab, interval 1, probability 0, space 0, times 0 [ 378.145615] CPU: 1 PID: 22191 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 378.153816] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 378.163328] Call Trace: [ 378.166084] dump_stack+0x1fc/0x2ef [ 378.169743] should_fail.cold+0xa/0xf [ 378.173569] ? setup_fault_attr+0x200/0x200 [ 378.178021] __should_failslab+0x115/0x180 [ 378.182268] should_failslab+0x5/0x10 [ 378.186086] kmem_cache_alloc+0x277/0x370 [ 378.190319] ? ext4_sync_fs+0x8d0/0x8d0 [ 378.194288] ext4_alloc_inode+0x1a/0x630 [ 378.198500] ? ext4_sync_fs+0x8d0/0x8d0 [ 378.202522] alloc_inode+0x5d/0x180 [ 378.206141] new_inode+0x1d/0xf0 [ 378.209748] __ext4_new_inode+0x400/0x5a20 [ 378.214213] ? putname+0xe1/0x120 [ 378.217825] ? do_mkdirat+0xa0/0x2d0 [ 378.221703] ? ext4_free_inode+0x1780/0x1780 [ 378.226507] ? debug_check_no_obj_freed+0x201/0x490 [ 378.231512] ? __dquot_initialize+0x298/0xb70 [ 378.236008] ? lock_acquire+0x170/0x3c0 [ 378.240072] ? dquot_initialize_needed+0x290/0x290 [ 378.245018] ? trace_hardirqs_off+0x64/0x200 [ 378.249444] ? common_perm+0x4be/0x800 [ 378.253436] ext4_mkdir+0x396/0xe10 [ 378.257056] ? putname+0xe1/0x120 [ 378.260510] ? ext4_init_dot_dotdot+0x600/0x600 [ 378.265175] ? generic_permission+0x116/0x4d0 [ 378.269659] ? security_inode_permission+0xc5/0xf0 [ 378.274646] ? inode_permission.part.0+0x10c/0x450 [ 378.279706] vfs_mkdir+0x508/0x7a0 [ 378.283505] do_mkdirat+0x262/0x2d0 [ 378.287126] ? __ia32_sys_mknod+0x120/0x120 [ 378.291443] ? trace_hardirqs_off_caller+0x6e/0x210 [ 378.296911] ? do_syscall_64+0x21/0x620 [ 378.300926] do_syscall_64+0xf9/0x620 [ 378.304724] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 378.309999] RIP: 0033:0x465707 [ 378.313194] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 378.332325] RSP: 002b:00007fbaf0827fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 378.340188] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465707 [ 378.347567] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 378.354918] RBP: 00007fbaf0828040 R08: 0000000000000000 R09: ffffffffffffffff [ 378.362292] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 378.369790] R13: 0000000020000100 R14: 00007fbaf0828000 R15: 0000000020001080 01:59:44 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x182, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:44 executing program 5 (fault-call:0 fault-nth:30): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1fffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:44 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x183, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:44 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffdef, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:45 executing program 1: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000003c40)) syz_mount_image$minix(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x40, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="7b9a358706077c58f7b717dacc114ce80477e399c71ef60ba668964ac79df623dca7cc42118685160e4f78e8b170e12086d8"]) chdir(&(0x7f0000000040)='./file0\x00') r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCINQ(r2, 0x541b, &(0x7f0000003c40)) sendmmsg(r2, &(0x7f0000002b40)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000100)="618dc082fd621a5b75aa34dfea38bdcc4a3d05c7ed5c66830a7d00183a30d7ab83a3baeaafb1840f61794b9a1925d9f68d5d49a232f105924f4d938599366d553c731861cf3ba6f9b9d3004fe0c3cdab365487fb9b6602f76ad42fcae2e889ba27514aa989d7e9d769cccc47705016bb97fc175df65b610b27619c94cdc755a7d138733e89b7bb27067be27b9b861d6c2890e9e788e24bc5a8e73b879271d83fec33", 0xa2}, {&(0x7f00000001c0)="b03fd498319697a96dbc6a68b29af6ead6edb43e57b3a121cc550d57bb25b37f0f8eed8256001deae59c6cb37bef5ea56583753a26fcd8524a87a0278c20fda565297bfcb764332ffb", 0x49}, {&(0x7f0000000240)="9b7445565cf71073c6234693d98c258cbc61e948c1d2543b130139537bbb9d", 0x1f}], 0x3}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000002c0)="20b253c8380a2b95eea06d0a1fb8feefbf6e579b29b3493fb180e676853201b65d25b9857676625d599d5396f0", 0x2d}, {&(0x7f0000000300)="16f5182916ce7b29a2b5d3009a623ce909c6dd6392c541b38efd7d02b7", 0x1d}, {&(0x7f0000000340)}, {&(0x7f0000000380)="3e01b8ead233658b1d1c7639aac993b69aeb0fcd9deefb63c24525757f8d40a8cc234850b83d4ba148e0b5ef4bd026aa57df5b13393e075e59fc74c28b228c6d65a96fa07d6db199988ed8599eb935712269bf28faa5015c43adac631dbb41ebd3c9ce7556d1e8fca43a05461aafdfeeff9dc2161cf4fa1fda6716d03466614dab109593c48d4af4afa471ab7cdc3d689d381fdfd2804564253cf463f609e358cb01ccc34c8d1dcc8ef9", 0xaa}], 0x4, &(0x7f0000000680)=[{0xc0, 0x11, 0x6, "efcb94f0abdbc15f7a5f816aa9ec6b4480cb50448304075a684c8d57e19746168ac79ee4ee402a0ff42f0bddf6129085f3c47b57ff4be45dd4cb361e8b307655fdfd7c985eb3fbbd4dca830efecc0344f013c9c7564aefc37831909556d71f76cdcefb480c43df51b311e8c42a4b4405f4362a08cfdbd42e665ab6a5f4b16403171c5ce905a427f938a228bf70928f59f46276b9f6f7bc384892f85ba5bffc422165c131078601b992bad5e492a2"}, {0x1010, 0x6, 0x10b, "27095b3b2ef2c16e202bc16a9a23df824584e406634a6195dc4d9dd53e826dd3b1c1c9eef954b180150dd40046a6db4a3a33e05a1012e118346097faedcd21d1a34842800e08dd049e8d13a41bf9f65be8825eb453544e092bd1d89ab1c4e72192350d68eae6f4cc403a693b8a64e3af767d0b8b6de6bfaf57b56371a3cebc3069b2747aceb497cf92134c1eb05087d403a2a569ba332a9c4ab17c33c8786072af6cd622fcee028835aee61976c17142163c4ea5a9cf85586ec5c955c7166e42627ee135bf5b5440fee804eafde284595bc7b2fe65540565afe307b9bf7956b7bcee9546bd38ad44a8a035bdf132642cc031dd18b95a108bc4be20edc96057c4dff5645edeaf889cafecea01c8f0496169c8523cf11d3d9295ca83a0c6ae5d1d8aa4dee07a25d584224ab34745de00da854a5957c652f36bb6862f3dbf6fa1814c97768e07742f9d59203460c86223f2b9a0ed7d8555238de38d8cb0673116eb56075dc5cb2489b56b787de92f4589756c86e5b1da9662d10aa9d8a25a6a3663f5daa34880d0dcc892b080643d661a494d36416dc9e4d0cee21a446178a0858e435a5094344f24d6780b11f69349e2095e1ab157ee4d32868d3c084f65041852d95d53d86c48b3739998d4be85d2f46455f204d5fa3bb2538be245d9b63300108ad11daffbe2ec6419aaa0558442885583bf32855a86ff038f9864aeef82c8ba04e0a7aae7b4a31dcfa30fd4feb125820f24fb599409b75878841b505c7f963d12cdcb6a594d074236bcc4bb43ee6dceb01afdd342f1dfcc7bdf82fcd93d39a59a818d7bbd8884fbf1b73fc2f7955333236451b09715e373ba37a0d4f1ec804afc15db1b6f46c344b9a4f727d446b45b703a0ec1102cb96503094ebb6c9d193b363575de068c1677dfdea91f4835b57197d534b35a61e8112829aa6e325f38be9290b64f76a6e86e5bf6bf5f5b6ffb6e11a10fa4e983594fa851a6c2bb7a6b753f6c829b3de31973c1f77893b348b48fd0e5e8c0be2bf70a29fc0a778c42025d17c96cd289910a4467d800f62a3e0704b22f3bd7e3267f371696de69cde4b437c25ae22f735d0f35b175b1db7060c4dff7528650796c0d11e298f9d6eb6cf48700f15abbb4e94ab5417c6e1833e1d8f204c4cb31bf5fb3b6253e7683359aa629bc4561bb0bef35886db19c732e3e6afad6779a46d6ce1448b912a508234f59332987c2305f20b29360a53968c53a4de9134f52cd39add9590f3c45bdd531643eff4e1b88e7e5b1dcafb750939a6c789e85908d3c31f9f7ccfe0e1b698ee9b601090d633b288aff42325c8a72d15552f15e800e3ca49a33cbfbe8a72691715a52756f67dac87239c4c8253bd60844efd7fc241d5d31a0b4231c9999d2feeaaca969732d68919bf489baaa6147dea68b5093583736b6595fed5fab3a7996b0cc4b5e03c4702607fcf843278d72b2b0ee135173b1d07ca6e39c71bac416df88b39e3c4a2af3982ce0a6aab7567ea9dfd1497a05c654f6663dd6988656254b33f262c42174c713acc3cd61c694fac6bdef29e9eecbbb410bf3c420d1608cf5f7f86edb7e2281fa79ebe3ecc8e6a4ba48d1695824e1573916782a177bf596e85b7760b6debaab1a41f00f15d3f888ac43ff1559fd215d7ac7b12dbb32b32ad1d3121220120b4bc5b5f4e9843ed113ffe21dda665abdfb510bfeba79d2317b5f51a04e073a9c7d8368dfec70f30f7b6d45ccca8d8330770782d83cce16e1a873217f260c710324e948189301c6b8e208b35c437e9e2788ca7aad1cb2651894a616651ee14aa8aedc9fc8bbe31e0b95e8921edeec6da7adf37f56a449e9ea48ec1d252d7fd40fefb3961aa494ea4e785f93188383240be91f8f3709a3b42fe2c0ac3de912e7d750e601aba4ae997d81635337a492fff957ed92e3da63402f61de7af5b283cb1e3f185140a539d2acd0ecbad6efc061ce9cee088bcd7ce59fd211aed0d25bb2e0964084ccb9a786932878c14e7c25820f790bcef7164e8b562e22526dbb5bbab82d4daf4f1edf58a5e2683bcde889bb58e219d9feaefb2a46f46359164662288a1d1b049f5e5fb33bf6b6ac3bb39e5907d62b5cc1ee29b5b0e5acd284cc18a80c185db85f87f41eaa7b14ebc005b79aad341de11416a21d2f47ccbfb56550e2da4f13cabcdf793cd8e9eaf808c39eef864c490f6ac3a38b449c0643e5934d544770202d441fca85bff28ddcf422529d32418f67ba373e2ebc4d630b3d81f7b08d9c841319f2b305fc0e894cfdd1424a1d8eaa46ee0a50e9121431309e96a7566f205fe98a2601f0b2e212cd8e4626359b9be6fceeb260fee88c58a058123aeb5467c9cfae3685d26449b1e3f74ad72207d6fc7d5a6440feabdf5c6a24129e99492325cf9c59dde2861cec127c56aa2675fa3841736ff03fe49bd961aaa866ab3c535c04bdeb76e2ce013d35c36e6b4380c433942eb6da544923522e0df192580522171b6cd6c2213d5d28ace7ddca3a0687df0fe51abaa7487c4f26fee118c3e572e912ca995474312f2ae9991bc00ede2c5b118436b1abb8373a8a470ffe3b6d09b428fcdbb7b306b1e1d30d72177dcb4ef3f8691236ac2d33140d03019355c11b89a7fbbbfdf611c501bf4ebc201f3958163230cb57cc99a325ee6ade1beaf8f92d7201d2285b7efba64f0e8b034e04639fb58dd40feb399fff38fa0e1b35244e3100a0829caf77471f7024db3745d473f700d852ebb4b524f5efcc0a31af73edd7a82209fdbe7f0f33940eb61297f136b508a9ff9a0d446597e1c4ff22c8658e4b79e6ad419c0fd155af506b0a35472b5be7d239d016b4dfb00d081e214bd9c048ff4dd63d6e7dc2e4a1aa3274a2d210f10f32ba62184f60af96684298826754362e2ec5735f8ab1b71d0f879c71a5fe4ce8c0c5c39b6895884030fb444a2bf930fb70e3eaeca26ee4763ee66906119865761625906798b38365a0261b2495290752805e31e027421fd513ba9b418adffd9ebe9dd92d3edd84b6259f9ffb6f4c22d311a90830b5849c2eb209cda23641099836a55d6df7843e8be35bdf4abf2590e4d5585acfdec67cf35a4dab4d76b4b6eb37deb059fcda535df21c8cc4e1598610f28c58e7c33f71f3c00e544f3d1d33c6b272f210d2b040d12ab50d81b75020402faaf04cef56322628eb35bd644b8a392b47ab2a286772adc28b565f9c10fa0a1e580c355f66c3a758df412822d63ea2648ed4e94dda2c08b348ccbdc5f7df8d690f9de8353c722cec13690d7da095aa9e1e0458fb641262c67633d9c4010309d337a8929da6cb4bae9b3fc50f5f8d5fb14a383410f59cf168d03e6e2929b4d14dd846cdc5c15f6b436a6121ab7539ed6d3a06795c77691db62b7d81b473f2c73812110b5c68c71ed2e5ad7d28cb5da709c354c167f00ee43db1453babeb6a0573ed58631fd8584cfefbd9ab99b21efaf60b048703f3d47ff4eea26d69005cb1a734d5c11efd9aa119133bc51df88bb6dc4a58f28be82edcd1dcf84d486b903498dbcd700b79ff4e5d2e0411e55706ae153e9629ecee8e2c344320590c954c2bbcc8f6237248d89688f9d02bd29411d35d090cc15955558fb28a8fb415fa7f61ab614c53f8806e3bbfc5e0bdf47b00888d031ce14dcd1d372c0edccf9cc8197c57e0bb1329501363cdd0ac7b0420e9d642a34d5c724db4d36ad0e71986575fdb35efb9b6f6f4964723dc73107e1b38e78caff1962e7557c8aedbecc875e2a367b2e09a902b149479a4529c2380005bb38dfbae7aa1e4a8f71a1730d97659c6ce8af3b0f72f4b664dcaa7b756d41161802a0455f017a33ef87319206fd5a0049e5827eb2cca22c8e73a902f2c4c669f1a4e8161149fa3b3bf40b80fab1140cb9d60e57a0e762716e1e59f7e2f8f5204c6d9f548c5f54a05e3a93d79c436763bdb066f0e75f068e1e879e091970ec28083096c21f2fdc5a5cbb214beb28559a50460b5f1d001ca48169e07d9ccd149c031d39e711e04385299f0cc47980e15bc2f337d4f0b3880f3452261cc401b260244c3030ae37b9cfdd6ee242f488cff2b082e4ed8adc335f50cb3abf809f0c5fac36a0ad8069022fd4990ef9a39085ea8a1f6299827d2a0a144db17e96a680b8c4186b63895f43d765aefd82b612583092eea358d4b216c30579259dc3f3904b87819c227c0eccc3dce1e0915e17f89e3ae5971d21ab1770e8262d43acce40e8d71d95ea148a3333f7e12b712e4a03f2ed72d608dbd7c66c186a5ee3537766fe7d561b5a6e2fe840b54922bdb2a1bf95778b43259679e4d9703de83e81276547132e60af61168c4e7d6d71c4dfa986a7328b8df2e40ef9767bedfeedadbaa1010814eb9a77cb830a61af297552238627e580da10e7d980487b0c7f5dd2def15c3d16ecaa73bfac6ac288943bbd8d56751be0dba267d2c533286cfbf4f02dd9dd389113b10320318c5a79742600e036f26a625b65ed187ff5ebc0e70ad8eb508e736a4130be6f5efd8cd53b7e785328287e32141c962e608a1442b9b5330820e5a4cd23891ff98d53f9a277973639798e0ee67d2781eb5821461aa911a94fcb8706f5e4b070090093fbc5d4f9db0ae87763f5274efcc5c38ace4d1afda92e4fcf2bbd3dbda2ea2255edb9ed5c8ac913c3d71c911acd62e64d1d5fb4a81af3c7c7a827c0922710add460a1dfef2bdb27bf3ca59d236c13431ac216706499a613784c2a91af3cee3a357a777ee99eb1c76ae7166c9c71ea3ce118cba71c6e4743c29584e566703c89de731ed41b914a32af0ca407d3f98a4dbaf26081adac99a56eb5b2b2fac2442d21fe49b8d71d45c82a1333f020b11fd4b2f63af700f3257c3a1fa4497d5620ad9984f885608bca471381ab4f41e4366e835fb2f1ff702ac34c74be72c2544fee4de8f685be4df30ad17899aabe655358de2f34620836328915c4af940d80941b3cba45044ca22f3a5596699f772daa1314d1bd447b906bb3ac9fcf58a0ae30ad3929cbcfd100016ee2bdcf06027fc9ad37cf0357a1401b149b55734f1d298a26b33efde112c01381f2bd4f34e24d4e8195fa9df57cad6cc40edcd29fb1adaf473afbfd979ebead98f0eb22236d86f35a529fc96ac26105b034c0f260dabc5a2af23a4b7959ce1deccb4dd8aa8be05515fa1c5b4d5533069155dd7d5378ea85d8bb28643561573330e7fa33b5a6f9cbba991ffd375691ce56d03f0ede67ec341a46622fa04934794d51cae9b53146e66918960446683f8d16842a6e45b30180a1311be3eeaf8cd6afef3d4050da95298306aad4eb85dc17c033728c4abdee96dfa357935a72f86d34e388101571160089f6fda15fed37f2bdadbfe79a5dd67ca79ffa0d2bbccec88431eeb3ebfedf0ecab18be370f2e920f703afe158260bfd1da6da46aa9deab9a91381c29ad0f881ab6ccdd81f8a628baa88f8a1ffb4fb4dd28d6bcf87c08795e42803f4218c87712a157816eb40ccfe6cb4be18efd657a959381c7d15e59b74d99751621d3e3da2a74841eee3944d85e594e31e7ac1ac9e2976abec4a69306ac5ce0b6aa0cf8c3d909ad1a8d8df077aab8d128bd2e28533f135108ee6c61859394de6ab9b405229253312093c1e80784bd2d6b040256dd0b4dc376a1fe7a2723c132832324f4d4f4ba3a1ad919b39324555a1e03b231ec24b815063bc08dba441e37762bd0bcdc349d5de4ea44d9864a74487c19d7ba1c39a1eef8301eba78f164f48ff398e84450ff752ec0cabe79214f8e05186303ebd4ca3b80191c"}], 0x10d0}}, {{&(0x7f0000000480)=@ipx={0x4, 0x8001, 0x6, "0c063df7dc31", 0x2}, 0x80, &(0x7f0000001800)=[{&(0x7f0000000500)="4c1b99cd130f298192d5f0e62b43ab04b282c4b3283e75ca4cfcd24aa53d147f7eb4", 0x22}, {&(0x7f0000000540)="a83b42b5f9ff4d1184b642e5600a0102f0aa", 0x12}, {&(0x7f0000000580)="86455d6463301a3b7cf88a2d427f0b8103e2424049158e7d6047992a09b2c5e6ed3689c887947877ca06b96af35f959e5df9690fe8b5147dbc88dfa30578657aa7d1b5f7e9b530a3c7d4389ab714c308a83cac13774cf52fe33c809907bab2cc5160a7407e70ef8ce7a1a3f9", 0x6c}, {&(0x7f0000001780)="4eed96b5b7e97ca4dc7327480e255daa94fe809bbf58e87d8c6e5c6723e4cf2e4520aec302335eb4168be0340ad9eb23b1f35762beb318b898287814239413c2b59c1c3f78893977de6b62774ebe8088e44590832d025bf474e0547579de896e62bef0abc0701cf6cc4773a91288ce5ef99f6a", 0x73}, {&(0x7f0000000600)="67d09f0b07d2147c35b73de97e62637524ad11c393f9", 0x16}], 0x5, &(0x7f0000001880)=[{0xa8, 0x102, 0x1, "fb9c3a1f1a57177c863d123be65cd743f52588144d3dcfc05f2bb8ff39c61e07dba2c7d96c227a3cf98e8e0a373ca0485e96529bf8f1c41033f07a30e1460eccca55fef5c5d85b3fa41c56d4e623f9090220236982642e8ceb3fa66ad71ee0fcdb401d374414b375a65b0ec2ce0b616637a072cbb6c4a0c78d00e8bea556dd296f0706b2c7d962cc2752b2bb531ad18510"}, {0x1010, 0x118, 0xb453, "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"}, {0xf0, 0x11, 0x5, "1a1140e099b328fcd5fc56be5ae0d9d2cd96a4236c4f4aa74e893e7868fcec9b15247f3f2b7753becea1640724b94b786c98c7371e149b8d26551928a86a138690f1922629a777ecdae7b8609f40d65b207e8a6ef586bf60014ad3612c274bc285041f11c0b00ef27a48972225d52570b9ccc371374b118f3ffe7f63e9e4f9fbfd767da1cbd43a86c6d4ce7c8fb0769087be19f329b38e9c5b2ba018d22dbd55331706bc976cd7ada7b521891b5755b090b37d2edbb85c62d0c21065d9eb286d95d2d94f3ac1cd43ea3828a58161aab93734eae3e8bd1cc95c"}, {0xe0, 0x116, 0xa763, "fa4799d6827ff48f7544fc52841e92569b7869f0cd375f647884f3a84b9754146f178c00fe906c7e6c0c6090e1fec8b8ebe8d3fc63516a3f6c38098cfe2ab6b54d81588b86d8ca8a14f21d7db1da0b542433b3eb5d2ed47a14e0a0aa33a2eaa5de938ccf9b57a01cad93f3abbf713073c2a6daa631d3f1ea7bdf2851a9235e77e167eb20dafd07b461f1b5afd0fb9ae77deb831778c7faf6f60d17da90703569c49f7bd6f02740e10402850a4fc5e4a176322d3f7156d8c86d8444a46b089c806e61e58b98de5c0aa015991eed"}], 0x1288}}], 0x3, 0x4000) lseek(r1, 0x0, 0x2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r4 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) 01:59:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6800, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 378.671287] FAULT_INJECTION: forcing a failure. [ 378.671287] name failslab, interval 1, probability 0, space 0, times 0 [ 378.711231] CPU: 1 PID: 22227 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 01:59:45 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x184, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 378.719251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 378.728697] Call Trace: [ 378.731300] dump_stack+0x1fc/0x2ef [ 378.735034] should_fail.cold+0xa/0xf [ 378.738847] ? setup_fault_attr+0x200/0x200 [ 378.743309] ? __lock_acquire+0x6de/0x3ff0 [ 378.747552] __should_failslab+0x115/0x180 [ 378.751790] should_failslab+0x5/0x10 [ 378.755580] __kmalloc+0x2ab/0x3c0 [ 378.759220] ? ext4_find_extent+0x9bb/0xc70 [ 378.763543] ext4_find_extent+0x9bb/0xc70 [ 378.767689] ext4_ext_map_blocks+0x1c0/0x7390 [ 378.772179] ? __lock_acquire+0x6de/0x3ff0 [ 378.776615] ? __lock_acquire+0x6de/0x3ff0 [ 378.780867] ? mark_held_locks+0xf0/0xf0 [ 378.784945] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 378.790298] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 378.795480] ? mark_held_locks+0xf0/0xf0 [ 378.799943] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 378.804781] ? ext4_es_lookup_extent+0x375/0xb60 [ 378.809542] ? lock_downgrade+0x720/0x720 [ 378.813680] ? lock_acquire+0x170/0x3c0 [ 378.817653] ? check_preemption_disabled+0x41/0x280 [ 378.822670] ? lock_acquire+0x170/0x3c0 [ 378.826889] ? ext4_map_blocks+0x33e/0x1a50 [ 378.831197] ext4_map_blocks+0xd88/0x1a50 [ 378.835454] ? check_preemption_disabled+0x41/0x280 [ 378.840475] ? ext4_issue_zeroout+0x160/0x160 [ 378.844970] ? __brelse+0x84/0xa0 [ 378.848423] ? __ext4_new_inode+0x2eb/0x5a20 [ 378.852823] ext4_getblk+0xad/0x4f0 [ 378.856446] ? ext4_iomap_begin+0xe00/0xe00 [ 378.860774] ? ext4_free_inode+0x1780/0x1780 [ 378.865197] ? debug_check_no_obj_freed+0x201/0x490 [ 378.870216] ? __dquot_initialize+0x298/0xb70 [ 378.874961] ext4_bread+0x7c/0x210 [ 378.878510] ? ext4_getblk+0x4f0/0x4f0 [ 378.882798] ? dquot_initialize_needed+0x290/0x290 [ 378.887760] ? trace_hardirqs_off+0x64/0x200 [ 378.892183] ext4_append+0x155/0x370 [ 378.896366] ext4_mkdir+0x5bd/0xe10 [ 378.900008] ? ext4_init_dot_dotdot+0x600/0x600 [ 378.904772] ? generic_permission+0x116/0x4d0 [ 378.909369] ? inode_permission.part.0+0x10c/0x450 [ 378.914549] vfs_mkdir+0x508/0x7a0 [ 378.918191] do_mkdirat+0x262/0x2d0 [ 378.921944] ? __ia32_sys_mknod+0x120/0x120 [ 378.926266] ? trace_hardirqs_off_caller+0x6e/0x210 [ 378.931445] ? do_syscall_64+0x21/0x620 [ 378.935622] do_syscall_64+0xf9/0x620 [ 378.940225] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 378.945711] RIP: 0033:0x465707 [ 378.948894] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 378.968772] RSP: 002b:00007fbaf0827fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 378.976478] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465707 [ 378.983739] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 378.991204] RBP: 00007fbaf0828040 R08: 0000000000000000 R09: ffffffffffffffff [ 378.998932] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 379.006562] R13: 0000000020000100 R14: 00007fbaf0828000 R15: 0000000020001080 01:59:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffdfc, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:45 executing program 5 (fault-call:0 fault-nth:31): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:45 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x185, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:45 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:45 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6c00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:45 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffdfd, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) [ 379.251066] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 01:59:45 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x186, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 379.357657] FAULT_INJECTION: forcing a failure. [ 379.357657] name failslab, interval 1, probability 0, space 0, times 0 [ 379.369871] CPU: 1 PID: 22274 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 379.377774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 379.387139] Call Trace: [ 379.389751] dump_stack+0x1fc/0x2ef [ 379.393391] should_fail.cold+0xa/0xf [ 379.397321] ? setup_fault_attr+0x200/0x200 [ 379.401649] ? __lock_acquire+0x6de/0x3ff0 [ 379.406104] __should_failslab+0x115/0x180 [ 379.410353] should_failslab+0x5/0x10 [ 379.414162] __kmalloc+0x2ab/0x3c0 [ 379.417703] ? ext4_find_extent+0x9bb/0xc70 [ 379.422021] ext4_find_extent+0x9bb/0xc70 [ 379.426315] ext4_ext_map_blocks+0x1c0/0x7390 [ 379.430830] ? __lock_acquire+0x6de/0x3ff0 [ 379.435084] ? __lock_acquire+0x6de/0x3ff0 [ 379.439337] ? mark_held_locks+0xf0/0xf0 [ 379.443531] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 379.448892] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 379.454227] ? mark_held_locks+0xf0/0xf0 [ 379.458314] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 379.463190] ? ext4_es_lookup_extent+0x375/0xb60 [ 379.467965] ? lock_downgrade+0x720/0x720 [ 379.472123] ? lock_acquire+0x170/0x3c0 [ 379.476116] ? check_preemption_disabled+0x41/0x280 [ 379.481152] ? lock_acquire+0x170/0x3c0 [ 379.485132] ? ext4_map_blocks+0x33e/0x1a50 [ 379.489475] ext4_map_blocks+0xd88/0x1a50 [ 379.493634] ? check_preemption_disabled+0x41/0x280 [ 379.499018] ? ext4_issue_zeroout+0x160/0x160 [ 379.503536] ? __brelse+0x84/0xa0 [ 379.506997] ? __ext4_new_inode+0x2eb/0x5a20 [ 379.511424] ext4_getblk+0xad/0x4f0 [ 379.515169] ? ext4_iomap_begin+0xe00/0xe00 [ 379.519509] ? ext4_free_inode+0x1780/0x1780 [ 379.523931] ? debug_check_no_obj_freed+0x201/0x490 [ 379.529141] ? __dquot_initialize+0x298/0xb70 [ 379.533757] ext4_bread+0x7c/0x210 [ 379.537310] ? ext4_getblk+0x4f0/0x4f0 [ 379.541210] ? dquot_initialize_needed+0x290/0x290 [ 379.546153] ? trace_hardirqs_off+0x64/0x200 [ 379.550757] ext4_append+0x155/0x370 [ 379.554497] ext4_mkdir+0x5bd/0xe10 [ 379.558145] ? ext4_init_dot_dotdot+0x600/0x600 [ 379.562926] ? generic_permission+0x116/0x4d0 [ 379.567462] ? inode_permission.part.0+0x10c/0x450 [ 379.572408] vfs_mkdir+0x508/0x7a0 [ 379.575969] do_mkdirat+0x262/0x2d0 [ 379.579612] ? __ia32_sys_mknod+0x120/0x120 [ 379.583952] ? trace_hardirqs_off_caller+0x6e/0x210 [ 379.588991] ? do_syscall_64+0x21/0x620 [ 379.592988] do_syscall_64+0xf9/0x620 [ 379.596808] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 379.602005] RIP: 0033:0x465707 [ 379.605223] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 379.624240] RSP: 002b:00007fbaf0827fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 379.631961] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465707 [ 379.639247] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 379.646529] RBP: 00007fbaf0828040 R08: 0000000000000000 R09: ffffffffffffffff [ 379.653806] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 379.661084] R13: 0000000020000100 R14: 00007fbaf0828000 R15: 0000000020001080 01:59:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffff6, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:46 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x187, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 379.766746] ieee802154 phy0 wpan0: encryption failed: -22 [ 379.772505] ieee802154 phy1 wpan1: encryption failed: -22 [ 380.013169] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 01:59:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:46 executing program 5 (fault-call:0 fault-nth:32): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:46 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7400, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffe, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:46 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x188, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 380.074099] kauditd_printk_skb: 4 callbacks suppressed [ 380.074114] audit: type=1804 audit(1630461586.364:232): pid=22309 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/221/file0/bus" dev="sda1" ino=15112 res=1 01:59:46 executing program 1: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000003c40)) syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f00000021c0)=ANY=[@ANYBLOB="dc7949b1520d45eb9b8038626dc09887a24d695a530189b633ca35e1e548aaf3c2f4f8531b096239b846f4c2e321bb3d5c0abd0d5084756193ce78430de20dae3650c79ca017389044504766106a84a737c9b913a5ad17431d33885c24d1e0ad0d7c7646cf33cda5fea8db6e518ec59ffda47671", @ANYRES64=0x0, @ANYRESHEX=r0, @ANYRES16=0x0, @ANYBLOB="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"]) chdir(&(0x7f0000000040)='./file0\x00') r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x79) lseek(r1, 0x0, 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r3 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x8400fffffffa) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x80800) mmap(&(0x7f0000158000/0x4000)=nil, 0x4000, 0x1000002, 0x10, r4, 0x234ae000) r5 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCINQ(r5, 0x541b, &(0x7f0000003c40)) ioctl$FS_IOC_READ_VERITY_METADATA(r5, 0xc0286687, &(0x7f0000000080)={0x2, 0x792, 0x1000, &(0x7f00000011c0)=""/4096}) open(&(0x7f0000000200)='./file0\x00', 0x300, 0x12) r6 = syz_open_dev$audion(&(0x7f00000000c0), 0xffffffff, 0x40040) ioctl$LOOP_CLR_FD(r6, 0x4c01) [ 380.171733] FAULT_INJECTION: forcing a failure. [ 380.171733] name failslab, interval 1, probability 0, space 0, times 0 [ 380.185358] audit: type=1804 audit(1630461586.364:233): pid=22256 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/221/file0/bus" dev="sda1" ino=15112 res=1 [ 380.198205] CPU: 1 PID: 22322 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 380.217957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 380.228054] Call Trace: [ 380.230671] dump_stack+0x1fc/0x2ef [ 380.234320] should_fail.cold+0xa/0xf [ 380.238205] ? setup_fault_attr+0x200/0x200 [ 380.242539] ? __lock_acquire+0x6de/0x3ff0 [ 380.246809] __should_failslab+0x115/0x180 [ 380.251059] should_failslab+0x5/0x10 [ 380.254850] kmem_cache_alloc+0x3f/0x370 [ 380.259033] ? mempool_alloc+0x350/0x350 [ 380.263113] mempool_alloc+0x146/0x350 [ 380.267046] ? mempool_resize+0x790/0x790 [ 380.271195] ? mark_held_locks+0xf0/0xf0 [ 380.275292] ? mark_held_locks+0xf0/0xf0 [ 380.279367] ? check_preemption_disabled+0x41/0x280 [ 380.284391] ? find_get_entry+0x4f4/0x8a0 [ 380.288639] bio_alloc_bioset+0x389/0x5e0 [ 380.292817] ? bvec_alloc+0x2f0/0x2f0 [ 380.297262] ? lock_downgrade+0x720/0x720 [ 380.301410] ? lock_acquire+0x170/0x3c0 [ 380.305454] ? mark_buffer_dirty_inode+0x12c/0x3c0 [ 380.310568] submit_bh_wbc+0x141/0x760 [ 380.314459] __sync_dirty_buffer+0x14e/0x320 [ 380.318879] __ext4_handle_dirty_metadata+0x234/0x590 [ 380.324164] ext4_getblk+0x32d/0x4f0 [ 380.327881] ? ext4_iomap_begin+0xe00/0xe00 [ 380.332197] ? ext4_free_inode+0x1780/0x1780 [ 380.336595] ? debug_check_no_obj_freed+0x201/0x490 [ 380.341711] ? __dquot_initialize+0x298/0xb70 [ 380.346221] ext4_bread+0x7c/0x210 [ 380.349772] ? ext4_getblk+0x4f0/0x4f0 [ 380.353664] ? dquot_initialize_needed+0x290/0x290 [ 380.358596] ? trace_hardirqs_off+0x64/0x200 [ 380.363015] ext4_append+0x155/0x370 [ 380.366722] ext4_mkdir+0x5bd/0xe10 [ 380.370349] ? ext4_init_dot_dotdot+0x600/0x600 [ 380.375022] ? generic_permission+0x116/0x4d0 [ 380.379529] ? inode_permission.part.0+0x10c/0x450 [ 380.384559] vfs_mkdir+0x508/0x7a0 [ 380.388105] do_mkdirat+0x262/0x2d0 [ 380.391740] ? __ia32_sys_mknod+0x120/0x120 [ 380.396075] ? trace_hardirqs_off_caller+0x6e/0x210 [ 380.401108] ? do_syscall_64+0x21/0x620 [ 380.405124] do_syscall_64+0xf9/0x620 [ 380.408936] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 380.414206] RIP: 0033:0x465707 [ 380.417415] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 380.436316] RSP: 002b:00007fbaf0827fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 380.444032] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465707 [ 380.451290] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 380.458553] RBP: 00007fbaf0828040 R08: 0000000000000000 R09: ffffffffffffffff [ 380.465811] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 01:59:46 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x189, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 380.473068] R13: 0000000020000100 R14: 00007fbaf0828000 R15: 0000000020001080 01:59:46 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x225c17d03, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:46 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x18a, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 380.607761] audit: type=1804 audit(1630461586.904:234): pid=22344 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/222/file0/bus" dev="loop1" ino=1 res=1 01:59:46 executing program 5 (fault-call:0 fault-nth:33): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:47 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r2 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) r3 = syz_open_dev$midi(&(0x7f0000000080), 0x8001, 0x480500) ioctl$FS_IOC_MEASURE_VERITY(r3, 0xc0046686, &(0x7f0000000200)={0x3, 0x9a, "f71af3b4b1497a0346c84eb9b0d33cc2a7d6c346b5d5d2c6ddccd0b1f47b326bed9895a338a6d6ccb2ad90b8087582a1db05c2a96aefb6a5d2c174b40fa5345d9b4545ebc1d2682ffd8ef0ac6389c424a55522830604c5c746bb29cdb2d36971374356cc4a85cd8f29315b40dda1170a9901c03f12d6fd6435e9f72d89d6ddc644b7b2c324c3de630909015721f2823c3f48b7787a0c1d0751e1"}) sendfile(r0, r2, 0x0, 0x8400fffffffa) 01:59:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20000000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) [ 380.687859] audit: type=1804 audit(1630461586.984:235): pid=22344 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/222/file0/bus" dev="loop1" ino=1 res=1 [ 380.858568] FAULT_INJECTION: forcing a failure. [ 380.858568] name failslab, interval 1, probability 0, space 0, times 0 [ 380.870705] CPU: 0 PID: 22356 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 380.878643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 380.888056] Call Trace: [ 380.890830] dump_stack+0x1fc/0x2ef [ 380.894465] should_fail.cold+0xa/0xf [ 380.898812] ? setup_fault_attr+0x200/0x200 [ 380.903140] ? lock_downgrade+0x720/0x720 01:59:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:47 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7a00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:47 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x18b, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 380.907299] ? check_preemption_disabled+0x41/0x280 [ 380.912337] __should_failslab+0x115/0x180 [ 380.916588] should_failslab+0x5/0x10 [ 380.920398] kmem_cache_alloc+0x277/0x370 [ 380.924554] ext4_mb_new_blocks+0x60a/0x4370 [ 380.928976] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 380.934006] ? ext4_cache_extents+0x68/0x2d0 [ 380.938421] ? ext4_find_extent+0x9bb/0xc70 [ 380.942749] ? ext4_discard_preallocations+0xfb0/0xfb0 [ 380.948034] ? ext4_ext_search_right+0x2c7/0xb60 [ 380.952798] ? ext4_inode_to_goal_block+0x2d2/0x3e0 01:59:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7ffffffff000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) [ 380.957921] ext4_ext_map_blocks+0x2aa2/0x7390 [ 380.962526] ? __lock_acquire+0x6de/0x3ff0 [ 380.966781] ? mark_held_locks+0xf0/0xf0 [ 380.970855] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 380.976252] ? ext4_find_delalloc_cluster+0x1f0/0x1f0 [ 380.981456] ? mark_held_locks+0xf0/0xf0 [ 380.985529] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 380.990392] ? ext4_es_lookup_extent+0x375/0xb60 [ 380.995162] ? ext4_map_blocks+0x59f/0x1a50 [ 380.999513] ext4_map_blocks+0x7a2/0x1a50 [ 381.003681] ? check_preemption_disabled+0x41/0x280 [ 381.008708] ? ext4_issue_zeroout+0x160/0x160 [ 381.013215] ? __brelse+0x84/0xa0 [ 381.016677] ? __ext4_new_inode+0x2eb/0x5a20 [ 381.021110] ext4_getblk+0xad/0x4f0 [ 381.024748] ? ext4_iomap_begin+0xe00/0xe00 [ 381.029082] ? ext4_free_inode+0x1780/0x1780 [ 381.033498] ? debug_check_no_obj_freed+0x201/0x490 [ 381.038526] ? __dquot_initialize+0x298/0xb70 [ 381.043165] ext4_bread+0x7c/0x210 [ 381.046821] ? ext4_getblk+0x4f0/0x4f0 [ 381.050723] ? dquot_initialize_needed+0x290/0x290 [ 381.055676] ? trace_hardirqs_off+0x64/0x200 [ 381.060110] ext4_append+0x155/0x370 [ 381.063850] ext4_mkdir+0x5bd/0xe10 [ 381.067498] ? ext4_init_dot_dotdot+0x600/0x600 [ 381.072271] ? generic_permission+0x116/0x4d0 [ 381.076783] ? inode_permission.part.0+0x10c/0x450 [ 381.081729] vfs_mkdir+0x508/0x7a0 [ 381.085286] do_mkdirat+0x262/0x2d0 [ 381.088924] ? __ia32_sys_mknod+0x120/0x120 [ 381.093270] ? trace_hardirqs_off_caller+0x6e/0x210 [ 381.099789] ? do_syscall_64+0x21/0x620 [ 381.103785] do_syscall_64+0xf9/0x620 [ 381.107647] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 381.112853] RIP: 0033:0x465707 [ 381.116057] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 381.135177] RSP: 002b:00007fbaf0827fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 381.143037] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465707 [ 381.150433] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 381.157715] RBP: 00007fbaf0828040 R08: 0000000000000000 R09: ffffffffffffffff [ 381.165009] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 381.172289] R13: 0000000020000100 R14: 00007fbaf0828000 R15: 0000000020001080 01:59:47 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x18c, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:47 executing program 5 (fault-call:0 fault-nth:34): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 381.337311] audit: type=1804 audit(1630461587.634:236): pid=22384 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/223/file0/bus" dev="loop1" ino=1 res=1 01:59:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:47 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000240)='./file0/../file0\x00', 0x4, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x50000, &(0x7f0000000200)=ANY=[]) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) ioctl$SOUND_PCM_READ_CHANNELS(r0, 0x80045006, &(0x7f0000000080)) chdir(&(0x7f0000000140)='./bus\x00') lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$int_out(r0, 0xfca2, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r2 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) r3 = syz_mount_image$qnx6(&(0x7f0000000100), &(0x7f0000000280)='./bus\x00', 0x3f, 0x8, &(0x7f0000000800)=[{&(0x7f00000002c0)="280a978237bc8113e1c852d2703faf24db17e24a3a1fcd1b051cd82de6955a4c3a48c010561c3a94ca82b33cd8cdaa944454ec05d6dd6dd76428c2f3c75762044870bc4c90b4da516a69611982a4c4148f157b70e56afcfc1f59b6c340270b5a15bbac0fbfc580ff7c0f48ffd8b641ff6b6c498260ed52f1dcebf258bc07c62b919b9c95d7a781cfc2d83298f1a9c2853b8744dc664cfde7413e40eea1970e04538d8cbc8ea2bf131f2069bb22ddb3", 0xaf, 0x3}, {&(0x7f0000000380)="1b4a135a3bcc6982b240395f6e5e3ccf25", 0x11, 0x3}, {&(0x7f00000003c0)="21dadec7c0ba63a37bd8db04b2d11cd1c9b607c3fe75b261cd470903cdd9164d60596ada862811b5955719a683991d3222dbabe4aac5dbaf5aee0762046b4fc72cfd06fafebbd244b44b7de046fc9ac5", 0x50, 0x5}, {&(0x7f0000000440)="c6cc18f5ace5073bc7bb20278c96501c9fc95d1146b280a064c736b973c3310f75642ae9abd60fbbf8931e3d0d1aed0a36b991931d855b5641bb5e263297204974f7ff6e97c9fd6945413c195eb2ed13d007b9ab7e87d561f736de19de1ff45b265e76afde749b3e6e52ecdd24760fac283c30a334abc6627d010fb30bfa89336b2b700bab56f8934cec31cf6c5e3528143eb0e0f4ddd9b50ffeb02ca61b2dccb1487d53adaba9bc425c11869ed82b61db4893a4722c5fdfd52b53780dd7cac708b9f6bb233bb291af7e2c94ceeda8ad263d", 0xd2, 0x8}, {&(0x7f0000000540)="00c86400cf74d9b7db5cf525f7dd16bf97a7ccc449bbc080a3b3c7", 0x1b, 0x3}, {&(0x7f0000000580)="c9ae0631ff1b7f284f55bd21a821017a2d3c48ae16b05d49be3b08c0fc9029be51c9c55e8ba389eff3c0d72a51de6573ba8b46c6fe594b2d95800d6ab137a7bc28d49051aa8b499b59e5eff59b05669776087dd23f1790fc1b47c5b093c3917b", 0x60, 0x4}, {&(0x7f0000000680)="d13c5fbb5fa20b8c7b3205e3f6d2c9fec39e72d23cf3a1739b5d9a7006c38779a69a044d2d6b279291252e7ce0f32f684bcac16f961f9fa601ed7b7c1efaa814babf28f3b690f70e6a1c76297b1a1fa32569460567b1836eeead2333afd2e2ab0b6bd60a1d", 0x65, 0x7}, {&(0x7f0000000700)="3e17c5effa34fc11dd4aa0b4d2ba208b7b4a6d395d35beebb833c6d90f39f5eeba86f501eeb631f1615fc9ffd1073a22858ae53d35f5136fed11426630288a6969d57af45a2d0227daf372d7093e2cb1fa0fe4f8674c8b141e0d5dea9498d7f2d71420faa3967659f55d74b91158655022765948538f9aec5c31dd34aeb6279063965ed7c67ba0e28abb137f0626f0b74f980b2f86a8004e00784ee3b8071c2a8aa7d4aa7718eedf5cc4694245eef537f26b37f4e76e74818e3486bfb0a977887a3d7d180dc41f5fa36e2786b9c4bd4fc655eb2ed6e293bed8db61dcc05f9f698fef0261c03946fd54ae", 0xea, 0xde92}], 0x1029, &(0x7f0000000600)={[{}, {'%@'}, {']+.*.-'}, {'minix\x00'}, {'minix\x00'}, {'minix\x00'}], [{@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}) getdents(r3, &(0x7f00000008c0)=""/97, 0x61) r4 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCINQ(r4, 0x541b, &(0x7f0000003c40)) ioctl$F2FS_IOC_GET_PIN_FILE(r4, 0x8004f50e, &(0x7f0000000200)) 01:59:47 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:47 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xedc0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:47 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x18d, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 381.419813] audit: type=1804 audit(1630461587.694:237): pid=22394 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/223/file0/bus" dev="loop1" ino=1 res=1 [ 381.484454] FAULT_INJECTION: forcing a failure. [ 381.484454] name failslab, interval 1, probability 0, space 0, times 0 [ 381.496551] CPU: 1 PID: 22399 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 381.504450] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 381.513798] Call Trace: [ 381.516508] dump_stack+0x1fc/0x2ef [ 381.520142] should_fail.cold+0xa/0xf [ 381.523953] ? setup_fault_attr+0x200/0x200 [ 381.528273] ? __lock_acquire+0x6de/0x3ff0 [ 381.532709] __should_failslab+0x115/0x180 [ 381.536946] should_failslab+0x5/0x10 [ 381.540737] kmem_cache_alloc+0x3f/0x370 [ 381.544916] ? mempool_alloc+0x350/0x350 [ 381.548979] mempool_alloc+0x146/0x350 [ 381.552865] ? mempool_resize+0x790/0x790 [ 381.557151] ? mark_held_locks+0xf0/0xf0 [ 381.561216] ? mark_held_locks+0xf0/0xf0 [ 381.565328] ? check_preemption_disabled+0x41/0x280 [ 381.570335] ? find_get_entry+0x4f4/0x8a0 [ 381.574494] bio_alloc_bioset+0x389/0x5e0 [ 381.578651] ? bvec_alloc+0x2f0/0x2f0 [ 381.582478] ? lock_downgrade+0x720/0x720 [ 381.586740] ? lock_acquire+0x170/0x3c0 [ 381.590707] ? mark_buffer_dirty_inode+0x12c/0x3c0 [ 381.595634] submit_bh_wbc+0x141/0x760 [ 381.599572] __sync_dirty_buffer+0x14e/0x320 [ 381.603969] __ext4_handle_dirty_metadata+0x234/0x590 [ 381.609362] ext4_getblk+0x32d/0x4f0 [ 381.613091] ? ext4_iomap_begin+0xe00/0xe00 [ 381.617490] ? ext4_free_inode+0x1780/0x1780 [ 381.621911] ? debug_check_no_obj_freed+0x201/0x490 [ 381.627070] ? __dquot_initialize+0x298/0xb70 [ 381.631571] ext4_bread+0x7c/0x210 [ 381.635096] ? ext4_getblk+0x4f0/0x4f0 [ 381.639119] ? dquot_initialize_needed+0x290/0x290 [ 381.644041] ? trace_hardirqs_off+0x64/0x200 [ 381.648459] ext4_append+0x155/0x370 [ 381.652168] ext4_mkdir+0x5bd/0xe10 [ 381.655826] ? ext4_init_dot_dotdot+0x600/0x600 [ 381.660496] ? generic_permission+0x116/0x4d0 [ 381.664999] ? inode_permission.part.0+0x10c/0x450 [ 381.670105] vfs_mkdir+0x508/0x7a0 [ 381.673812] do_mkdirat+0x262/0x2d0 [ 381.677687] ? __ia32_sys_mknod+0x120/0x120 [ 381.681993] ? trace_hardirqs_off_caller+0x6e/0x210 [ 381.686997] ? do_syscall_64+0x21/0x620 [ 381.690981] do_syscall_64+0xf9/0x620 [ 381.694785] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 381.700666] RIP: 0033:0x465707 [ 381.703854] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 381.722969] RSP: 002b:00007fbaf0827fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 381.730670] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465707 [ 381.738041] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 381.745301] RBP: 00007fbaf0828040 R08: 0000000000000000 R09: ffffffffffffffff [ 381.752562] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 381.759830] R13: 0000000020000100 R14: 00007fbaf0828000 R15: 0000000020001080 01:59:48 executing program 5 (fault-call:0 fault-nth:35): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:48 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20000000000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:48 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x18e, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 381.937818] audit: type=1804 audit(1630461588.234:238): pid=22413 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/224/bus" dev="sda1" ino=13987 res=1 01:59:48 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x18f, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 382.053408] FAULT_INJECTION: forcing a failure. [ 382.053408] name failslab, interval 1, probability 0, space 0, times 0 [ 382.068865] CPU: 1 PID: 22433 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 382.076877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 382.086351] Call Trace: [ 382.088961] dump_stack+0x1fc/0x2ef [ 382.092614] should_fail.cold+0xa/0xf [ 382.096440] ? setup_fault_attr+0x200/0x200 [ 382.100781] ? __lock_acquire+0x6de/0x3ff0 [ 382.105034] __should_failslab+0x115/0x180 [ 382.109287] should_failslab+0x5/0x10 [ 382.113178] kmem_cache_alloc+0x3f/0x370 [ 382.117411] ? mempool_alloc+0x350/0x350 [ 382.121469] mempool_alloc+0x146/0x350 [ 382.125491] ? mempool_resize+0x790/0x790 [ 382.129672] ? __sync_dirty_buffer+0x1ef/0x320 [ 382.134266] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 382.139641] ? kernel_fpu_enable+0x1f/0x40 [ 382.143882] ? kernel_fpu_end+0x11b/0x170 [ 382.148040] ? kernel_fpu_enable+0x40/0x40 [ 382.152470] bio_alloc_bioset+0x389/0x5e0 [ 382.156638] ? bvec_alloc+0x2f0/0x2f0 [ 382.160557] ? lock_downgrade+0x720/0x720 [ 382.164731] ? check_preemption_disabled+0x41/0x280 [ 382.169864] submit_bh_wbc+0x141/0x760 [ 382.173765] __sync_dirty_buffer+0x14e/0x320 [ 382.178303] __ext4_handle_dirty_metadata+0x234/0x590 [ 382.183644] ? ext4_dirent_csum_set+0x1e1/0x2c0 [ 382.188431] ext4_mkdir+0x689/0xe10 [ 382.192161] ? ext4_init_dot_dotdot+0x600/0x600 [ 382.196843] ? generic_permission+0x116/0x4d0 [ 382.201362] ? inode_permission.part.0+0x10c/0x450 [ 382.206306] vfs_mkdir+0x508/0x7a0 [ 382.209861] do_mkdirat+0x262/0x2d0 [ 382.213505] ? __ia32_sys_mknod+0x120/0x120 [ 382.217931] ? trace_hardirqs_off_caller+0x6e/0x210 [ 382.223131] ? do_syscall_64+0x21/0x620 [ 382.227108] do_syscall_64+0xf9/0x620 [ 382.231159] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 382.236381] RIP: 0033:0x465707 01:59:48 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x190, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 382.239573] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 382.258618] RSP: 002b:00007fbaf0827fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 382.266330] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465707 [ 382.273600] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 382.280985] RBP: 00007fbaf0828040 R08: 0000000000000000 R09: ffffffffffffffff [ 382.288451] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 382.295795] R13: 0000000020000100 R14: 00007fbaf0828000 R15: 0000000020001080 01:59:48 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:48 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x191, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:48 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x5000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 382.765984] audit: type=1804 audit(1630461589.064:239): pid=22431 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/224/bus" dev="sda1" ino=13987 res=1 [ 382.794896] audit: type=1804 audit(1630461589.084:240): pid=22413 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/224/bus" dev="sda1" ino=13987 res=1 01:59:49 executing program 5 (fault-call:0 fault-nth:36): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf0ffffff7f0000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:49 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x192, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:49 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:49 executing program 1: r0 = syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000400)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffeba8ffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x188028, &(0x7f0000000200)=ANY=[]) mkdirat(r0, &(0x7f0000000340)='./bus\x00', 0x82) chdir(&(0x7f0000000040)='./file0\x00') r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x100) preadv(r2, &(0x7f0000000280), 0x2b, 0xda1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000380)="49cc1ba893f312a0dd6c3f1082eae344", 0x10) r3 = open(&(0x7f0000000640)='./bus\x00', 0x505802, 0x10) r4 = socket$inet6(0xa, 0x6, 0x4) r5 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCINQ(r5, 0x541b, &(0x7f0000003c40)) sendfile(r4, r5, 0x0, 0x2) socket$inet6_icmp(0xa, 0x2, 0x3a) sendmmsg$unix(r3, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="385975edb6d964976bc0c6a3d876c9ae860dd17ecdb0687b25599c3b68d9aac4d9bdaa599fee23886a058deab9", 0x2d}, {&(0x7f0000000200)="c5167a4e58fb64494853c0bee7977479263508fe66f0a2de97c3530b0db4f580ba67a5bac0c7957c6a6d4c7ec4aa8c9e2b271dc0b4cc525b5a612b12f1f066406ea1cf4a484d32c3497da0b925e089c41551f712f27b6c474afe3703624d5b8425ef1a4127d595c29784cdfac84d18f8bf14f48ec6c36bea54a754dd59f75ad020d906efacc59ac219970797affa7387fbeb208f05410998fc2d2c462943c566a899c091b0e55e103b183c0f6362e3eeb7fee1a6a2126a08fbc52dbbfc0d3cf4c284124f5769c38db9ae3ddef596f50bb3529f22bc37cd9d8d7086a9150033452273ee34c76ca03c437802d9718a87e95175660f87", 0xf5}], 0x2, 0x0, 0x0, 0x4000000}}], 0x1, 0xc000) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x74, &(0x7f0000000500)={0x0, 0x0, 0x30}, &(0x7f0000000540)=0x18) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000003c0)={0x0, 0xa8}, 0x8) 01:59:49 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x193, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 382.999188] FAULT_INJECTION: forcing a failure. [ 382.999188] name failslab, interval 1, probability 0, space 0, times 0 [ 383.047079] CPU: 0 PID: 22506 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 383.055079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 383.064536] Call Trace: [ 383.067171] dump_stack+0x1fc/0x2ef [ 383.070796] should_fail.cold+0xa/0xf [ 383.074595] ? setup_fault_attr+0x200/0x200 [ 383.078922] ? __lock_acquire+0x6de/0x3ff0 [ 383.083268] __should_failslab+0x115/0x180 [ 383.087515] should_failslab+0x5/0x10 [ 383.091315] kmem_cache_alloc+0x3f/0x370 [ 383.095400] ? mempool_alloc+0x350/0x350 [ 383.099490] mempool_alloc+0x146/0x350 [ 383.103377] ? mempool_resize+0x790/0x790 [ 383.107574] ? __sync_dirty_buffer+0x1ef/0x320 [ 383.112189] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 383.117565] ? kernel_fpu_enable+0x1f/0x40 [ 383.121814] ? kernel_fpu_end+0x11b/0x170 [ 383.125964] ? kernel_fpu_enable+0x40/0x40 [ 383.130209] bio_alloc_bioset+0x389/0x5e0 [ 383.134358] ? bvec_alloc+0x2f0/0x2f0 [ 383.138179] ? lock_downgrade+0x720/0x720 [ 383.142337] ? check_preemption_disabled+0x41/0x280 [ 383.147375] submit_bh_wbc+0x141/0x760 [ 383.151291] __sync_dirty_buffer+0x14e/0x320 [ 383.155707] __ext4_handle_dirty_metadata+0x234/0x590 [ 383.160914] ? ext4_dirent_csum_set+0x1e1/0x2c0 [ 383.165680] ext4_mkdir+0x689/0xe10 [ 383.169319] ? ext4_init_dot_dotdot+0x600/0x600 [ 383.173980] ? generic_permission+0x116/0x4d0 [ 383.178554] ? inode_permission.part.0+0x10c/0x450 [ 383.183492] vfs_mkdir+0x508/0x7a0 [ 383.187257] do_mkdirat+0x262/0x2d0 [ 383.190892] ? __ia32_sys_mknod+0x120/0x120 [ 383.195213] ? trace_hardirqs_off_caller+0x6e/0x210 [ 383.200593] ? do_syscall_64+0x21/0x620 [ 383.204559] do_syscall_64+0xf9/0x620 [ 383.208368] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 383.213550] RIP: 0033:0x465707 [ 383.216737] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 383.235756] RSP: 002b:00007fbaf0827fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 01:59:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 383.243459] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465707 [ 383.250713] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 383.257970] RBP: 00007fbaf0828040 R08: 0000000000000000 R09: ffffffffffffffff [ 383.265223] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 383.272476] R13: 0000000020000100 R14: 00007fbaf0828000 R15: 0000000020001080 01:59:49 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1fffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:49 executing program 5 (fault-call:0 fault-nth:37): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:49 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x200000000000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:49 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x194, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 383.482702] FAULT_INJECTION: forcing a failure. [ 383.482702] name failslab, interval 1, probability 0, space 0, times 0 [ 383.499940] CPU: 1 PID: 22539 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 383.507853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 383.517224] Call Trace: [ 383.519826] dump_stack+0x1fc/0x2ef [ 383.523456] should_fail.cold+0xa/0xf [ 383.527255] ? setup_fault_attr+0x200/0x200 [ 383.531580] ? __lock_acquire+0x6de/0x3ff0 [ 383.535809] __should_failslab+0x115/0x180 [ 383.540032] should_failslab+0x5/0x10 [ 383.543831] kmem_cache_alloc+0x3f/0x370 [ 383.547902] ? mempool_alloc+0x350/0x350 [ 383.551972] mempool_alloc+0x146/0x350 [ 383.555873] ? mempool_resize+0x790/0x790 [ 383.560023] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 383.564865] ? kernel_fpu_enable+0x1f/0x40 [ 383.569132] ? kernel_fpu_end+0x11b/0x170 [ 383.573428] ? kernel_fpu_enable+0x40/0x40 [ 383.577682] bio_alloc_bioset+0x389/0x5e0 01:59:49 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x195, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 383.581849] ? bvec_alloc+0x2f0/0x2f0 [ 383.585657] ? lock_downgrade+0x720/0x720 [ 383.589813] ? check_preemption_disabled+0x41/0x280 [ 383.594854] submit_bh_wbc+0x141/0x760 [ 383.599173] __sync_dirty_buffer+0x14e/0x320 [ 383.603867] __ext4_handle_dirty_metadata+0x234/0x590 [ 383.609164] ? ext4_dirent_csum_set+0x1e1/0x2c0 [ 383.613833] add_dirent_to_buf+0x44a/0x770 [ 383.618061] ? ext4_insert_dentry+0x490/0x490 [ 383.622659] ? __ext4_read_dirblock+0x3cd/0x9d0 [ 383.627322] ext4_add_entry+0x508/0xbb0 [ 383.631283] ? make_indexed_dir+0xee0/0xee0 [ 383.635594] ? __sync_dirty_buffer+0x1ef/0x320 [ 383.640163] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 383.645519] ext4_mkdir+0x6f5/0xe10 [ 383.649566] ? ext4_init_dot_dotdot+0x600/0x600 [ 383.654234] ? generic_permission+0x116/0x4d0 [ 383.658741] ? inode_permission.part.0+0x10c/0x450 [ 383.663671] vfs_mkdir+0x508/0x7a0 [ 383.667225] do_mkdirat+0x262/0x2d0 [ 383.670861] ? __ia32_sys_mknod+0x120/0x120 [ 383.675397] ? trace_hardirqs_off_caller+0x6e/0x210 [ 383.680766] ? do_syscall_64+0x21/0x620 [ 383.685117] do_syscall_64+0xf9/0x620 [ 383.688924] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 383.694190] RIP: 0033:0x465707 [ 383.697796] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 383.716906] RSP: 002b:00007fbaf0827fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 [ 383.724669] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465707 01:59:50 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) io_setup(0x2e, &(0x7f0000000400)=0x0) io_submit(r2, 0x1b, &(0x7f0000000540)=[&(0x7f00000000c0)={0xffffff7f, 0x79000000, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x1a31e3fd987a7d49, 0x7000000}]) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r1}, 0x8) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r5 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCINQ(r5, 0x541b, &(0x7f0000003c40)) io_submit(r2, 0x2, &(0x7f0000000340)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x5, 0x2, r3, &(0x7f00000000c0)="137ff4d80808377ca05fc548e132aa6750bc221d0750a185bbf79041d53efa3491b45765bb35e261b723", 0x2a, 0x7, 0x0, 0x1, r4}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x3, 0x300, r5, &(0x7f0000000440)="f971189b80348461ab320c9a69c38e3a14e98aba4de6a58197b37360d0512e8a55084f73468e4cf7f81cf2717a505b37a873d9d98960f336d6a14be109ae786e8a24b07606ae9814d6ecfe083fa7577b7662c7f5f5f3e371e196ca6e1a7f0a598aa9ea79c2a7c1cf7e4b37a5e6f6ef1b5cf683b1b99a80757f79698669c9afa5b548ee30c4db02d01013fb584280c0488cb3176a7440b1e140d5a5b9f93ac8b4e94e0d0c62e37bf5864038543c4fb23016022f6db9b1e46df41235681e0207fe1cbe5503c3e0f87e82ef708dfcad245738d56f980d8d9bf41c7bdaf0f6791ec51e2011c333c666c83e5389298ba2e4e46cff9856341c734ea51842e4843e", 0xfe, 0x7, 0x0, 0x2, r1}]) preadv(r1, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r6 = open(&(0x7f0000000640)='./bus\x00', 0x400, 0x40) sendfile(r0, r6, 0x0, 0x8400fffffffa) [ 383.731934] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 383.739203] RBP: 00007fbaf0828040 R08: 0000000000000000 R09: ffffffffffffffff [ 383.746510] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 383.753773] R13: 0000000020000100 R14: 00007fbaf0828000 R15: 0000000020001080 01:59:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x300000000000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:50 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x196, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:50 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x197, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x37dc12502000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:50 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x400000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:50 executing program 5 (fault-call:0 fault-nth:38): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 384.026057] audit: type=1804 audit(1630461590.324:241): pid=22569 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/226/file0/bus" dev="loop1" ino=1 res=1 01:59:50 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000840)=[{&(0x7f0000000080)=""/2, 0x2}, {&(0x7f0000000200)=""/179, 0xb3}, {&(0x7f00000002c0)=""/181, 0xb5}, {&(0x7f00000000c0)=""/2, 0x2}, {&(0x7f0000000380)=""/233, 0xe9}, {&(0x7f0000000480)=""/146, 0x92}, {&(0x7f0000000140)}, {&(0x7f0000000540)=""/146, 0x92}, {&(0x7f0000000680)=""/205, 0xcd}, {&(0x7f0000000780)=""/186, 0xba}], 0xa, 0xda1, 0x0) r2 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) 01:59:50 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x198, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 384.188568] FAULT_INJECTION: forcing a failure. [ 384.188568] name failslab, interval 1, probability 0, space 0, times 0 [ 384.211448] CPU: 1 PID: 22601 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 384.219760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 384.229306] Call Trace: [ 384.231902] dump_stack+0x1fc/0x2ef [ 384.235546] should_fail.cold+0xa/0xf [ 384.239398] ? setup_fault_attr+0x200/0x200 [ 384.243820] ? __lock_acquire+0x6de/0x3ff0 [ 384.248072] __should_failslab+0x115/0x180 [ 384.252337] should_failslab+0x5/0x10 [ 384.256144] kmem_cache_alloc+0x3f/0x370 [ 384.260217] ? mempool_alloc+0x350/0x350 [ 384.264473] mempool_alloc+0x146/0x350 [ 384.268586] ? mempool_resize+0x790/0x790 [ 384.272808] ? ext4_mark_iloc_dirty+0x1b0d/0x2b30 [ 384.277713] ? kernel_fpu_enable+0x1f/0x40 [ 384.281942] ? kernel_fpu_end+0x11b/0x170 [ 384.286197] ? kernel_fpu_enable+0x40/0x40 [ 384.290424] bio_alloc_bioset+0x389/0x5e0 [ 384.294681] ? bvec_alloc+0x2f0/0x2f0 [ 384.298736] ? lock_downgrade+0x720/0x720 [ 384.302891] ? check_preemption_disabled+0x41/0x280 [ 384.308652] submit_bh_wbc+0x141/0x760 [ 384.312546] __sync_dirty_buffer+0x14e/0x320 [ 384.317071] __ext4_handle_dirty_metadata+0x234/0x590 [ 384.322262] ? ext4_dirent_csum_set+0x1e1/0x2c0 [ 384.326930] add_dirent_to_buf+0x44a/0x770 [ 384.331176] ? ext4_insert_dentry+0x490/0x490 [ 384.335673] ? __ext4_read_dirblock+0x3cd/0x9d0 [ 384.340333] ext4_add_entry+0x508/0xbb0 [ 384.344305] ? make_indexed_dir+0xee0/0xee0 [ 384.348615] ? __sync_dirty_buffer+0x1ef/0x320 [ 384.353181] ? __ext4_handle_dirty_metadata+0x1e0/0x590 [ 384.358621] ext4_mkdir+0x6f5/0xe10 [ 384.362241] ? ext4_init_dot_dotdot+0x600/0x600 [ 384.366910] ? generic_permission+0x116/0x4d0 [ 384.371419] ? inode_permission.part.0+0x10c/0x450 [ 384.376361] vfs_mkdir+0x508/0x7a0 [ 384.380311] do_mkdirat+0x262/0x2d0 [ 384.383955] ? __ia32_sys_mknod+0x120/0x120 [ 384.388295] ? trace_hardirqs_off_caller+0x6e/0x210 [ 384.393325] ? do_syscall_64+0x21/0x620 [ 384.397456] do_syscall_64+0xf9/0x620 [ 384.401268] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 384.406453] RIP: 0033:0x465707 [ 384.409668] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 384.428660] RSP: 002b:00007fbaf0827fa8 EFLAGS: 00000213 ORIG_RAX: 0000000000000053 01:59:50 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:50 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x400000000000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) [ 384.436463] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000465707 [ 384.443731] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 384.451883] RBP: 00007fbaf0828040 R08: 0000000000000000 R09: ffffffffffffffff [ 384.459190] R10: 0000000000000000 R11: 0000000000000213 R12: 0000000020000000 [ 384.467028] R13: 0000000020000100 R14: 00007fbaf0828000 R15: 0000000020001080 01:59:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:50 executing program 5 (fault-call:0 fault-nth:39): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:50 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x19a, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:50 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x600000000000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:51 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x19b, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:51 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 384.783186] FAULT_INJECTION: forcing a failure. [ 384.783186] name failslab, interval 1, probability 0, space 0, times 0 [ 384.808356] CPU: 0 PID: 22647 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 384.816266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 384.825624] Call Trace: [ 384.828216] dump_stack+0x1fc/0x2ef [ 384.831859] should_fail.cold+0xa/0xf [ 384.835671] ? setup_fault_attr+0x200/0x200 [ 384.839999] ? lock_acquire+0x170/0x3c0 [ 384.843996] __should_failslab+0x115/0x180 [ 384.848251] should_failslab+0x5/0x10 [ 384.852057] __kmalloc_track_caller+0x2a6/0x3c0 [ 384.856736] ? strndup_user+0x70/0x120 [ 384.860636] memdup_user+0x22/0xb0 [ 384.864189] strndup_user+0x70/0x120 [ 384.867910] ksys_mount+0x34/0x130 [ 384.871514] __x64_sys_mount+0xba/0x150 [ 384.875503] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 384.880091] do_syscall_64+0xf9/0x620 [ 384.883992] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 384.889186] RIP: 0033:0x467b1a [ 384.892557] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 384.911465] RSP: 002b:00007fbaf0827fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 384.919193] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 384.926739] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fbaf0828000 [ 384.934019] RBP: 00007fbaf0828040 R08: 00007fbaf0828040 R09: 0000000020000000 [ 384.941301] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 384.948580] R13: 0000000020000100 R14: 00007fbaf0828000 R15: 0000000020001080 01:59:51 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 385.186123] kauditd_printk_skb: 2 callbacks suppressed [ 385.186146] audit: type=1804 audit(1630461591.484:244): pid=22682 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/227/bus" dev="sda1" ino=15153 res=1 01:59:51 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) open(&(0x7f0000000080)='./file0\x00', 0x4a900, 0x0) ftruncate(r0, 0x800) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x2b, 0xda1, 0x0) ioctl$KVM_GET_FPU(r1, 0x81a0ae8c, &(0x7f0000000200)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r3 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, 0x0, 0x8400fffffffa) 01:59:51 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x19c, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:51 executing program 5 (fault-call:0 fault-nth:40): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x700000000000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:51 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 385.217784] audit: type=1804 audit(1630461591.514:245): pid=22685 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/227/bus" dev="sda1" ino=15153 res=1 01:59:51 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x19d, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:51 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 385.366764] FAULT_INJECTION: forcing a failure. [ 385.366764] name failslab, interval 1, probability 0, space 0, times 0 [ 385.394983] CPU: 0 PID: 22701 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 385.403069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 385.412438] Call Trace: [ 385.415038] dump_stack+0x1fc/0x2ef [ 385.418680] should_fail.cold+0xa/0xf [ 385.422501] ? setup_fault_attr+0x200/0x200 [ 385.426826] ? lock_acquire+0x170/0x3c0 [ 385.430803] __should_failslab+0x115/0x180 [ 385.435043] should_failslab+0x5/0x10 [ 385.438841] __kmalloc_track_caller+0x2a6/0x3c0 [ 385.443506] ? strndup_user+0x70/0x120 [ 385.447380] ? _copy_from_user+0xd2/0x130 [ 385.451711] memdup_user+0x22/0xb0 [ 385.455374] strndup_user+0x70/0x120 [ 385.459157] ksys_mount+0x6f/0x130 [ 385.462688] __x64_sys_mount+0xba/0x150 [ 385.466664] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 385.471244] do_syscall_64+0xf9/0x620 [ 385.475048] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 385.480237] RIP: 0033:0x467b1a [ 385.483414] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 385.502450] RSP: 002b:00007fbaf0827fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 385.510145] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a 01:59:51 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x800000000000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) [ 385.517442] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fbaf0828000 [ 385.524819] RBP: 00007fbaf0828040 R08: 00007fbaf0828040 R09: 0000000020000000 [ 385.532147] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 385.539432] R13: 0000000020000100 R14: 00007fbaf0828000 R15: 0000000020001080 01:59:51 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x19e, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:51 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x23000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:52 executing program 5 (fault-call:0 fault-nth:41): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 385.662873] audit: type=1804 audit(1630461591.954:246): pid=22714 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/228/file0/bus" dev="loop1" ino=1 res=1 01:59:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xb00000000000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) [ 385.739724] audit: type=1804 audit(1630461592.034:247): pid=22735 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/228/file0/bus" dev="loop1" ino=1 res=1 01:59:52 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) creat(&(0x7f0000000080)='./bus\x00', 0x7) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1, 0x21) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r2 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) 01:59:52 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:52 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x19f, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 385.892647] FAULT_INJECTION: forcing a failure. [ 385.892647] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 385.904948] CPU: 0 PID: 22749 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 385.912834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 385.922200] Call Trace: [ 385.924813] dump_stack+0x1fc/0x2ef [ 385.928631] should_fail.cold+0xa/0xf [ 385.932494] ? setup_fault_attr+0x200/0x200 [ 385.936843] ? unwind_next_frame+0xeee/0x1400 [ 385.941446] ? __save_stack_trace+0x72/0x190 [ 385.945868] ? deref_stack_reg+0x134/0x1d0 [ 385.950107] ? get_reg+0x176/0x1f0 [ 385.953647] __alloc_pages_nodemask+0x239/0x2890 [ 385.958441] ? cmp_ex_search+0x87/0xb0 [ 385.962338] ? __lock_acquire+0x6de/0x3ff0 [ 385.966667] ? copy_mount_options+0x1e9/0x380 [ 385.971179] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 385.976733] ? ex_handler_default+0x14/0x90 [ 385.981065] ? phys_mem_access_encrypted+0x10/0x10 [ 385.986011] ? no_context+0xce/0x940 [ 385.989734] ? force_sig_info_fault.constprop.0+0x320/0x320 [ 385.995540] ? bad_area_access_error+0x23b/0x4a0 [ 386.000337] cache_grow_begin+0xa4/0x8a0 [ 386.004414] ? setup_fault_attr+0x200/0x200 [ 386.008733] ? lock_acquire+0x170/0x3c0 [ 386.012708] cache_alloc_refill+0x273/0x340 [ 386.017054] kmem_cache_alloc+0x346/0x370 [ 386.021218] getname_flags+0xce/0x590 [ 386.025072] user_path_at_empty+0x2a/0x50 [ 386.029225] do_mount+0x147/0x2f50 [ 386.033193] ? cmp_ex_sort+0xc0/0xc0 [ 386.036911] ? __do_page_fault+0x180/0xd60 [ 386.041140] ? copy_mount_string+0x40/0x40 [ 386.045389] ? memset+0x20/0x40 [ 386.048713] ? copy_mount_options+0x26f/0x380 [ 386.053209] ksys_mount+0xcf/0x130 [ 386.056788] __x64_sys_mount+0xba/0x150 [ 386.060775] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 386.065368] do_syscall_64+0xf9/0x620 [ 386.069200] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 386.074410] RIP: 0033:0x467b1a 01:59:52 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1a0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 386.077740] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 386.096701] RSP: 002b:00007fbaf0827fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 386.104422] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 386.111696] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fbaf0828000 [ 386.119249] RBP: 00007fbaf0828040 R08: 00007fbaf0828040 R09: 0000000020000000 [ 386.127036] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 386.134319] R13: 0000000020000100 R14: 00007fbaf0828000 R15: 0000000020001080 01:59:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000000000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) [ 386.204483] audit: type=1804 audit(1630461592.494:248): pid=22767 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/229/file0/bus" dev="loop1" ino=1 res=1 01:59:52 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) open(&(0x7f0000000840)='./file1\x00', 0xe3328d345d1e53d3, 0x100) r0 = syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f00000000c0)='./bus\x00', 0x8, 0x4, &(0x7f0000000440)=[{&(0x7f0000000140)="e981a16e5178ff8d0158e70f9608f7f0410ac5e88ae869724d90b081ad23184c0dab8c5720f4c195be8fc5a25357176e740d42a349f5e8a5", 0x38, 0x7}, {&(0x7f0000000200)="6b9f43017f04f89cbe1e2683088e95c89cca600ce77ab1589578c79a981c71f1f0334587b34f36ff0b593ce1a05c34c03e5ddc898ca9dd6822b90ce88aecaf0e050af195a90d2388a24488a90e1a8bb5d4758b7f7d9b6bbf0ef2748c5b7b82fb9d221c7fe6e4a38aa5f3e789edbd6434ea2d7e3692f5b17eb2c29f4d80904b6db92655046eb187dae66cf6e4584ac58221563c0e2446d35c47e5d09e8550e989243804bd720c2af0ef977430e7cbef030731f2a29eea8655372be6fb26a2d0bbd9ea497484", 0xc5, 0x1}, {&(0x7f0000000300)="617ccb7df24316ed930262c62c558e12fc625307b9729c04e0c09ac508a550f42412cfdbb6664f32fe12d3569886d3197814fe2417dc684769123aab3bf8dcfce7a88ba28560239c2a2f19618d163fb314e69d4138c7341bf00110a420573db070f312907793706ecee2207d978fe296e383baa6ccd22e6492cda40894d9b7911fb90835c9979e83e674613e39bc015cd79cac655c729b37f0ef29ee6f3c7fcfb90955bd7f4c048f538d4dfce0244b8b23f55fc0c1ead34a8702f108c56b36a3022fa5732cd2c1", 0xc7, 0xffffffffffffffc9}, {&(0x7f0000000400)="4d8dba1c444ab69bb881603974ba7658ec8869e7c1ff9981e20277460a11ef13a197450a1ecf0aa468faa44cb9a3622b8fe2", 0x32, 0x5865}], 0xa038, &(0x7f00000004c0)=ANY=[@ANYBLOB="6e6f696e69745f697461626c652c6175746f5f6461af374be6801df63f5f616c656c616c6c6f632c6e6f696e69745f697461626c652c2c000000000000"]) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/diskstats\x00', 0x0, 0x0) mount$fuseblk(&(0x7f00000005c0), &(0x7f0000000600)='./file2\x00', &(0x7f0000000680), 0x804000, &(0x7f0000000700)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@max_read={'max_read', 0x3d, 0x101}}, {@max_read={'max_read', 0x3d, 0x7fff}}, {@blksize={'blksize', 0x3d, 0x400}}, {@allow_other}, {@default_permissions}]}}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000540)={@id={0x2, 0x0, @b}}) chdir(&(0x7f0000000040)='./file0\x00') r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r2, 0x800) lseek(r2, 0x0, 0x2) creat(&(0x7f0000000580)='./file1\x00', 0x40) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r1, 0x7706, &(0x7f0000000880)) preadv(r3, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r4 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x8400fffffffa) 01:59:52 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1a1, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 386.281895] audit: type=1804 audit(1630461592.494:249): pid=22767 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/229/file0/bus" dev="loop1" ino=1 res=1 01:59:52 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1a2, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 386.367963] BTRFS warning (device ): duplicate device /dev/loop5 devid 0 generation 0 scanned by syz-executor.5 (22749) 01:59:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3f00000000000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) [ 386.410430] audit: type=1800 audit(1630461592.704:250): pid=22785 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="file1" dev="sda1" ino=13987 res=0 [ 386.472988] audit: type=1804 audit(1630461592.764:251): pid=22785 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/230/file0/bus" dev="loop1" ino=1 res=1 01:59:52 executing program 5 (fault-call:0 fault-nth:42): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:52 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8cffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:52 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1a3, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:52 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x5000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:52 executing program 1: r0 = syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r0, 0x0, 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x0, 0xda1, 0x10) r3 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x8400fffffffa) [ 386.592392] audit: type=1804 audit(1630461592.764:252): pid=22785 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/230/file0/bus" dev="loop1" ino=1 res=1 [ 386.623592] audit: type=1804 audit(1630461592.814:253): pid=22785 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/230/file0/bus" dev="loop1" ino=1 res=1 01:59:52 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8000000000000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:52 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1a4, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 386.721305] FAULT_INJECTION: forcing a failure. [ 386.721305] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 386.733132] CPU: 0 PID: 22803 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 386.741001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 386.750696] Call Trace: [ 386.753281] dump_stack+0x1fc/0x2ef [ 386.756904] should_fail.cold+0xa/0xf [ 386.760694] ? setup_fault_attr+0x200/0x200 [ 386.765011] ? unwind_next_frame+0xeee/0x1400 [ 386.769499] ? __save_stack_trace+0x72/0x190 [ 386.773908] ? deref_stack_reg+0x134/0x1d0 [ 386.778162] ? get_reg+0x176/0x1f0 [ 386.781704] __alloc_pages_nodemask+0x239/0x2890 [ 386.786562] ? cmp_ex_search+0x87/0xb0 [ 386.790454] ? __lock_acquire+0x6de/0x3ff0 [ 386.794680] ? copy_mount_options+0x1e9/0x380 [ 386.799169] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 386.804005] ? ex_handler_default+0x14/0x90 [ 386.808435] ? phys_mem_access_encrypted+0x10/0x10 [ 386.813666] ? no_context+0xce/0x940 [ 386.817385] ? force_sig_info_fault.constprop.0+0x320/0x320 [ 386.823104] ? bad_area_access_error+0x23b/0x4a0 [ 386.827896] cache_grow_begin+0xa4/0x8a0 [ 386.831966] ? setup_fault_attr+0x200/0x200 [ 386.836289] ? lock_acquire+0x170/0x3c0 [ 386.840382] cache_alloc_refill+0x273/0x340 [ 386.844722] kmem_cache_alloc+0x346/0x370 [ 386.848889] getname_flags+0xce/0x590 [ 386.852708] user_path_at_empty+0x2a/0x50 [ 386.856859] do_mount+0x147/0x2f50 [ 386.860402] ? cmp_ex_sort+0xc0/0xc0 [ 386.864102] ? __do_page_fault+0x180/0xd60 [ 386.868427] ? copy_mount_string+0x40/0x40 [ 386.872881] ? memset+0x20/0x40 [ 386.876163] ? copy_mount_options+0x26f/0x380 [ 386.880678] ksys_mount+0xcf/0x130 [ 386.884329] __x64_sys_mount+0xba/0x150 [ 386.888310] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 386.892910] do_syscall_64+0xf9/0x620 [ 386.896722] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 386.901902] RIP: 0033:0x467b1a [ 386.905092] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 386.924357] RSP: 002b:00007fbaf0827fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 386.932064] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 386.939426] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fbaf0828000 [ 386.947123] RBP: 00007fbaf0828040 R08: 00007fbaf0828040 R09: 0000000020000000 [ 386.954399] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 386.962271] R13: 0000000020000100 R14: 00007fbaf0828000 R15: 0000000020001080 01:59:53 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1a5, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:53 executing program 5 (fault-call:0 fault-nth:43): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xeffdffffffffffff, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:53 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1a6, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:53 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:53 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1a7, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 387.232236] FAULT_INJECTION: forcing a failure. [ 387.232236] name failslab, interval 1, probability 0, space 0, times 0 [ 387.272466] CPU: 1 PID: 22843 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 387.280500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 387.289882] Call Trace: [ 387.292483] dump_stack+0x1fc/0x2ef [ 387.296212] should_fail.cold+0xa/0xf [ 387.300033] ? setup_fault_attr+0x200/0x200 [ 387.304360] ? lock_acquire+0x170/0x3c0 [ 387.308531] __should_failslab+0x115/0x180 [ 387.312768] should_failslab+0x5/0x10 [ 387.316682] kmem_cache_alloc+0x277/0x370 [ 387.320832] getname_flags+0xce/0x590 [ 387.324716] user_path_at_empty+0x2a/0x50 [ 387.328956] do_mount+0x147/0x2f50 [ 387.332500] ? cmp_ex_sort+0xc0/0xc0 [ 387.336426] ? __do_page_fault+0x180/0xd60 [ 387.340909] ? copy_mount_string+0x40/0x40 [ 387.345136] ? memset+0x20/0x40 [ 387.348399] ? copy_mount_options+0x26f/0x380 [ 387.352884] ksys_mount+0xcf/0x130 [ 387.356473] __x64_sys_mount+0xba/0x150 [ 387.360438] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 387.365020] do_syscall_64+0xf9/0x620 [ 387.368971] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 387.374322] RIP: 0033:0x467b1a [ 387.377515] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 387.396442] RSP: 002b:00007fbaf0827fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 387.404153] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 387.411421] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fbaf0828000 01:59:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xc0ed0000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf6ffffff00000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:53 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) ioctl$SIOCAX25GETINFO(r1, 0x89ed, &(0x7f0000000080)) preadv(r1, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r2 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) 01:59:53 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1a8, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 387.418679] RBP: 00007fbaf0828040 R08: 00007fbaf0828040 R09: 0000000020000000 [ 387.425940] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 387.433194] R13: 0000000020000100 R14: 00007fbaf0828000 R15: 0000000020001080 01:59:53 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1a9, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:53 executing program 5 (fault-call:0 fault-nth:44): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:53 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfcfdffff00000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:53 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1aa, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 387.673039] FAULT_INJECTION: forcing a failure. [ 387.673039] name failslab, interval 1, probability 0, space 0, times 0 [ 387.686435] CPU: 0 PID: 22884 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 387.694411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 387.703925] Call Trace: [ 387.706500] dump_stack+0x1fc/0x2ef [ 387.710116] should_fail.cold+0xa/0xf [ 387.713905] ? setup_fault_attr+0x200/0x200 [ 387.718223] ? lock_acquire+0x170/0x3c0 [ 387.722185] __should_failslab+0x115/0x180 [ 387.726407] should_failslab+0x5/0x10 [ 387.730298] kmem_cache_alloc+0x277/0x370 [ 387.734444] alloc_vfsmnt+0x23/0x780 [ 387.738176] vfs_kern_mount.part.0+0x27/0x470 [ 387.742669] ? kfree+0x110/0x210 [ 387.746035] vfs_kern_mount+0x3c/0x60 [ 387.750059] btrfs_mount+0x23a/0xaa0 [ 387.753755] ? btrfs_show_options+0xfd0/0xfd0 [ 387.758291] ? __mutex_unlock_slowpath+0xea/0x610 [ 387.763324] ? check_preemption_disabled+0x41/0x280 [ 387.768329] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 387.773337] ? pcpu_alloc+0xc9/0x1190 [ 387.777135] ? __lockdep_init_map+0x100/0x5a0 [ 387.781647] mount_fs+0xa3/0x310 [ 387.785036] vfs_kern_mount.part.0+0x68/0x470 [ 387.789625] do_mount+0x115c/0x2f50 [ 387.793248] ? cmp_ex_sort+0xc0/0xc0 [ 387.796961] ? __do_page_fault+0x180/0xd60 [ 387.801190] ? copy_mount_string+0x40/0x40 [ 387.805431] ? memset+0x20/0x40 [ 387.808714] ? copy_mount_options+0x26f/0x380 [ 387.813207] ksys_mount+0xcf/0x130 [ 387.816747] __x64_sys_mount+0xba/0x150 [ 387.820712] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 387.825283] do_syscall_64+0xf9/0x620 [ 387.829079] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 387.834253] RIP: 0033:0x467b1a [ 387.837435] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 387.856449] RSP: 002b:00007fbaf0827fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 387.864193] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a 01:59:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf5ffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 387.871451] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fbaf0828000 [ 387.878705] RBP: 00007fbaf0828040 R08: 00007fbaf0828040 R09: 0000000020000000 [ 387.885969] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 387.893242] R13: 0000000020000100 R14: 00007fbaf0828000 R15: 0000000020001080 01:59:54 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:54 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r2 = open(&(0x7f00000000c0)='./bus\x00', 0xaa340, 0xe0) sendfile(r0, r2, 0x0, 0x8400fffffffa) 01:59:54 executing program 5 (fault-call:0 fault-nth:45): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfdfdffff00000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:54 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1ab, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfeffffff00000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) [ 388.163817] FAULT_INJECTION: forcing a failure. [ 388.163817] name failslab, interval 1, probability 0, space 0, times 0 [ 388.182677] CPU: 1 PID: 22923 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 388.190671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 388.200327] Call Trace: [ 388.202909] dump_stack+0x1fc/0x2ef [ 388.206697] should_fail.cold+0xa/0xf [ 388.210580] ? setup_fault_attr+0x200/0x200 [ 388.214896] ? lock_acquire+0x170/0x3c0 [ 388.218997] __should_failslab+0x115/0x180 [ 388.223234] should_failslab+0x5/0x10 [ 388.227029] __kmalloc_track_caller+0x2a6/0x3c0 [ 388.231698] ? kstrdup_const+0x53/0x80 [ 388.235579] kstrdup+0x36/0x70 [ 388.238758] kstrdup_const+0x53/0x80 [ 388.242587] alloc_vfsmnt+0xb5/0x780 [ 388.246298] ? _raw_read_unlock+0x29/0x40 [ 388.250431] vfs_kern_mount.part.0+0x27/0x470 [ 388.254927] do_mount+0x115c/0x2f50 [ 388.258554] ? cmp_ex_sort+0xc0/0xc0 [ 388.262248] ? __do_page_fault+0x180/0xd60 [ 388.266474] ? copy_mount_string+0x40/0x40 [ 388.271147] ? memset+0x20/0x40 [ 388.274411] ? copy_mount_options+0x26f/0x380 [ 388.278904] ksys_mount+0xcf/0x130 [ 388.282495] __x64_sys_mount+0xba/0x150 [ 388.286553] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 388.291121] do_syscall_64+0xf9/0x620 [ 388.295022] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 388.300199] RIP: 0033:0x467b1a [ 388.303473] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 388.322371] RSP: 002b:00007fbaf0827fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 388.330250] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 388.337517] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fbaf0828000 [ 388.344773] RBP: 00007fbaf0828040 R08: 00007fbaf0828040 R09: 0000000020000000 [ 388.352156] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 01:59:54 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1ac, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 388.359443] R13: 0000000020000100 R14: 00007fbaf0828000 R15: 0000000020001080 01:59:54 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x320, 0x3, &(0x7f0000000180)=[{&(0x7f0000000280)="0004000000000100010066a8440000000000ddffff7f800000005a4d86e5b85dd4a607f4660f025d8a7d2c55705aad55deb1c83516fe0dc8bf138cbb8084bab22e6a3b22", 0x44, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x0, 0xda1, 0x400) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f0000000200), 0x2, 0x3) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000080)={r0, r1, 0x15}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ftruncate(r2, 0x1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x2b, 0xda1, 0x0) openat(r3, &(0x7f0000000240)='./file1\x00', 0x60800, 0x82) preadv(r2, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r4 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r0, r4, 0x0, 0x8400fffffffa) 01:59:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:54 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:54 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1ad, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:54 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffffff00000000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:54 executing program 5 (fault-call:0 fault-nth:46): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:54 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1ae, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 388.655248] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. [ 388.756249] FAULT_INJECTION: forcing a failure. [ 388.756249] name failslab, interval 1, probability 0, space 0, times 0 [ 388.768959] CPU: 0 PID: 22969 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 388.776863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 388.786312] Call Trace: [ 388.788906] dump_stack+0x1fc/0x2ef [ 388.792529] should_fail.cold+0xa/0xf [ 388.796421] ? setup_fault_attr+0x200/0x200 [ 388.800742] ? lock_acquire+0x170/0x3c0 [ 388.804802] __should_failslab+0x115/0x180 [ 388.809030] should_failslab+0x5/0x10 [ 388.812986] __kmalloc_track_caller+0x2a6/0x3c0 [ 388.817899] ? kstrdup_const+0x53/0x80 [ 388.821823] kstrdup+0x36/0x70 [ 388.825168] kstrdup_const+0x53/0x80 [ 388.828891] alloc_vfsmnt+0xb5/0x780 [ 388.832611] vfs_kern_mount.part.0+0x27/0x470 [ 388.837619] ? kfree+0x110/0x210 [ 388.840996] vfs_kern_mount+0x3c/0x60 [ 388.844807] btrfs_mount+0x23a/0xaa0 [ 388.848531] ? btrfs_show_options+0xfd0/0xfd0 [ 388.853012] ? __mutex_unlock_slowpath+0xea/0x610 [ 388.857845] ? check_preemption_disabled+0x41/0x280 [ 388.862869] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 388.867974] ? pcpu_alloc+0xc9/0x1190 [ 388.871775] ? __lockdep_init_map+0x100/0x5a0 [ 388.876277] mount_fs+0xa3/0x310 [ 388.879664] vfs_kern_mount.part.0+0x68/0x470 [ 388.884260] do_mount+0x115c/0x2f50 [ 388.887903] ? cmp_ex_sort+0xc0/0xc0 [ 388.891738] ? __do_page_fault+0x180/0xd60 [ 388.895979] ? copy_mount_string+0x40/0x40 [ 388.900219] ? memset+0x20/0x40 [ 388.903485] ? copy_mount_options+0x26f/0x380 [ 388.907973] ksys_mount+0xcf/0x130 [ 388.911558] __x64_sys_mount+0xba/0x150 [ 388.915542] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 388.920140] do_syscall_64+0xf9/0x620 [ 388.923956] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 388.929148] RIP: 0033:0x467b1a [ 388.932346] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 01:59:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffdef, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:55 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfbffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 388.951247] RSP: 002b:00007fbaf0827fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 388.958971] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 388.966286] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fbaf0828000 [ 388.973555] RBP: 00007fbaf0828040 R08: 00007fbaf0828040 R09: 0000000020000000 [ 388.980822] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 388.988086] R13: 0000000020000100 R14: 00007fbaf0828000 R15: 0000000020001080 01:59:55 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1af, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:55 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:55 executing program 5 (fault-call:0 fault-nth:47): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 389.266848] FAULT_INJECTION: forcing a failure. [ 389.266848] name failslab, interval 1, probability 0, space 0, times 0 [ 389.320988] CPU: 1 PID: 23003 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 389.328907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 389.338649] Call Trace: [ 389.341252] dump_stack+0x1fc/0x2ef [ 389.344905] should_fail.cold+0xa/0xf [ 389.348723] ? setup_fault_attr+0x200/0x200 [ 389.353061] ? lock_acquire+0x170/0x3c0 [ 389.357083] __should_failslab+0x115/0x180 [ 389.361329] should_failslab+0x5/0x10 [ 389.365138] kmem_cache_alloc+0x277/0x370 [ 389.369394] alloc_vfsmnt+0x23/0x780 [ 389.373122] vfs_kern_mount.part.0+0x27/0x470 [ 389.377651] ? kfree+0x110/0x210 [ 389.381033] vfs_kern_mount+0x3c/0x60 [ 389.384950] btrfs_mount+0x23a/0xaa0 [ 389.388684] ? btrfs_show_options+0xfd0/0xfd0 [ 389.393201] ? __mutex_unlock_slowpath+0xea/0x610 [ 389.398061] ? check_preemption_disabled+0x41/0x280 [ 389.403169] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 389.408204] ? pcpu_alloc+0xc9/0x1190 [ 389.412019] ? __lockdep_init_map+0x100/0x5a0 [ 389.416533] mount_fs+0xa3/0x310 [ 389.419918] vfs_kern_mount.part.0+0x68/0x470 [ 389.424430] do_mount+0x115c/0x2f50 [ 389.428067] ? cmp_ex_sort+0xc0/0xc0 [ 389.431792] ? __do_page_fault+0x180/0xd60 [ 389.436042] ? copy_mount_string+0x40/0x40 [ 389.440301] ? memset+0x20/0x40 [ 389.443593] ? copy_mount_options+0x26f/0x380 [ 389.448107] ksys_mount+0xcf/0x130 [ 389.451665] __x64_sys_mount+0xba/0x150 [ 389.455658] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 389.460255] do_syscall_64+0xf9/0x620 [ 389.464072] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 389.469266] RIP: 0033:0x467b1a [ 389.472469] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 389.491389] RSP: 002b:00007fbaf0827fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 389.499106] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 389.506476] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fbaf0828000 [ 389.513756] RBP: 00007fbaf0828040 R08: 00007fbaf0828040 R09: 0000000020000000 [ 389.521048] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 389.528333] R13: 0000000020000100 R14: 00007fbaf0828000 R15: 0000000020001080 [ 389.572631] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 01:59:55 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) open(&(0x7f0000000280)='./bus\x00', 0x224000, 0x14d4676921a963b6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mount(&(0x7f00000000c0)=@nullb, &(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='incremental-fs\x00', 0x280a005, &(0x7f0000000240)='&c$\\#\x00') mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r2 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) mkdir(&(0x7f0000000080)='./bus\x00', 0x28) 01:59:55 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1b0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:55 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:55 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xff0f0000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:55 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1f000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:55 executing program 5 (fault-call:0 fault-nth:48): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:56 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1b1, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:56 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1b2, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:56 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffff1f00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 389.868369] FAULT_INJECTION: forcing a failure. [ 389.868369] name failslab, interval 1, probability 0, space 0, times 0 [ 389.899432] CPU: 0 PID: 23044 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 389.907342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 389.916694] Call Trace: [ 389.919276] dump_stack+0x1fc/0x2ef [ 389.922893] should_fail.cold+0xa/0xf [ 389.926683] ? setup_fault_attr+0x200/0x200 [ 389.930993] ? lock_acquire+0x170/0x3c0 [ 389.934979] __should_failslab+0x115/0x180 [ 389.939215] should_failslab+0x5/0x10 [ 389.943011] kmem_cache_alloc_trace+0x284/0x380 [ 389.947676] btrfs_mount_root+0x188/0x1830 [ 389.951915] ? btrfs_decode_error+0x70/0x70 [ 389.956239] ? __mutex_unlock_slowpath+0xea/0x610 [ 389.961081] ? check_preemption_disabled+0x41/0x280 [ 389.966094] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 389.971102] ? pcpu_alloc+0xc9/0x1190 [ 389.974969] ? __lockdep_init_map+0x100/0x5a0 [ 389.979459] mount_fs+0xa3/0x310 [ 389.982834] vfs_kern_mount.part.0+0x68/0x470 [ 389.987326] ? kfree+0x110/0x210 [ 389.990681] vfs_kern_mount+0x3c/0x60 [ 389.994476] btrfs_mount+0x23a/0xaa0 [ 389.998215] ? btrfs_show_options+0xfd0/0xfd0 [ 390.002745] ? __mutex_unlock_slowpath+0xea/0x610 [ 390.007587] ? check_preemption_disabled+0x41/0x280 [ 390.012635] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 390.017825] ? pcpu_alloc+0xc9/0x1190 [ 390.021619] ? __lockdep_init_map+0x100/0x5a0 [ 390.026129] mount_fs+0xa3/0x310 [ 390.029522] vfs_kern_mount.part.0+0x68/0x470 [ 390.034021] do_mount+0x115c/0x2f50 [ 390.037760] ? cmp_ex_sort+0xc0/0xc0 [ 390.041488] ? __do_page_fault+0x180/0xd60 [ 390.046148] ? copy_mount_string+0x40/0x40 [ 390.050479] ? memset+0x20/0x40 [ 390.053928] ? copy_mount_options+0x26f/0x380 [ 390.058501] ksys_mount+0xcf/0x130 [ 390.062052] __x64_sys_mount+0xba/0x150 [ 390.066016] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 390.071060] do_syscall_64+0xf9/0x620 [ 390.074984] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 390.080180] RIP: 0033:0x467b1a [ 390.083363] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 390.102352] RSP: 002b:00007fbaf0827fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 390.110066] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 390.117525] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fbaf0828000 [ 390.124810] RBP: 00007fbaf0828040 R08: 00007fbaf0828040 R09: 0000000020000000 [ 390.132077] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 390.139398] R13: 0000000020000100 R14: 00007fbaf0828000 R15: 0000000020001080 01:59:56 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:56 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) [ 390.215527] kauditd_printk_skb: 8 callbacks suppressed [ 390.215539] audit: type=1804 audit(1630461596.515:262): pid=23057 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/235/file0/bus" dev="loop1" ino=1 res=1 01:59:56 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) open(&(0x7f0000000080)='./bus\x00', 0x541600, 0x28) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r2 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) 01:59:56 executing program 5 (fault-call:0 fault-nth:49): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:56 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1b3, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 390.391726] FAULT_INJECTION: forcing a failure. [ 390.391726] name failslab, interval 1, probability 0, space 0, times 0 [ 390.403822] CPU: 1 PID: 23072 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 390.411710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 390.421168] Call Trace: [ 390.423882] dump_stack+0x1fc/0x2ef [ 390.427502] should_fail.cold+0xa/0xf [ 390.431323] ? setup_fault_attr+0x200/0x200 [ 390.435658] ? lock_acquire+0x170/0x3c0 [ 390.439792] __should_failslab+0x115/0x180 [ 390.444026] should_failslab+0x5/0x10 [ 390.447817] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 390.452910] __kmalloc_node+0x38/0x70 [ 390.456699] kvmalloc_node+0xb4/0xf0 [ 390.460401] btrfs_mount_root+0x13f/0x1830 [ 390.464622] ? btrfs_decode_error+0x70/0x70 [ 390.468951] ? __mutex_unlock_slowpath+0xea/0x610 [ 390.473895] ? check_preemption_disabled+0x41/0x280 [ 390.478917] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 390.483923] ? pcpu_alloc+0xc9/0x1190 [ 390.487713] ? __lockdep_init_map+0x100/0x5a0 [ 390.492193] mount_fs+0xa3/0x310 [ 390.495544] vfs_kern_mount.part.0+0x68/0x470 [ 390.500024] ? kfree+0x110/0x210 [ 390.503372] vfs_kern_mount+0x3c/0x60 [ 390.507156] btrfs_mount+0x23a/0xaa0 [ 390.510852] ? btrfs_show_options+0xfd0/0xfd0 [ 390.515328] ? __mutex_unlock_slowpath+0xea/0x610 [ 390.520159] ? check_preemption_disabled+0x41/0x280 [ 390.525360] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 390.530369] ? pcpu_alloc+0xc9/0x1190 [ 390.534219] ? __lockdep_init_map+0x100/0x5a0 [ 390.538702] mount_fs+0xa3/0x310 [ 390.542054] vfs_kern_mount.part.0+0x68/0x470 [ 390.546737] do_mount+0x115c/0x2f50 [ 390.550449] ? cmp_ex_sort+0xc0/0xc0 [ 390.554187] ? __do_page_fault+0x180/0xd60 [ 390.558426] ? copy_mount_string+0x40/0x40 [ 390.562646] ? memset+0x20/0x40 [ 390.565912] ? copy_mount_options+0x26f/0x380 [ 390.570394] ksys_mount+0xcf/0x130 [ 390.573921] __x64_sys_mount+0xba/0x150 [ 390.577884] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 390.582451] do_syscall_64+0xf9/0x620 [ 390.586251] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 390.591432] RIP: 0033:0x467b1a [ 390.594609] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 390.613500] RSP: 002b:00007fbaf0827fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 390.621191] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 390.628537] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fbaf0828000 [ 390.635809] RBP: 00007fbaf0828040 R08: 00007fbaf0828040 R09: 0000000020000000 01:59:56 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1b4, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 390.643081] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 390.650365] R13: 0000000020000100 R14: 00007fbaf0828000 R15: 0000000020001080 01:59:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x223, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:57 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffff8c, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:57 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1b5, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:57 executing program 5 (fault-call:0 fault-nth:50): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 390.872345] audit: type=1804 audit(1630461597.165:263): pid=23100 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/236/bus" dev="sda1" ino=15162 res=1 01:59:57 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1b6, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8502000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) [ 391.029823] FAULT_INJECTION: forcing a failure. [ 391.029823] name failslab, interval 1, probability 0, space 0, times 0 01:59:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x48000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 391.101608] CPU: 1 PID: 23115 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 391.109631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 391.119251] Call Trace: [ 391.121862] dump_stack+0x1fc/0x2ef [ 391.125518] should_fail.cold+0xa/0xf [ 391.129327] ? setup_fault_attr+0x200/0x200 [ 391.133644] ? lock_acquire+0x170/0x3c0 [ 391.137615] __should_failslab+0x115/0x180 [ 391.141851] should_failslab+0x5/0x10 [ 391.145646] kmem_cache_alloc_trace+0x284/0x380 [ 391.150309] btrfs_mount_root+0x1e1/0x1830 [ 391.154540] ? btrfs_decode_error+0x70/0x70 [ 391.158865] ? __mutex_unlock_slowpath+0xea/0x610 [ 391.163699] ? check_preemption_disabled+0x41/0x280 [ 391.168720] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 391.173735] ? pcpu_alloc+0xc9/0x1190 [ 391.177539] ? __lockdep_init_map+0x100/0x5a0 [ 391.182034] mount_fs+0xa3/0x310 [ 391.185401] vfs_kern_mount.part.0+0x68/0x470 [ 391.189887] ? kfree+0x110/0x210 [ 391.193246] vfs_kern_mount+0x3c/0x60 [ 391.197036] btrfs_mount+0x23a/0xaa0 [ 391.200744] ? btrfs_show_options+0xfd0/0xfd0 [ 391.205238] ? __mutex_unlock_slowpath+0xea/0x610 [ 391.210090] ? check_preemption_disabled+0x41/0x280 [ 391.215272] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 391.220345] ? pcpu_alloc+0xc9/0x1190 [ 391.224145] ? __lockdep_init_map+0x100/0x5a0 [ 391.228636] mount_fs+0xa3/0x310 [ 391.232013] vfs_kern_mount.part.0+0x68/0x470 [ 391.236534] do_mount+0x115c/0x2f50 [ 391.240161] ? cmp_ex_sort+0xc0/0xc0 [ 391.243875] ? __do_page_fault+0x180/0xd60 [ 391.248108] ? copy_mount_string+0x40/0x40 [ 391.252346] ? memset+0x20/0x40 [ 391.255618] ? copy_mount_options+0x26f/0x380 [ 391.260105] ksys_mount+0xcf/0x130 [ 391.263655] __x64_sys_mount+0xba/0x150 [ 391.267627] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 391.272198] do_syscall_64+0xf9/0x620 [ 391.275991] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 391.281165] RIP: 0033:0x467b1a [ 391.284348] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 391.303322] RSP: 002b:00007fbaf0827fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 391.311016] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 391.318273] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fbaf0828000 [ 391.325617] RBP: 00007fbaf0828040 R08: 00007fbaf0828040 R09: 0000000020000000 [ 391.332881] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 391.340151] R13: 0000000020000100 R14: 00007fbaf0828000 R15: 0000000020001080 01:59:57 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1b7, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:57 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffff5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:57 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8503000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:57 executing program 5 (fault-call:0 fault-nth:51): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:57 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4c000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:57 executing program 1: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000003c40)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000300)=@getchain={0x5c, 0x66, 0x400, 0x70bd27, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0xb, 0x2}, {0x0, 0x9}, {0xffe0, 0xc}}, [{0x8, 0xb, 0x3}, {0x8, 0xb, 0x1}, {0x8, 0xb, 0x151bc662}, {0x8, 0xb, 0x8001}, {0x8, 0xb, 0x5}, {0x8, 0xb, 0x1de}, {0x8, 0xb, 0xffff7fff}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4008000}, 0x40001) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000003c40)) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCINQ(r2, 0x541b, &(0x7f0000003c40)) syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[@ANYRES16, @ANYRESOCT, @ANYRES64=r0, @ANYBLOB="a0f9a7f5b2977d44e8bac32ffbbc2d1f046c5cf3f269c89e7f8a452487fad8c18d886682d5640171358424115e2f557f30e255bb41616cf1aeafbd4c763918d26c9ecc8cb5c5cd68a79eca59116b4045edb99071458e69729eb739e4a96b2d027027e797a890070bfde6bb377248fd97f0824c95ffd4282831392b4c1957409182869b40cc7ca44e6c806e2dfaa6", @ANYRESOCT=r1, @ANYRESOCT=r2, @ANYRESDEC=r2]) bind$rose(0xffffffffffffffff, &(0x7f00000003c0)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, 0x1c) chdir(&(0x7f0000000040)='./file0\x00') r3 = creat(&(0x7f0000000400)='./file0\x00', 0xe) ftruncate(r3, 0x800) lseek(r3, 0x0, 0x2) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x80000, 0x80) preadv(r4, &(0x7f0000000280), 0x2b, 0xda1, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000440)=@bcast) r5 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x100) sendfile(r3, r5, 0x0, 0x8400fffffffa) [ 391.626427] audit: type=1804 audit(1630461597.925:264): pid=23144 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/236/bus" dev="sda1" ino=15162 res=1 01:59:58 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1b8, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 391.716495] audit: type=1804 audit(1630461597.925:265): pid=23091 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/236/bus" dev="sda1" ino=15162 res=1 01:59:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8504000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) [ 391.787767] FAULT_INJECTION: forcing a failure. [ 391.787767] name failslab, interval 1, probability 0, space 0, times 0 [ 391.807738] CPU: 1 PID: 23154 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 391.815646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 391.825000] Call Trace: [ 391.827601] dump_stack+0x1fc/0x2ef [ 391.831237] should_fail.cold+0xa/0xf 01:59:58 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1b9, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 391.835046] ? setup_fault_attr+0x200/0x200 [ 391.839377] ? lock_acquire+0x170/0x3c0 [ 391.843550] __should_failslab+0x115/0x180 [ 391.847785] should_failslab+0x5/0x10 [ 391.851594] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 391.856683] __kmalloc_node+0x38/0x70 [ 391.860478] kvmalloc_node+0xb4/0xf0 [ 391.864177] btrfs_mount_root+0x13f/0x1830 [ 391.868416] ? btrfs_decode_error+0x70/0x70 [ 391.872758] ? __mutex_unlock_slowpath+0xea/0x610 [ 391.877600] ? check_preemption_disabled+0x41/0x280 [ 391.882603] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 391.887633] ? pcpu_alloc+0xc9/0x1190 [ 391.891592] ? __lockdep_init_map+0x100/0x5a0 [ 391.896157] mount_fs+0xa3/0x310 [ 391.899522] vfs_kern_mount.part.0+0x68/0x470 [ 391.904035] ? kfree+0x110/0x210 [ 391.907387] vfs_kern_mount+0x3c/0x60 [ 391.911175] btrfs_mount+0x23a/0xaa0 [ 391.914874] ? btrfs_show_options+0xfd0/0xfd0 [ 391.919356] ? __mutex_unlock_slowpath+0xea/0x610 [ 391.924300] ? check_preemption_disabled+0x41/0x280 [ 391.929334] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 391.930146] audit: type=1804 audit(1630461598.105:266): pid=23170 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/237/file0" dev="sda1" ino=15159 res=1 [ 391.934365] ? pcpu_alloc+0xc9/0x1190 [ 391.934384] ? __lockdep_init_map+0x100/0x5a0 [ 391.934402] mount_fs+0xa3/0x310 [ 391.934420] vfs_kern_mount.part.0+0x68/0x470 [ 391.934441] do_mount+0x115c/0x2f50 [ 391.978206] ? cmp_ex_sort+0xc0/0xc0 [ 391.981952] ? __do_page_fault+0x180/0xd60 [ 391.986234] ? copy_mount_string+0x40/0x40 [ 391.990477] ? memset+0x20/0x40 [ 391.993802] ? copy_mount_options+0x26f/0x380 [ 391.998296] ksys_mount+0xcf/0x130 [ 392.001878] __x64_sys_mount+0xba/0x150 [ 392.005844] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 392.010514] do_syscall_64+0xf9/0x620 [ 392.014324] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 392.019517] RIP: 0033:0x467b1a [ 392.022716] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 392.041626] RSP: 002b:00007fbaf0827fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 392.049347] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 392.056611] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fbaf0828000 [ 392.063868] RBP: 00007fbaf0828040 R08: 00007fbaf0828040 R09: 0000000020000000 [ 392.071223] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 392.078489] R13: 0000000020000100 R14: 00007fbaf0828000 R15: 0000000020001080 01:59:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x68000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:58 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1ba, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:58 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffff6, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8506000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:58 executing program 5 (fault-call:0 fault-nth:52): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 392.266638] audit: type=1804 audit(1630461598.565:267): pid=23167 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/237/file0" dev="sda1" ino=15159 res=1 01:59:58 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') mkdir(&(0x7f0000000080)='./bus\x00', 0x82) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r2 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) 01:59:58 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1bb, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:58 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1bc, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:58 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffb, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 392.492713] FAULT_INJECTION: forcing a failure. [ 392.492713] name failslab, interval 1, probability 0, space 0, times 0 [ 392.571922] CPU: 0 PID: 23202 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 392.580013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 392.589370] Call Trace: [ 392.591969] dump_stack+0x1fc/0x2ef [ 392.595609] should_fail.cold+0xa/0xf [ 392.599424] ? setup_fault_attr+0x200/0x200 [ 392.603753] ? lock_acquire+0x170/0x3c0 [ 392.607742] __should_failslab+0x115/0x180 [ 392.611988] should_failslab+0x5/0x10 [ 392.615796] kmem_cache_alloc+0x277/0x370 [ 392.619959] getname_kernel+0x4e/0x370 [ 392.623853] kern_path+0x1b/0x40 [ 392.627233] lookup_bdev+0xfc/0x220 [ 392.630864] ? bd_acquire+0x440/0x440 [ 392.634682] ? debug_check_no_obj_freed+0x201/0x490 [ 392.639709] blkdev_get_by_path+0x1b/0xd0 [ 392.643866] btrfs_scan_one_device+0xd0/0xd00 [ 392.648373] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 392.653484] ? debug_check_no_obj_freed+0x201/0x490 [ 392.658508] ? device_list_add+0xdd0/0xdd0 [ 392.662756] ? kfree+0x110/0x210 [ 392.666215] ? btrfs_mount_root+0x107a/0x1830 01:59:58 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:58 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8507000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:58 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) read$eventfd(r0, &(0x7f0000000080), 0x8) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r1 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, &(0x7f00000002c0)={0x5, @win={{0x8000, 0x1, 0x5, 0xffffffff}, 0x8, 0xb6, &(0x7f0000000200)={{0x1ff, 0x8, 0x7, 0x2}, &(0x7f0000000140)={{0x2ba0, 0x0, 0x80000000, 0x5}, &(0x7f00000000c0)={{0x1, 0x1, 0x1, 0x8}}}}, 0x104213e5, &(0x7f0000000240)="cbf9babbdfc0b6fadcbb11ef450eb7f7ba75166f8cf6127bf01c91541a19a5814d89bb4a6428268775673ac2edcd70ad28ab9429e7d0a6ad288191d087dbaf5d4d919dbcd20c25b539aa6bc70ce58b864d7e336c3cba03916d40318ec9526fff188bd239e80ee7f86fa9aebf0d7562048ffd4ba65460d6a0b136f3997d"}}) [ 392.670720] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 392.675313] btrfs_mount_root+0x9df/0x1830 [ 392.679574] ? btrfs_decode_error+0x70/0x70 [ 392.683901] ? __mutex_unlock_slowpath+0xea/0x610 [ 392.688757] ? check_preemption_disabled+0x41/0x280 [ 392.693795] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 392.698907] ? pcpu_alloc+0xc9/0x1190 [ 392.702724] ? __lockdep_init_map+0x100/0x5a0 [ 392.707226] mount_fs+0xa3/0x310 [ 392.710603] vfs_kern_mount.part.0+0x68/0x470 [ 392.715103] ? kfree+0x110/0x210 [ 392.718479] vfs_kern_mount+0x3c/0x60 [ 392.722288] btrfs_mount+0x23a/0xaa0 [ 392.726012] ? btrfs_show_options+0xfd0/0xfd0 [ 392.730517] ? __mutex_unlock_slowpath+0xea/0x610 [ 392.735380] ? check_preemption_disabled+0x41/0x280 [ 392.740409] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 392.745431] ? pcpu_alloc+0xc9/0x1190 [ 392.749239] ? __lockdep_init_map+0x100/0x5a0 [ 392.753780] mount_fs+0xa3/0x310 [ 392.757156] vfs_kern_mount.part.0+0x68/0x470 [ 392.761673] do_mount+0x115c/0x2f50 [ 392.765313] ? cmp_ex_sort+0xc0/0xc0 [ 392.769034] ? __do_page_fault+0x180/0xd60 [ 392.773283] ? copy_mount_string+0x40/0x40 [ 392.777533] ? memset+0x20/0x40 [ 392.780822] ? copy_mount_options+0x26f/0x380 [ 392.785329] ksys_mount+0xcf/0x130 [ 392.788896] __x64_sys_mount+0xba/0x150 [ 392.792917] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 392.797507] do_syscall_64+0xf9/0x620 [ 392.801318] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 392.806509] RIP: 0033:0x467b1a [ 392.809706] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 392.828610] RSP: 002b:00007fbaf0827fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 392.836330] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 392.843605] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fbaf0828000 [ 392.850889] RBP: 00007fbaf0828040 R08: 00007fbaf0828040 R09: 0000000020000000 [ 392.858166] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 392.865445] R13: 0000000020000100 R14: 00007fbaf0828000 R15: 0000000020001080 01:59:59 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1bd, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:59 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xedc000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8508000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:59 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1be, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 393.164548] audit: type=1804 audit(1630461599.455:268): pid=23244 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/239/file0/bus" dev="sda1" ino=13992 res=1 01:59:59 executing program 5 (fault-call:0 fault-nth:53): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850b000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:59 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x74000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:59 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1bf, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 01:59:59 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 01:59:59 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8510000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) [ 393.321108] FAULT_INJECTION: forcing a failure. [ 393.321108] name failslab, interval 1, probability 0, space 0, times 0 [ 393.333989] CPU: 0 PID: 23276 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 393.341885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 393.351243] Call Trace: [ 393.353848] dump_stack+0x1fc/0x2ef [ 393.357489] should_fail.cold+0xa/0xf [ 393.361306] ? setup_fault_attr+0x200/0x200 [ 393.365637] ? lock_acquire+0x170/0x3c0 [ 393.369625] __should_failslab+0x115/0x180 [ 393.373869] should_failslab+0x5/0x10 [ 393.377680] __kmalloc_track_caller+0x2a6/0x3c0 [ 393.382359] ? btrfs_mount_root+0x364/0x1830 [ 393.386782] kstrdup+0x36/0x70 [ 393.389992] btrfs_mount_root+0x364/0x1830 [ 393.394241] ? btrfs_decode_error+0x70/0x70 [ 393.398571] ? __mutex_unlock_slowpath+0xea/0x610 [ 393.403427] ? check_preemption_disabled+0x41/0x280 [ 393.408463] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 393.413489] ? pcpu_alloc+0xc9/0x1190 [ 393.417298] ? __lockdep_init_map+0x100/0x5a0 [ 393.421807] mount_fs+0xa3/0x310 [ 393.425194] vfs_kern_mount.part.0+0x68/0x470 [ 393.429697] ? kfree+0x110/0x210 [ 393.433076] vfs_kern_mount+0x3c/0x60 [ 393.436889] btrfs_mount+0x23a/0xaa0 [ 393.440616] ? btrfs_show_options+0xfd0/0xfd0 [ 393.445119] ? __mutex_unlock_slowpath+0xea/0x610 [ 393.449975] ? check_preemption_disabled+0x41/0x280 [ 393.455008] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 393.460031] ? pcpu_alloc+0xc9/0x1190 [ 393.463843] ? __lockdep_init_map+0x100/0x5a0 [ 393.468353] mount_fs+0xa3/0x310 [ 393.471820] vfs_kern_mount.part.0+0x68/0x470 [ 393.476331] do_mount+0x115c/0x2f50 [ 393.479971] ? cmp_ex_sort+0xc0/0xc0 [ 393.483700] ? __do_page_fault+0x180/0xd60 [ 393.487945] ? copy_mount_string+0x40/0x40 [ 393.492198] ? memset+0x20/0x40 [ 393.495490] ? copy_mount_options+0x26f/0x380 [ 393.500000] ksys_mount+0xcf/0x130 [ 393.503551] __x64_sys_mount+0xba/0x150 [ 393.507543] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 393.512132] do_syscall_64+0xf9/0x620 [ 393.515945] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 393.521135] RIP: 0033:0x467b1a [ 393.524329] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 393.543838] RSP: 002b:00007fbaf0827fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 393.551660] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 393.558948] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fbaf0828000 [ 393.566223] RBP: 00007fbaf0828040 R08: 00007fbaf0828040 R09: 0000000020000000 [ 393.573583] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 393.580876] R13: 0000000020000100 R14: 00007fbaf0828000 R15: 0000000020001080 01:59:59 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1c0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 393.869430] audit: type=1804 audit(1630461600.165:269): pid=23306 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/239/file0/bus" dev="sda1" ino=13992 res=1 02:00:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500030000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 02:00:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7a000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 02:00:00 executing program 5 (fault-call:0 fault-nth:54): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 02:00:00 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1c1, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 02:00:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 02:00:00 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x100000000, 0x3, &(0x7f0000000180)=[{&(0x7f00000003c0)="001b00"/31, 0x1f, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x8c0}, {0x0, 0x0, 0x11000}], 0x546a, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r2 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8400fffffffa) r3 = accept4$vsock_stream(r2, &(0x7f0000000400)={0x28, 0x0, 0x2710, @local}, 0x10, 0x40800) preadv(r3, &(0x7f00000005c0)=[{&(0x7f0000000440)=""/249, 0xf9}, {&(0x7f0000000540)=""/123, 0x7b}, {&(0x7f0000000680)=""/215, 0xd7}], 0x3, 0x800, 0x3) r4 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCINQ(r4, 0x541b, &(0x7f0000003c40)) preadv(r4, &(0x7f0000000140)=[{&(0x7f0000000200)=""/181, 0xb5}, {&(0x7f0000000080)=""/21, 0x15}, {&(0x7f00000002c0)=""/248, 0xf8}, {&(0x7f00000000c0)=""/5, 0x5}], 0x4, 0xffff, 0x9) [ 393.907311] audit: type=1804 audit(1630461600.195:270): pid=23244 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/239/file0/bus" dev="sda1" ino=13992 res=1 [ 393.955832] audit: type=1800 audit(1630461600.195:271): pid=23244 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=13992 res=0 [ 394.010514] FAULT_INJECTION: forcing a failure. [ 394.010514] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 394.041726] CPU: 1 PID: 23317 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 394.049648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 394.059005] Call Trace: [ 394.061695] dump_stack+0x1fc/0x2ef [ 394.065350] should_fail.cold+0xa/0xf [ 394.069165] ? lock_acquire+0x170/0x3c0 [ 394.073147] ? setup_fault_attr+0x200/0x200 [ 394.077495] __alloc_pages_nodemask+0x239/0x2890 [ 394.082260] ? blkdev_get+0x59a/0x940 [ 394.086067] ? __radix_tree_lookup+0x216/0x370 [ 394.090665] ? find_get_entry+0x4cd/0x8a0 [ 394.094830] ? lock_downgrade+0x720/0x720 [ 394.098996] ? __radix_tree_lookup+0x370/0x370 [ 394.103598] ? check_preemption_disabled+0x41/0x280 [ 394.108634] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 394.113488] ? iput+0xc9/0x860 [ 394.116693] ? find_get_pages_range_tag+0xc50/0xc50 [ 394.121803] ? blkdev_get+0xd0/0x940 [ 394.125525] alloc_pages_current+0x193/0x2a0 [ 394.129950] do_read_cache_page+0xa36/0x1170 [ 394.134374] ? blkdev_writepages+0x20/0x20 [ 394.138621] btrfs_scan_one_device+0x195/0xd00 [ 394.143217] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 394.148326] ? debug_check_no_obj_freed+0x201/0x490 [ 394.153350] ? device_list_add+0xdd0/0xdd0 [ 394.157598] ? kfree+0x110/0x210 [ 394.160978] ? btrfs_mount_root+0x107a/0x1830 [ 394.165483] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 394.170094] btrfs_mount_root+0x9df/0x1830 [ 394.174435] ? btrfs_decode_error+0x70/0x70 [ 394.178769] ? __mutex_unlock_slowpath+0xea/0x610 [ 394.183646] ? check_preemption_disabled+0x41/0x280 [ 394.188679] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 394.193708] ? pcpu_alloc+0xc9/0x1190 [ 394.197565] ? __lockdep_init_map+0x100/0x5a0 [ 394.202084] mount_fs+0xa3/0x310 [ 394.205463] vfs_kern_mount.part.0+0x68/0x470 [ 394.215191] ? kfree+0x110/0x210 [ 394.218570] vfs_kern_mount+0x3c/0x60 [ 394.222392] btrfs_mount+0x23a/0xaa0 [ 394.226126] ? btrfs_show_options+0xfd0/0xfd0 [ 394.230631] ? __mutex_unlock_slowpath+0xea/0x610 [ 394.235489] ? check_preemption_disabled+0x41/0x280 [ 394.240520] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 394.245542] ? pcpu_alloc+0xc9/0x1190 [ 394.249465] ? __lockdep_init_map+0x100/0x5a0 [ 394.253968] mount_fs+0xa3/0x310 [ 394.257347] vfs_kern_mount.part.0+0x68/0x470 [ 394.261853] do_mount+0x115c/0x2f50 [ 394.265491] ? cmp_ex_sort+0xc0/0xc0 [ 394.269221] ? __do_page_fault+0x180/0xd60 [ 394.273473] ? copy_mount_string+0x40/0x40 [ 394.277727] ? memset+0x20/0x40 [ 394.281014] ? copy_mount_options+0x26f/0x380 [ 394.285520] ksys_mount+0xcf/0x130 [ 394.289074] __x64_sys_mount+0xba/0x150 [ 394.293064] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 394.297641] do_syscall_64+0xf9/0x620 [ 394.301439] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 394.306639] RIP: 0033:0x467b1a [ 394.309862] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 394.328866] RSP: 002b:00007fbaf0827fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 394.336591] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 394.343869] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fbaf0828000 [ 394.351143] RBP: 00007fbaf0828040 R08: 00007fbaf0828040 R09: 0000000020000000 02:00:00 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1c2, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 02:00:00 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1c3, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 02:00:00 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1c4, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 02:00:00 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1c5, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 02:00:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500060000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) [ 394.358504] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 394.365780] R13: 0000000020000100 R14: 00007fbaf0828000 R15: 0000000020001080 02:00:00 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8cffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 02:00:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7ffffffffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 02:00:00 executing program 5 (fault-call:0 fault-nth:55): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 02:00:00 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1c6, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 02:00:00 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500070000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) [ 394.594890] FAULT_INJECTION: forcing a failure. [ 394.594890] name failslab, interval 1, probability 0, space 0, times 0 [ 394.606728] CPU: 1 PID: 23360 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 394.614639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 394.623998] Call Trace: [ 394.626681] dump_stack+0x1fc/0x2ef [ 394.630302] should_fail.cold+0xa/0xf [ 394.634107] ? setup_fault_attr+0x200/0x200 [ 394.638433] ? lock_acquire+0x170/0x3c0 [ 394.642490] __should_failslab+0x115/0x180 [ 394.646725] should_failslab+0x5/0x10 [ 394.650533] kmem_cache_alloc_trace+0x284/0x380 [ 394.655193] btrfs_mount_root+0x1e1/0x1830 [ 394.659421] ? btrfs_decode_error+0x70/0x70 [ 394.663739] ? __mutex_unlock_slowpath+0xea/0x610 [ 394.669473] ? check_preemption_disabled+0x41/0x280 [ 394.674524] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 394.679561] ? pcpu_alloc+0xc9/0x1190 [ 394.683350] ? __lockdep_init_map+0x100/0x5a0 [ 394.687844] mount_fs+0xa3/0x310 [ 394.691203] vfs_kern_mount.part.0+0x68/0x470 [ 394.695695] ? kfree+0x110/0x210 [ 394.699065] vfs_kern_mount+0x3c/0x60 [ 394.702866] btrfs_mount+0x23a/0xaa0 [ 394.706581] ? btrfs_show_options+0xfd0/0xfd0 [ 394.711067] ? __mutex_unlock_slowpath+0xea/0x610 [ 394.715908] ? check_preemption_disabled+0x41/0x280 [ 394.720939] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 394.725954] ? pcpu_alloc+0xc9/0x1190 [ 394.729939] ? __lockdep_init_map+0x100/0x5a0 [ 394.735139] mount_fs+0xa3/0x310 [ 394.738567] vfs_kern_mount.part.0+0x68/0x470 [ 394.743279] do_mount+0x115c/0x2f50 [ 394.746913] ? cmp_ex_sort+0xc0/0xc0 [ 394.750633] ? __do_page_fault+0x180/0xd60 [ 394.754872] ? copy_mount_string+0x40/0x40 [ 394.759123] ? memset+0x20/0x40 [ 394.762411] ? copy_mount_options+0x26f/0x380 [ 394.766915] ksys_mount+0xcf/0x130 [ 394.770456] __x64_sys_mount+0xba/0x150 [ 394.774694] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 394.779424] do_syscall_64+0xf9/0x620 [ 394.783252] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 394.788457] RIP: 0033:0x467b1a [ 394.791752] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 394.811108] RSP: 002b:00007fbaf0827fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 394.818805] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 394.826203] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fbaf0828000 [ 394.833648] RBP: 00007fbaf0828040 R08: 00007fbaf0828040 R09: 0000000020000000 [ 394.840902] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 394.848165] R13: 0000000020000100 R14: 00007fbaf0828000 R15: 0000000020001080 02:00:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9664d8c1, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 02:00:01 executing program 5 (fault-call:0 fault-nth:56): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 02:00:01 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1c7, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 02:00:01 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 02:00:01 executing program 1: r0 = syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) r2 = syz_mount_image$affs(&(0x7f0000000140), &(0x7f0000000200)='./file0\x00', 0xa34e, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000240)="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", 0xfc, 0x1}, {&(0x7f0000000340)="7cc6cd82f40deacb9bfdafdd66b30c23aa93d9562ba64176bebc2fd7bb6374ec8afeb9ed66634efe75fc1ec590e8565f0f7b05d6011884582297568ecdef9e64f5c3ee039ce5a8cf7a8557874ee402bd9396dd39d2618c55dc66e6b3e2a4424ad86d67e23237d2279830b2adeb9f8ee93014b25c8e9be862bd54d062c66e36b4719aa3ee2739696f092073e552e1bbd4de84bb11d88662801012af7e14963934711c9985732dfde255957f9f9082a22ea64cfda05630062e339d576c8a72425e08bc15a5773bc11c71e1faf7557204681a055359eb2217b90fe906bb30122e4321b1227fc431deb99d6d2aa686", 0xed, 0x4}, {&(0x7f0000000440)="cf45682830e0790e795d9b9fb7d67cc1a8a12b60d06398430cc79c0650b292f86434381f20bcad71a282b0e05e533504efc08dad834739ae10d326e50b3a9cac83f6c85d1f63f51e688265e3096c5908ca9fc164bee32640b8c399", 0x5b, 0x5}, {&(0x7f00000004c0)="d295b4966f54bd646f8f7bdbae599d64796f0bb5149d4f9b4ed6f13922e9085bd22e7a1c3a8d691e58fd5b20c042a0874504f1033371b2e942dab79e2863eb3550c5ca9f2c77adf93a2df5c9a6479135346db4f1c201d38009894b3ae2ad24c3cc590326f9033e5a820de6c90147a071d5d65189b493cd165d3dc70668b4691d6df1a6ae25cf30f85d9ebaa3373d0096c1251959c44f0f5605aefc50d77b827cfbc0627669e8df1f03d579d8109437e78ac0c088dd21734af997505c4ddbcac7fac2cbc3fcb2c2570d2bf5a889fae0d222171a393ecf371d86198a0699a70559e0ec1a57fa7fe70d367a7ca2", 0xec, 0x7}, {&(0x7f0000000680)="62110e4fe76526729f991e8ea9c9d6fd2617efd51fb116265862a3a7e8b76d926473d608c98719225532da00deda372c3a8dcf00c387d9d4ab27894c565a482b98e1ca76c07e677860f6c25a25df679b47920161514d389da5a1c5489304cb4a22267a5cafb6cdc3d30378a91e8a10d39aa4a4a615cae1f7b21d14e5f6eb648ab5d3e4a3cc43b321992690e389d3932a22ec7b0103cacfd76af48fedd38c77121a9378b1ebcd3c2376b50fc3", 0xac, 0x9}], 0x8461, &(0x7f0000000740)=ANY=[@ANYBLOB="6d696e6978002c6d696e6978002c3a242b2c6d696e6978002c2c2925257d2f7d3a252b245d2b29262c5c2b2c2786ee285c2d212d2c7b2c257d5d2e2836232c2c00"]) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000800)='./bus\x00', 0x1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000840), 0x200001, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000900)={0x4, 0x98, 0xf1b, r3, 0x0, &(0x7f00000008c0)={0x9b0972, 0xdfd5, '\x00', @p_u16=&(0x7f0000000880)=0x6}}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r5 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x2b, 0xda1, 0x0) unlinkat(r6, &(0x7f0000000080)='./file0\x00', 0x200) sendfile(r1, r5, 0x0, 0x8400fffffffa) 02:00:01 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85000b0000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 02:00:01 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1c8, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 02:00:01 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500200000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 02:00:01 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x97ffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 02:00:01 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1c9, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 395.235512] FAULT_INJECTION: forcing a failure. [ 395.235512] name failslab, interval 1, probability 0, space 0, times 0 [ 395.246977] CPU: 1 PID: 23399 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 395.254853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 395.264367] Call Trace: [ 395.266969] dump_stack+0x1fc/0x2ef [ 395.270604] should_fail.cold+0xa/0xf [ 395.274389] ? setup_fault_attr+0x200/0x200 [ 395.278699] ? __lock_acquire+0x6de/0x3ff0 [ 395.282920] __should_failslab+0x115/0x180 [ 395.287140] should_failslab+0x5/0x10 [ 395.290940] kmem_cache_alloc+0x3f/0x370 [ 395.295022] radix_tree_node_alloc.constprop.0+0x1e4/0x320 [ 395.300690] __radix_tree_create+0x314/0x540 [ 395.305205] page_cache_tree_insert+0xac/0x3f0 [ 395.309777] ? file_check_and_advance_wb_err+0x3a0/0x3a0 [ 395.315220] ? lock_acquire+0x170/0x3c0 [ 395.319193] ? __add_to_page_cache_locked+0x45e/0xb60 [ 395.324375] __add_to_page_cache_locked+0x46e/0xb60 [ 395.329380] ? page_cache_tree_insert+0x3f0/0x3f0 [ 395.334214] ? iput+0xc9/0x860 [ 395.337397] add_to_page_cache_lru+0x16a/0x680 [ 395.342062] ? add_to_page_cache_locked+0x40/0x40 [ 395.346900] do_read_cache_page+0x50a/0x1170 [ 395.351384] ? blkdev_writepages+0x20/0x20 [ 395.355608] btrfs_scan_one_device+0x195/0xd00 [ 395.360176] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 395.365263] ? debug_check_no_obj_freed+0x201/0x490 [ 395.370263] ? device_list_add+0xdd0/0xdd0 [ 395.374487] ? kfree+0x110/0x210 [ 395.377836] ? btrfs_mount_root+0x107a/0x1830 [ 395.382317] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 395.386896] btrfs_mount_root+0x9df/0x1830 [ 395.391116] ? btrfs_decode_error+0x70/0x70 [ 395.395436] ? __mutex_unlock_slowpath+0xea/0x610 [ 395.400268] ? check_preemption_disabled+0x41/0x280 [ 395.405274] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 395.410273] ? pcpu_alloc+0xc9/0x1190 [ 395.414061] ? __lockdep_init_map+0x100/0x5a0 [ 395.418635] mount_fs+0xa3/0x310 [ 395.422052] vfs_kern_mount.part.0+0x68/0x470 [ 395.426529] ? kfree+0x110/0x210 [ 395.429878] vfs_kern_mount+0x3c/0x60 [ 395.433664] btrfs_mount+0x23a/0xaa0 [ 395.437363] ? btrfs_show_options+0xfd0/0xfd0 [ 395.441840] ? __mutex_unlock_slowpath+0xea/0x610 [ 395.446690] ? check_preemption_disabled+0x41/0x280 [ 395.451689] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 395.456699] ? pcpu_alloc+0xc9/0x1190 [ 395.460484] ? __lockdep_init_map+0x100/0x5a0 [ 395.464982] mount_fs+0xa3/0x310 [ 395.468332] vfs_kern_mount.part.0+0x68/0x470 [ 395.472824] do_mount+0x115c/0x2f50 [ 395.476448] ? cmp_ex_sort+0xc0/0xc0 [ 395.480150] ? __do_page_fault+0x180/0xd60 [ 395.484365] ? copy_mount_string+0x40/0x40 [ 395.488582] ? memset+0x20/0x40 [ 395.491876] ? copy_mount_options+0x26f/0x380 [ 395.496380] ksys_mount+0xcf/0x130 [ 395.499926] __x64_sys_mount+0xba/0x150 [ 395.503888] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 395.508458] do_syscall_64+0xf9/0x620 [ 395.512245] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 395.517419] RIP: 0033:0x467b1a [ 395.520604] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 395.539592] RSP: 002b:00007fbaf0827fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 395.547282] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 395.554545] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fbaf0828000 [ 395.561828] RBP: 00007fbaf0828040 R08: 00007fbaf0828040 R09: 0000000020000000 [ 395.569228] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 395.576490] R13: 0000000020000100 R14: 00007fbaf0828000 R15: 0000000020001080 02:00:01 executing program 1: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000003c40)) syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x4ae}], 0x0, &(0x7f00000000c0)=ANY=[@ANYRES64=r0, @ANYRESOCT]) chdir(&(0x7f0000000040)='./file0\x00') r1 = getuid() r2 = getgid() chown(&(0x7f0000000080)='./bus\x00', r1, r2) r3 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r3, 0x800) lseek(r3, 0x0, 0x2) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x2b, 0xda1, 0x0) ioctl$VIDIOC_G_FREQUENCY(r3, 0xc02c5638, &(0x7f0000000140)={0xd8, 0x2, 0x1}) r5 = open(&(0x7f0000000640)='./bus\x00', 0xbf6e108650ae1e74, 0xb) sendfile(r3, r5, 0x0, 0x8400fffffffa) [ 395.626843] kauditd_printk_skb: 4 callbacks suppressed [ 395.626857] audit: type=1804 audit(1630461601.925:276): pid=23420 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/241/file0/bus" dev="loop1" ino=1 res=1 02:00:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85003f0000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 02:00:02 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1ca, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 02:00:02 executing program 5 (fault-call:0 fault-nth:57): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 02:00:02 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1cb, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 02:00:02 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 02:00:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85fdef0000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 02:00:02 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1cc, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 395.939830] Unable to read inode block [ 395.945232] MINIX-fs: get root inode failed 02:00:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xc0ed0000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 02:00:02 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1cd, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 396.055825] FAULT_INJECTION: forcing a failure. [ 396.055825] name failslab, interval 1, probability 0, space 0, times 0 [ 396.067466] CPU: 1 PID: 23463 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 396.075529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 396.084886] Call Trace: [ 396.087492] dump_stack+0x1fc/0x2ef [ 396.091133] should_fail.cold+0xa/0xf [ 396.094949] ? setup_fault_attr+0x200/0x200 [ 396.099283] ? lock_acquire+0x170/0x3c0 [ 396.103293] __should_failslab+0x115/0x180 [ 396.107519] should_failslab+0x5/0x10 [ 396.111312] kmem_cache_alloc+0x277/0x370 [ 396.115475] getname_kernel+0x4e/0x370 [ 396.119358] kern_path+0x1b/0x40 [ 396.122740] lookup_bdev+0xfc/0x220 [ 396.126405] ? bd_acquire+0x440/0x440 [ 396.130189] ? debug_check_no_obj_freed+0x201/0x490 [ 396.135200] blkdev_get_by_path+0x1b/0xd0 [ 396.139343] btrfs_scan_one_device+0xd0/0xd00 [ 396.143841] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 396.148932] ? debug_check_no_obj_freed+0x201/0x490 [ 396.153936] ? device_list_add+0xdd0/0xdd0 [ 396.158157] ? kfree+0x110/0x210 [ 396.161514] ? btrfs_mount_root+0x107a/0x1830 [ 396.165999] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 396.170581] btrfs_mount_root+0x9df/0x1830 [ 396.175000] ? btrfs_decode_error+0x70/0x70 [ 396.179315] ? __mutex_unlock_slowpath+0xea/0x610 [ 396.184143] ? check_preemption_disabled+0x41/0x280 [ 396.189158] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 396.194163] ? pcpu_alloc+0xc9/0x1190 [ 396.197978] ? __lockdep_init_map+0x100/0x5a0 [ 396.202466] mount_fs+0xa3/0x310 [ 396.205822] vfs_kern_mount.part.0+0x68/0x470 [ 396.210303] ? kfree+0x110/0x210 [ 396.213654] vfs_kern_mount+0x3c/0x60 [ 396.217443] btrfs_mount+0x23a/0xaa0 [ 396.221161] ? btrfs_show_options+0xfd0/0xfd0 [ 396.225645] ? __mutex_unlock_slowpath+0xea/0x610 [ 396.230494] ? check_preemption_disabled+0x41/0x280 [ 396.235528] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 396.240543] ? pcpu_alloc+0xc9/0x1190 [ 396.244344] ? __lockdep_init_map+0x100/0x5a0 [ 396.248840] mount_fs+0xa3/0x310 [ 396.252201] vfs_kern_mount.part.0+0x68/0x470 [ 396.256700] do_mount+0x115c/0x2f50 [ 396.260312] ? cmp_ex_sort+0xc0/0xc0 [ 396.264011] ? __do_page_fault+0x180/0xd60 [ 396.268593] ? copy_mount_string+0x40/0x40 [ 396.272915] ? memset+0x20/0x40 [ 396.276301] ? copy_mount_options+0x26f/0x380 [ 396.280788] ksys_mount+0xcf/0x130 [ 396.284329] __x64_sys_mount+0xba/0x150 [ 396.288288] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 396.292867] do_syscall_64+0xf9/0x620 [ 396.296659] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 396.301830] RIP: 0033:0x467b1a [ 396.305013] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 396.323895] RSP: 002b:00007fbaf0827fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 396.331679] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 396.338940] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fbaf0828000 [ 396.346192] RBP: 00007fbaf0828040 R08: 00007fbaf0828040 R09: 0000000020000000 02:00:02 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000003c40)) preadv(r0, &(0x7f00000009c0)=[{&(0x7f0000000840)=""/2, 0x2}, {&(0x7f0000000880)=""/89, 0x59}, {&(0x7f0000000900)=""/59, 0x3b}, {&(0x7f0000000940)=""/110, 0x6e}], 0x4, 0x9, 0x2) chdir(&(0x7f0000000040)='./file0\x00') r1 = creat(&(0x7f0000000800)='./file0\x00', 0x42) ftruncate(r1, 0x800) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCINQ(r2, 0x541b, &(0x7f0000003c40)) vmsplice(r2, &(0x7f0000000740)=[{&(0x7f0000000080)="f8f7368e8ab177", 0x7}, {&(0x7f0000000200)="4d9eaa9d941ae09fd85432002c79d73c665aedc43f996d4c502bd3b1d04bf4f8f0a2dd9ba433d4cc0dfa67eab89477cabe7c722586c64de80f7eacdb264e867911db7e08b0d34fdf030fa31d3b8fe5f7abbc5a815dc0726405e71e3a69ff7232f3dbe7e3f78ab1a9f9a9eb75922fe955777e3355bc34a1bda030215dcaf54c0987ec0e4b553afafd7f13fe4c0689169c9c49581229dbc5a6e4b8504f04d1a209a4ed710ef4", 0xa5}, {&(0x7f00000002c0)="ddc3487384b4a048bbc0e4b23bb700b7443bfd984c701405c1ae3e29a37e075f387fd0bae27bb9f3492c1c2979d082e1a516e95eb283a358804f29297dfeceb05983ce9820c7501fb23e124e5b064a4076a34b48fc9903406bc7735b9c0970ac1265362bb49a7c0ad91abc95801c209ddbb50203f48fa5444b52349af23590affd7931381fe78ecc3ef3d5bd47d3fec5839cd9dff750fbec3d6c0f4a8a3ab22a7876ca1ec30f5c268e137aa8dd4152c01139f1a69e84a0baf5a950a4321937b801cc3b12ca99d441b9793f5ae881a29b6e74d8c1a18bb14575c0c31d6eeb6c2e70ec15ccda10552cdaa1327ec914b2b0", 0xf0}, {&(0x7f00000003c0)="0cd1ca88dd2a91564719e2e01bf5f71558717f44f36671c46f81ed83dfce93acdf27388088bc8479424357dc3c5652ceda0427046be68e6f155708b390276bd41e69007146fe3651f595ef17d84443e64c48d8cf4d2594f90630de6a0fae78d3e725110430c0277a10c0bedeef74a34de99c8167462525a2deb8fc9dc96c3bab59737249d1128836b03cd8242906018974c4fe17fd9f3e355e33283d47147a366425b43fd625d4e7313dc5f30bbf6cbe48490c2d668da32a56528232e8b9022742e9f7b4aac439b10fc3bde12b14443a1e1f75c00615e26d903ea06687e4d57d0c5ebe", 0xe3}, {&(0x7f00000004c0)="9614e48dbc4daf96d65e9055185570c2e7e64ae3bbd47cac1cc83c1a608a660758a9e35118f3b6bfeb261f9bb7c1349a8412b3088c46e60313327e58e3b238ce4d55bbf932977d89b9083e0f108ef706f0d93577e4147c6c77b098d051318b57f4d9c54f510532a326b8dba7809d0d8f57487ad15b95fc919493eb1eeae2743a96a2ed077acf48d3f7ec589bc65ac0f0a5d9b5c8c075222b713b995ab08628f4644e455dbf5cd6483cf58dd52c6692fd2fb1b081bfb9c93ff05f3bf76757974cc968b35c01d897cae213572b75d4f2153722423888066aaf0bb5bbe24d4d992d01ffc7", 0xe3}, {&(0x7f00000000c0)="454eef2edcdc65018ec581cf312be35bbce116482faec5b90b59497d60c6ce4f6300150d9df4ec8bd0b8b8535cb78b", 0x2f}, {&(0x7f00000005c0)="6fb556e1510593dcd232718595e64cf2773b8c4c7787197a82018624a4d905f0b191c4a33b71b6ddeb2945cd3f4448b23f26fc172d246bb10da83d3c9bce06f2617aaacac05504b8ca0d47", 0x4b}, {&(0x7f0000000140)="846982438aa9257d0b2d8973a3da02014c3b", 0x12}, {&(0x7f0000000680)="a52f5ec79ee59e625db1778af4a6ed046b62dd48e5fe0523db8b599ddb7fd713911c4e16446ae81c0da4fdcb74f94c40c15e1b6cb66479a54d105084421d5b5f8e467364c84f24479f9997fd0c263ca714c7b57c2c45d09992c611870f9ec9396930a594198f48e20016777b0efcf5513c499373bed0dfb7c3fd8c9b80f949a14e26361416fb320c0a", 0x89}, {&(0x7f00000011c0)="bd6a8b0c2dc5c3594a8fa7b088041664de377a325133c3b0a4a0ea9122ab97413e0ab8ff630fb79337062884f4b77e9f4f1ab9258301214b522b92c44405cfed4a2ad0b13a634287994b7c67e633c7291d304b84bba9f20801c6f135fa8a4b65dc51f2d0c3203018eb9e14f102f460bfa131bf5dea338c8563d66dc4bcceb9c13861a6cd406764f84cb199a7eea4977a9e262545e81d9aac963bbafe567309e256e4bee6231f1355071d9f5f012221694324921c92f2e973609029c9f75342f3aafaf902e02b5402bc11caf5a235952992a0115a92f63bef13cf33d813610ee47ffbf765ffc3f09639f34510a37639a2ed4a964f01c27288d70d163c771fd4d5d876871eceb4b93443c8abb3cbc41a4c511ca68274845d0f22b24304b2619be146f18fa5a72626d9e8c7e222192915474df3c59b4cb0a9e59436cd884623fccc8f7df6968a858fe7cd215dbda8a0c2b004925a7e77f46f9bd017ab42363696c83f2bcd3f71467aabc15523a9c17c5c97d492a7d421c8b40dea1d0f9a87e8415336ddbd0bd5714c0608645d916995d4a973c9264909b21e41e475f766e733ed4ab9c5223d720d894cb93e78f79a2479fb44d08f89a67923cb201564c04313a68aec87af3b4210fd17fdd43404ccf9a07e7adc849e323ef3f3e85a7327a719c089cf7fa47cbc6f3f21ee18f30f636dffea63560f88814eda3500211053b5a042ae9c398a57ad1c2e28ec51b3644dc7a416f333d5156541198283680f4b4c63c227738ec4bb4929018a55f24cd5cac3e9ab80102af8d64dba406830aae33991a42344424401e4e02467b674ee9185d3be7cc6d81e45bdc19aa5e3ff2e670db401801b8f9f87443a4dba2a78c734474c9a75ffb95e1f7335f71f4bace6455459be9aa18d910be3d95ceb1313a203510688906df002400cf6bd9f319a29a29739821ed4437b61ad4b39b88d60ddde99af5c0b7b0449dde665168b12ab747382e589554c36a152a9d7910f6a340767b5a4d348bbace59a6fce9661ed6a99f0d285bbd8e021a9c50596373fa4810261cc3f945eaff5c58d9a571cd55ca91749826c5055cf223c32a895a4e153a0811175d60a85d32e561d4a978f8fb9161babb790bb4e11ec36b640b944d5934d5eb281e18c54c784e856b28519145989ca5f37d9a868a777752abbc7e3f433ae414d597233916dda9245c35768fb75cdb165b159a897f34df7edf976f5de6d8fb3f92b2701539dc212130ca14a706d6e7c7995e22de1668e5f0645990edfe62ecf006e69a00c8d6628debc8cbff021e19be9274ed2170d64878dc69bde8bc18e57d1425aea87b02ec2f2551de60acf38a3131430779c364843bb246010d8e1355435f0de7c5ee8f40ac21b5de47c2d7acf8e50f6f7092678b7ba0cbcd59ec54bfc0286a62f2ea2066bb37824d81bb59ce8ea94b9894d23d232389b24a3d613d5a0b16efc6895265eabe3accc61c4f7b860c5251b60f70c8269982e47ae8c63ed1ae7a4580e362a958a68f433ac2c30077505cb416b5cd46b01a5c6f1a6082d4c992ecd36c40bbfb6fff77995fce3164301f7ee9b20cfcaf8323f62f280554d2931fe2d55709bcbc9635d2e13f879467ddbff5ded4e75e1627d5b3d0d2b9f62b943473d7f8eadf19186355300d9771091110891138de44fd2680dbee0f475640f7321bce5cb99f02ca9444f6041c28aeff6658644db051650b6062ca2d81183976dea60afa576559568b7f01b805b84c77ba98faf791eeb7a00ee9b7748f88fcf7d2094d88765fa28b9c4b1c95b0638efed943c09c403721e6718feb1dc657c927a8299f1c404526db0189db1afb68187482297f852b5ccc7b155bb3edbcbf9fe1f1669f8641ca3f11cd967c4a89cf6fcdeed6d5f30ee57d45b90fe2c7351ae336941445fa01b5199f99cfce2c702b144951c9b1e8b932efbe9a78c1d775084975576cdf921f3fe20167cd6f281396c68d4e98fe8a38187017fa31672e88cc6a42f5ce1ea4216facab92fe1572285292d197a21e5e7352566bb42fc36f50c2551de6b7bc5a4fabfe1172b6427db69421674247b657dbee7e819a3ba453eaf513de9218d889879c72864c2a87612457f001102cd8e900c05b49cae50fefb668953c8ea122fbb07841458bc7a5b676ada2ab8a46f67f094c982b57f608f551d9590c030ee269075313410bd36e5bcac9e1fa68eb2108dfb4d9628d579ad8991ecd6bd390114563aaad78accb29fba0945c88d700d61028a955bab28953c636ee8f3ff64939c8dd3f5c287d3b5d74828ed961dfefbceadc4ed83d294c0a0b9dbd752f6041803b3b2f2d9df9573ede16e08e55c7a922ef02d7567b944c4857fe527875078419d1fce17126974d7c39f19943baafb9d4c471681fb6f7f21875f4fd1c35be6b0e5f1a6eb245e34d7f91a0b502648cd069b956ff3f1207a1ee47d29937414a27aeb0048874a4547b6b3be842d2c3d470fdcfd79db4584a1d0d31675fec3484e815b3c819e8ceaefae29750bf79b5c59fda0140ad9ec21179c6fd1cc794d4b748a3a01e1c072c604e0a151df0d8bf54674ca2ba7c6e83a3d5f0ef640430b09073d5887e391b64d19f1f9090e58687f4ce87a3242b4aac52643fb9849d8c3e9224894c6fcb34f1f5cf2f1429b5dd5873b6d58a000f15ddb8685913cc4bb6819b6efc0d300329e9c704570573b6320748efc6ab97f79a32e9ad34fb9db6d28fbc672f74b941f924120096c2176e20574bdd8728c76a373a368a04b154d4cfd7dee5b3e6798b07b976c62e889119467dff7053c781fa2d4ccea524f499ea3a69d16c6288f9390096df76ca01de991675ea38a1e6d884a06ee5cba9f4084295c881e3151f2f743947565f9f35940a3183e6933699061e859cee726a3369b5dd606d71fa29ad3ecf118853f78d914e2ee72c7d908f8e8cad91681491e51a31df6ad83cf0c43f3d02aaae2b472537641540ed695cd658d982d659d17ec6092612152927ca381b7560d674081ab6672749168588939298f7e69cf7fec470fd82b1e067561feced234011a116b423ddae362f7ccc77dbb21965b73151ecf014311205976a253a464570370e13a8d58fea3fa9808277482e0efcbbbd75c6cdb0a69e26a085a664582392b465840e87303e469fb78bd0902551c820f580c1bc461638b6bf7fbb8ee6bf8816a40d833be528300202f45b75605fb494e317deb854570e1e0a041aaec859bb47bc52059b8d4c0d358266b786874f2b31496ed58422b03ffffee4e25107c85468ea6e041af87c2a6a40d73b4118ec50c6b376abca16c88f790ecb2da5180321021cc3408a37ecf5b3dbd5fcc861e3954cc7bb6cbe8523a89a29032d14f0319821c14c78df7582ebe7b503290ae5ba4782404af5278dfbfc005f3928b1be902456eaf213d271c6421657b408da594ba6f3f7a20628280e6ed6934244e604cd8e374640f27dd5aab916d41f1d596590e1c29b3ddd2d731c28c1de19ded7135300f27adc89f0839dff01dd760fa6637e014b1cbe97dad2f6bfd20eb38900934f3b8f355c864572781d8196861b438680f271c3d8f910e2c7a7fc69327904b75983c6a589e9f62684ae59fb813ce2090f83e1d1b1035a704d23ec2b364d31118ef8a1f767f7669d692e2f6042bc744b2515230e0f62adf522d5fbc6b350347a1983204d8d787a633d3e79b1b0a20639b87206cdb6c758dcddb58796f0f52c3cab2aebac56e0f0b8b6b78f2d6f9c232375de86943b8fe28552f34969af2cd649a4cbdfd647c89665ace3187dffb8b73e5c319c6b7ce72e1451212a43487838175be6451f3ed73d8c3d5f4c3fe028adcf8793d818c516fba3f7bfe24e9e5738ded66765dab5f43444cc22ae4a61ac67df09eff8e14f5d8783357e6667fd62fcc9b38fb261c0e2758909262cae769f4b19f8f67ce1124caa86847db4ebcbb06188f6b7f0856cbe890b2261288ed08a9713b415313c7c479a9cb4ab4edf91f58515abb3e965d0484398c6eceb780bc67282d9bfee22c9243d8cd61fedaf1bd19323d34bb920914b47c63524e8f01228b0842ebe66481c45ccc1715b488ddc5f7a5fe5002e68d35244a4da1337ee5e777c6b67dc744a71eb03a0f8a6a6741fb093fb87deb8f49846785ebfbd3410a4e035c29a7b8f467201ef5ef525e1d3aba4c0ba5f5e5e5fbc071f0b0a050cf03000ea2baca8adf08bfd6c6134d7784f5d0528df67b9651491949c8e8fef64e567a93ce31658b7a0dfdd722040cc81d773236b080350caeaf521cf4dc54bc61a60d7bc3860a7876467e90a83e7efb97ee36c941898304ccde38022453fab51c3f91525f27ac9533e528a319523f44f325db79dea14a6900dc67cdb289bb688c4df3868f316f6c0a80dab2b4a48a8ebaf010c59b1ce68e54ab90e96a5aa57b673ba6f681416450f9229a23e0f6e219e1b6926e01a07e553f032126c517fcb56d9babe6879d3d6d1ef7c3dc291d8c63e7e3b8f990b6409d3dc41e8887cdf2816e920840bc900aaecc857464bab34ab73e770d95a5f45cac90cbefc752c9d6ed7a285a1ee892c662c151704d3ecb081abfdf56c4d8556985504e18cb61318b3f4e7db80389ebdee4d90947429ef71c94904124de2e1aee63eff7966432f03593a71902a51b7399fbc47c21336207eef8f1e9298ff182eb5b6c63ba57547d3241fa9a7912c2bac705901d4ef241a0521e9f01b21e3fc69e0a4092286defdb7c23ea0eeb58697da0d97df6b4df000a6f21e7627dc021c82d958818a832434607547623e4c2652b83b59f78753852b235f3372242bf85edc16da7c50a2ad507096b07e96003aa42f4921c047dcaf20fcce9ae8cf4fd4042dcd3ca237cfc6997eb43e4a34ae1272bb523c9d007f755e9cccc732cac3b7ef04c9cb7e03af0c80d01dab9610316d790dbc12e5528bcde687d5fca401fff1c3895aceff676bb9adffe87ffa7561c7a561cad2d6fff53daec9cf3814a87f8bb07d66e2e5e70cd2d99ca5e9edf458008d6d3e3ca10168c53844f53cd62650e4b10597ff684ee12e40257befcf1f7cb4abb0dcb642b3a816aa1f5b637cbec07083d51184eaa6616db3f96a17519958050a45218173e694b71fba39a9b1d449bd99e8a4f89cf13a8bc55c7d0c8f5dd40462b41a3dc07a95070c1429f43acec264ce9304f93d87a998c4d685233c975a2e73283f453d069237c144bfd90e2623ea4f5abf56f83d13053ad775837a212842fafafe654a5d530a1f326a534f469e6fd0db909ce5aba7251fa64330819222e7ce24146be51041be7ab26e2914bcf04b756e51ac44f7cedd4da1deafa7626a69d59a6b3a3b2d39fd82743e66ab8a1e7d3baf35a724bf78621cc6d0b858a8b4389c6b5a3f4a2c22b80785109d5ac74ea74648264aebad868552a71ca7c27804ea111721ad167d12cddec1c179d52b5d021b3415d197cf69cb3f6e14434f0ce76f2e7222b2196ed040df7d427e29af8c49b3f074210aea29c3ca78f4bb39ec2600f729a4fccab0375afab4db8baf284cfc33187ad07975efdcea3033c3abcbeafe013eec16de1cabc39df6c0754e5e8b468853cc3867c3d58fff938360c7c3bccbc44ce28eb2363d13ac3cf5fbab462334c5c4537fffcd71877a9479cc818b7cf1281c3598244920d2587ee9c564ad9a81b3e50e80cc97cd923f0162dcbf14e7a47abe9021e42196efda0c4cc77ee7467e9792d70d61fae3c37c36b278ab499c81288debd2b7a434d70ed98e03732c50934d5636d842f938a3881520a6ad8c34c7a50", 0x1000}], 0xa, 0x9) lseek(r1, 0x0, 0x2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r4 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffa) [ 396.353512] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 396.360789] R13: 0000000020000100 R14: 00007fbaf0828000 R15: 0000000020001080 02:00:02 executing program 5 (fault-call:0 fault-nth:58): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 02:00:02 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1ce, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 02:00:02 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xc1d86496, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 02:00:02 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x200000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 02:00:02 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85effd0000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) [ 396.587969] FAULT_INJECTION: forcing a failure. [ 396.587969] name failslab, interval 1, probability 0, space 0, times 0 [ 396.608102] CPU: 0 PID: 23497 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 396.616009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 396.625364] Call Trace: [ 396.627964] dump_stack+0x1fc/0x2ef [ 396.631604] should_fail.cold+0xa/0xf [ 396.635415] ? setup_fault_attr+0x200/0x200 [ 396.639741] ? lock_acquire+0x170/0x3c0 [ 396.643828] __should_failslab+0x115/0x180 [ 396.648061] should_failslab+0x5/0x10 [ 396.651868] kmem_cache_alloc+0x277/0x370 [ 396.656025] getname_kernel+0x4e/0x370 [ 396.659915] kern_path+0x1b/0x40 [ 396.663290] lookup_bdev+0xfc/0x220 [ 396.666925] ? bd_acquire+0x440/0x440 [ 396.670735] ? list_sort.part.0+0x523/0x790 [ 396.675065] ? try_release_extent_buffer+0x3a0/0x3a0 [ 396.680177] blkdev_get_by_path+0x1b/0xd0 [ 396.684330] btrfs_get_bdev_and_sb+0x2f/0x2f0 [ 396.688829] open_fs_devices+0x5a3/0xa50 [ 396.692904] ? find_fsid+0xb0/0xb0 [ 396.696450] ? debug_check_no_obj_freed+0x201/0x490 [ 396.701487] btrfs_open_devices+0x114/0x150 [ 396.705819] btrfs_mount_root+0xa60/0x1830 [ 396.710068] ? btrfs_decode_error+0x70/0x70 [ 396.714418] ? __mutex_unlock_slowpath+0xea/0x610 [ 396.719283] ? check_preemption_disabled+0x41/0x280 [ 396.724309] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 396.729332] ? pcpu_alloc+0xc9/0x1190 [ 396.733144] ? __lockdep_init_map+0x100/0x5a0 [ 396.737650] mount_fs+0xa3/0x310 [ 396.741023] vfs_kern_mount.part.0+0x68/0x470 [ 396.745528] ? kfree+0x110/0x210 [ 396.748905] vfs_kern_mount+0x3c/0x60 [ 396.752715] btrfs_mount+0x23a/0xaa0 [ 396.756445] ? btrfs_show_options+0xfd0/0xfd0 [ 396.760947] ? __mutex_unlock_slowpath+0xea/0x610 [ 396.765798] ? check_preemption_disabled+0x41/0x280 [ 396.770830] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 396.775867] ? pcpu_alloc+0xc9/0x1190 [ 396.779679] ? __lockdep_init_map+0x100/0x5a0 [ 396.784273] mount_fs+0xa3/0x310 [ 396.787649] vfs_kern_mount.part.0+0x68/0x470 [ 396.792157] do_mount+0x115c/0x2f50 [ 396.795797] ? cmp_ex_sort+0xc0/0xc0 [ 396.799515] ? __do_page_fault+0x180/0xd60 [ 396.803757] ? copy_mount_string+0x40/0x40 [ 396.808005] ? memset+0x20/0x40 [ 396.811292] ? copy_mount_options+0x26f/0x380 [ 396.815799] ksys_mount+0xcf/0x130 [ 396.819343] __x64_sys_mount+0xba/0x150 [ 396.823330] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 396.827919] do_syscall_64+0xf9/0x620 [ 396.831738] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 396.836935] RIP: 0033:0x467b1a [ 396.840132] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 396.859040] RSP: 002b:00007fbaf0827fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 396.866759] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 396.874037] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fbaf0828000 [ 396.881308] RBP: 00007fbaf0828040 R08: 00007fbaf0828040 R09: 0000000020000000 02:00:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000200000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 02:00:03 executing program 1: setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x8000}, 0x8) syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r2 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x2b, 0xda1, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e22, 0x1, @local, 0x8001}}}, &(0x7f00000000c0)=0x84) sendfile(r0, r2, 0x0, 0x8400fffffffa) 02:00:03 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1cf, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 396.888582] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 396.895861] R13: 0000000020000100 R14: 00007fbaf0828000 R15: 0000000020001080 02:00:03 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 02:00:03 executing program 5 (fault-call:0 fault-nth:59): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 02:00:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500002000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 02:00:03 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1d1, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 397.194738] FAULT_INJECTION: forcing a failure. [ 397.194738] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 397.206570] CPU: 0 PID: 23544 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 397.214454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 397.223811] Call Trace: [ 397.226446] dump_stack+0x1fc/0x2ef [ 397.230091] should_fail.cold+0xa/0xf [ 397.233919] ? setup_fault_attr+0x200/0x200 [ 397.238249] ? __lock_acquire+0x6de/0x3ff0 02:00:03 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1d2, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 02:00:03 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000001000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 02:00:03 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 397.242482] __alloc_pages_nodemask+0x239/0x2890 [ 397.247245] ? __lock_acquire+0x6de/0x3ff0 [ 397.251494] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 397.256352] ? mark_held_locks+0xf0/0xf0 [ 397.260430] ? lock_acquire+0x170/0x3c0 [ 397.264408] ? lo_release+0x1a/0x1f0 [ 397.268138] cache_grow_begin+0xa4/0x8a0 [ 397.272285] ? setup_fault_attr+0x200/0x200 [ 397.276603] ? lock_acquire+0x170/0x3c0 [ 397.280586] cache_alloc_refill+0x273/0x340 [ 397.284920] kmem_cache_alloc+0x346/0x370 [ 397.289085] getname_kernel+0x4e/0x370 [ 397.292977] kern_path+0x1b/0x40 [ 397.296348] lookup_bdev+0xfc/0x220 [ 397.300004] ? bd_acquire+0x440/0x440 [ 397.303802] ? list_sort.part.0+0x523/0x790 [ 397.308109] ? try_release_extent_buffer+0x3a0/0x3a0 [ 397.313211] blkdev_get_by_path+0x1b/0xd0 [ 397.317705] btrfs_get_bdev_and_sb+0x2f/0x2f0 [ 397.322193] open_fs_devices+0x5a3/0xa50 [ 397.326263] ? find_fsid+0xb0/0xb0 [ 397.329796] ? debug_check_no_obj_freed+0x201/0x490 [ 397.334827] btrfs_open_devices+0x114/0x150 [ 397.339142] btrfs_mount_root+0xa60/0x1830 [ 397.343365] ? btrfs_decode_error+0x70/0x70 [ 397.347686] ? __mutex_unlock_slowpath+0xea/0x610 [ 397.352612] ? check_preemption_disabled+0x41/0x280 [ 397.357641] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 397.362705] ? pcpu_alloc+0xc9/0x1190 [ 397.366605] ? __lockdep_init_map+0x100/0x5a0 [ 397.371088] mount_fs+0xa3/0x310 [ 397.374466] vfs_kern_mount.part.0+0x68/0x470 [ 397.379052] ? kfree+0x110/0x210 [ 397.382460] vfs_kern_mount+0x3c/0x60 [ 397.386259] btrfs_mount+0x23a/0xaa0 [ 397.389975] ? btrfs_show_options+0xfd0/0xfd0 [ 397.394477] ? __mutex_unlock_slowpath+0xea/0x610 [ 397.399318] ? check_preemption_disabled+0x41/0x280 [ 397.404452] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 397.409464] ? pcpu_alloc+0xc9/0x1190 [ 397.413337] ? __lockdep_init_map+0x100/0x5a0 [ 397.417829] mount_fs+0xa3/0x310 [ 397.421193] vfs_kern_mount.part.0+0x68/0x470 [ 397.425679] do_mount+0x115c/0x2f50 [ 397.429294] ? cmp_ex_sort+0xc0/0xc0 [ 397.433013] ? __do_page_fault+0x180/0xd60 [ 397.437258] ? copy_mount_string+0x40/0x40 [ 397.441499] ? memset+0x20/0x40 [ 397.444861] ? copy_mount_options+0x26f/0x380 [ 397.449354] ksys_mount+0xcf/0x130 [ 397.452897] __x64_sys_mount+0xba/0x150 [ 397.456884] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 397.461466] do_syscall_64+0xf9/0x620 [ 397.465262] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 397.470432] RIP: 0033:0x467b1a [ 397.473610] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 397.492497] RSP: 002b:00007fbaf0827fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 397.500295] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 397.507552] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fbaf0828000 [ 397.514818] RBP: 00007fbaf0828040 R08: 00007fbaf0828040 R09: 0000000020000000 [ 397.522091] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 397.529405] R13: 0000000020000100 R14: 00007fbaf0828000 R15: 0000000020001080 02:00:03 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x300000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 397.606591] audit: type=1804 audit(1630461603.905:277): pid=23556 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/244/file0/bus" dev="sda1" ino=14257 res=1 02:00:04 executing program 5 (fault-call:0 fault-nth:60): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 02:00:04 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000002000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 02:00:04 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1d3, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 02:00:04 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x2b, 0xda1, 0x0) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$cramfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x5, &(0x7f0000000400)=[{&(0x7f0000000200)="e941d5bd9afb6c42b7994ac8b7f1a99d59ac670092e6d7a9ace45bce01a6fbba23cac7288656525301028256cfaa68ba8d74d9d7db7aec1b513f5cf2a4e9847cdb335283bfcb82a37ee80cdcedcc7f00aee9f93b5f15fbd8f8fb771e96ee84c91e380cb307950198df7e3dfab955fc4080eb894d", 0x74, 0x1}, {&(0x7f0000000280)="af45d86b04e0e3f10a2f23d0a2d3f7abde1fca839b3519216f3cb07fe531bb1923cd42fde099c79828ff17fbb61373b066105a414796ef9957fb706a85c2668fbb0daee57fee941b3e63bf47d999dfdf1f69aadfd5ed77b8927b1fb5ac8167f1a5594f3384b0b3ca9a58ccd3cffa438ca30114afef379c82b4792dd22d0afec0cd93b475c0f529c116fbf5ee317e8fe56b8807a54894f352e7f54249a20b749f2b11cd07830e747cdd65cebbcc1aee2b8ef386cb6053d4ae658399652912001fc0a7ccec001ab3ed466bf1702e0ff24c077a23a5cb95e7e5814f6839fa99daaaa7c80d2107722cf6bdeb96708f19f1112572d21a52", 0xf5, 0x2}, {&(0x7f0000000140), 0x0, 0x6}, {&(0x7f0000000380)="9c2f275934e24e391a671185bdc11d966d9bef92c43deefa555317816713042031c4558b13176c573b574b7f1d56440a1684c0ee2999ec8e33ee67bdfca87476dcfcf400b317019d3e75eeb4f33a0b586eb146f5555fc7050e17a4e2ede804939a550657df2ed3bc8c486b", 0x6b, 0x4}, {&(0x7f00000011c0)="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", 0x1000, 0x1}], 0x20, &(0x7f0000000540)={[{}, {'@\x979'}, {}, {'#^t{$'}, {'!'}, {'minix\x00'}], [{@permit_directio}, {@fowner_lt={'fowner<', 0xee00}}, {@obj_type}, {@subj_user={'subj_user', 0x3d, 'minix\x00'}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@dont_appraise}, {@uid_eq={'uid', 0x3d, r2}}, {@obj_type={'obj_type', 0x3d, 'minix\x00'}}, {@obj_user={'obj_user', 0x3d, 'minix\x00'}}, {@uid_eq={'uid', 0x3d, 0xee00}}]}) r3 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, 0x0, 0x8400fffffffa) 02:00:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfcfdffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 02:00:04 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1d4, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 397.840298] FAULT_INJECTION: forcing a failure. [ 397.840298] name failslab, interval 1, probability 0, space 0, times 0 [ 397.851520] CPU: 0 PID: 23580 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 397.859402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 397.868842] Call Trace: [ 397.871440] dump_stack+0x1fc/0x2ef [ 397.875077] should_fail.cold+0xa/0xf [ 397.878865] ? setup_fault_attr+0x200/0x200 [ 397.883261] ? __lock_acquire+0x6de/0x3ff0 [ 397.887508] __should_failslab+0x115/0x180 [ 397.891830] should_failslab+0x5/0x10 [ 397.895616] kmem_cache_alloc+0x3f/0x370 [ 397.899658] radix_tree_node_alloc.constprop.0+0x1e4/0x320 [ 397.905330] __radix_tree_create+0x314/0x540 [ 397.909735] page_cache_tree_insert+0xac/0x3f0 [ 397.914409] ? file_check_and_advance_wb_err+0x3a0/0x3a0 [ 397.919859] ? lock_acquire+0x170/0x3c0 [ 397.923818] ? __add_to_page_cache_locked+0x45e/0xb60 [ 397.928999] __add_to_page_cache_locked+0x46e/0xb60 [ 397.933998] ? page_cache_tree_insert+0x3f0/0x3f0 [ 397.938862] add_to_page_cache_lru+0x16a/0x680 [ 397.943516] ? add_to_page_cache_locked+0x40/0x40 [ 397.948387] pagecache_get_page+0x478/0xd50 [ 397.952702] __getblk_slow+0x216/0x9e0 [ 397.956578] __bread_gfp+0x218/0x300 [ 397.960284] btrfs_read_dev_super+0x8a/0x230 [ 397.964692] btrfs_get_bdev_and_sb+0xf6/0x2f0 [ 397.969193] open_fs_devices+0x5a3/0xa50 [ 397.973252] ? find_fsid+0xb0/0xb0 [ 397.976781] btrfs_open_devices+0x114/0x150 [ 397.981090] btrfs_mount_root+0xa60/0x1830 [ 397.985327] ? btrfs_decode_error+0x70/0x70 [ 397.989643] ? __mutex_unlock_slowpath+0xea/0x610 [ 397.994509] ? check_preemption_disabled+0x41/0x280 [ 397.999525] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 398.004531] ? pcpu_alloc+0xc9/0x1190 [ 398.008330] ? __lockdep_init_map+0x100/0x5a0 [ 398.012810] mount_fs+0xa3/0x310 [ 398.016168] vfs_kern_mount.part.0+0x68/0x470 [ 398.020673] ? kfree+0x110/0x210 [ 398.024028] vfs_kern_mount+0x3c/0x60 [ 398.027843] btrfs_mount+0x23a/0xaa0 [ 398.031585] ? btrfs_show_options+0xfd0/0xfd0 [ 398.036068] ? __mutex_unlock_slowpath+0xea/0x610 [ 398.040917] ? check_preemption_disabled+0x41/0x280 [ 398.045937] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 398.050945] ? pcpu_alloc+0xc9/0x1190 [ 398.054774] ? __lockdep_init_map+0x100/0x5a0 [ 398.059270] mount_fs+0xa3/0x310 [ 398.062641] vfs_kern_mount.part.0+0x68/0x470 [ 398.067137] do_mount+0x115c/0x2f50 [ 398.070769] ? cmp_ex_sort+0xc0/0xc0 [ 398.074477] ? __do_page_fault+0x180/0xd60 [ 398.078698] ? copy_mount_string+0x40/0x40 [ 398.082916] ? memset+0x20/0x40 [ 398.086191] ? copy_mount_options+0x26f/0x380 [ 398.090702] ksys_mount+0xcf/0x130 [ 398.094244] __x64_sys_mount+0xba/0x150 [ 398.098247] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 398.102834] do_syscall_64+0xf9/0x620 [ 398.106641] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 398.111828] RIP: 0033:0x467b1a [ 398.115008] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 398.133895] RSP: 002b:00007fbaf0827fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 398.141587] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 398.148863] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fbaf0828000 [ 398.156120] RBP: 00007fbaf0828040 R08: 00007fbaf0828040 R09: 0000000020000000 [ 398.163496] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 398.170769] R13: 0000000020000100 R14: 00007fbaf0828000 R15: 0000000020001080 02:00:04 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1d5, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 02:00:04 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000003000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) [ 398.215021] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (23576) 02:00:04 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x400000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 398.309542] audit: type=1804 audit(1630461604.605:278): pid=23606 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/245/file0/bus" dev="loop1" ino=1 res=1 02:00:04 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfdfdffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 02:00:04 executing program 5 (fault-call:0 fault-nth:61): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 02:00:04 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1d6, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 02:00:04 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000003c40)) r2 = syz_mount_image$jffs2(&(0x7f0000000080), &(0x7f00000000c0)='./bus\x00', 0x9, 0x2, &(0x7f0000000140)=[{&(0x7f0000000200)="a3d3affbf4ca58445f8a7955f47d1c8ede439e2677be5c6999cb7fe1acdb65b21f4c329be64ca2a20d23e80382251ece4b415425cc8f2f294aa73cc882368194bc8e17bfa52044e05d20e6aa6045b4e60e02da5d659a6d6e8c400d99ebb7c5942ef46530cbb6d0f42b456130ea2d31ffe35197", 0x73, 0x401}, {&(0x7f0000000280)="928ad4651c1c26fec5d1e27700f6778ba0205d25b038c5dcfa48585b99baef8c8b5ac5be1a331d612f43c5563ad2d1ffc565217d875ec6b49b159b03f18db65b09acfb523f8a5f1dfbd8f5ba7d1ba2fe67e7a7eeec27811bea69372065d63b3f73ba2de93f1760726613410461a43994d841fb1a", 0x74, 0xb2}], 0x1201090, &(0x7f0000000300)={[{}, {@compr_lzo}], [{@obj_type={'obj_type', 0x3d, 'minix\x00'}}, {@hash}, {@smackfstransmute={'smackfstransmute', 0x3d, 'minix\x00'}}]}) sendfile(r1, r2, &(0x7f0000000380)=0x80000001, 0x9) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r4 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r0, r4, 0x0, 0x8400fffffffa) [ 398.410322] audit: type=1804 audit(1630461604.635:279): pid=23611 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/245/file0/bus" dev="loop1" ino=1 res=1 02:00:04 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000004000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 02:00:04 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1d7, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 02:00:04 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000006000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 02:00:04 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1d8, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 398.624747] FAULT_INJECTION: forcing a failure. [ 398.624747] name failslab, interval 1, probability 0, space 0, times 0 [ 398.639947] CPU: 0 PID: 23635 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 398.647862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 398.657224] Call Trace: [ 398.659830] dump_stack+0x1fc/0x2ef [ 398.663827] should_fail.cold+0xa/0xf [ 398.667640] ? setup_fault_attr+0x200/0x200 [ 398.671979] __should_failslab+0x115/0x180 [ 398.676228] should_failslab+0x5/0x10 [ 398.680048] kmem_cache_alloc+0x3f/0x370 [ 398.684127] ? mempool_alloc+0x350/0x350 [ 398.688195] mempool_alloc+0x146/0x350 [ 398.692102] ? mempool_resize+0x790/0x790 [ 398.696264] ? lock_downgrade+0x720/0x720 [ 398.700431] ? mark_held_locks+0xa6/0xf0 [ 398.704503] bio_alloc_bioset+0x389/0x5e0 [ 398.708749] ? __find_get_block+0x314/0xde0 [ 398.713080] ? bvec_alloc+0x2f0/0x2f0 [ 398.716890] ? __getblk_slow+0x6a3/0x9e0 [ 398.720963] submit_bh_wbc+0x141/0x760 [ 398.724848] __bread_gfp+0x14e/0x300 [ 398.728560] btrfs_read_dev_super+0x8a/0x230 [ 398.732961] btrfs_get_bdev_and_sb+0xf6/0x2f0 [ 398.737455] open_fs_devices+0x5a3/0xa50 [ 398.741517] ? find_fsid+0xb0/0xb0 [ 398.745065] btrfs_open_devices+0x114/0x150 [ 398.749382] btrfs_mount_root+0xa60/0x1830 [ 398.753614] ? btrfs_decode_error+0x70/0x70 [ 398.757933] ? __mutex_unlock_slowpath+0xea/0x610 [ 398.762769] ? check_preemption_disabled+0x41/0x280 [ 398.767780] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 398.772790] ? pcpu_alloc+0xc9/0x1190 [ 398.776668] ? __lockdep_init_map+0x100/0x5a0 [ 398.781155] mount_fs+0xa3/0x310 [ 398.784515] vfs_kern_mount.part.0+0x68/0x470 [ 398.788999] ? kfree+0x110/0x210 [ 398.792354] vfs_kern_mount+0x3c/0x60 [ 398.796146] btrfs_mount+0x23a/0xaa0 [ 398.799850] ? btrfs_show_options+0xfd0/0xfd0 [ 398.804332] ? __mutex_unlock_slowpath+0xea/0x610 [ 398.809167] ? check_preemption_disabled+0x41/0x280 [ 398.814177] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 398.819182] ? pcpu_alloc+0xc9/0x1190 [ 398.822976] ? __lockdep_init_map+0x100/0x5a0 [ 398.827464] mount_fs+0xa3/0x310 [ 398.830825] vfs_kern_mount.part.0+0x68/0x470 [ 398.835315] do_mount+0x115c/0x2f50 [ 398.838933] ? cmp_ex_sort+0xc0/0xc0 [ 398.842656] ? __do_page_fault+0x180/0xd60 [ 398.846884] ? copy_mount_string+0x40/0x40 [ 398.851116] ? memset+0x20/0x40 [ 398.854387] ? copy_mount_options+0x26f/0x380 [ 398.858874] ksys_mount+0xcf/0x130 [ 398.862404] __x64_sys_mount+0xba/0x150 [ 398.866499] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 398.871069] do_syscall_64+0xf9/0x620 [ 398.874865] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 398.880041] RIP: 0033:0x467b1a [ 398.883236] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 398.902127] RSP: 002b:00007fbaf0827fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 398.909819] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 398.917086] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fbaf0828000 02:00:05 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x500000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 398.924343] RBP: 00007fbaf0828040 R08: 00007fbaf0828040 R09: 0000000020000000 [ 398.931599] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 398.938856] R13: 0000000020000100 R14: 00007fbaf0828000 R15: 0000000020001080 [ 398.950060] audit: type=1804 audit(1630461605.005:280): pid=23659 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/246/file0/bus" dev="loop1" ino=1 res=1 02:00:05 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) open(&(0x7f0000000080)='./file0\x00', 0x4081, 0x26) lseek(r0, 0x0, 0x2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r1 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8400fffffffa) [ 399.014310] audit: type=1804 audit(1630461605.295:281): pid=23662 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/246/file0/bus" dev="loop1" ino=1 res=1 02:00:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000007000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 02:00:05 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1d9, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 399.232547] audit: type=1804 audit(1630461605.525:282): pid=23675 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/247/file0/bus" dev="loop1" ino=1 res=1 02:00:05 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfdffffff, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 02:00:05 executing program 5 (fault-call:0 fault-nth:62): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 02:00:05 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x600000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 02:00:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000008000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 02:00:05 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = syz_mount_image$jfs(&(0x7f0000000140), &(0x7f0000000200)='./file0\x00', 0x9, 0x1, &(0x7f0000000280)=[{&(0x7f0000000240)="f97b8208b3a44b556f650be75bb9cc1f5b8d95852c0b7714032f8d22a285858330a9cd3802483aef79e4ff", 0x2b, 0x1}], 0x302002, &(0x7f00000002c0)={[{@umask={'umask', 0x3d, 0x100}}, {}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'minix\x00'}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}]}) openat(r0, &(0x7f0000000340)='./file0\x00', 0x1, 0x10) open(&(0x7f00000000c0)='./bus\x00', 0x400000, 0x81) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r1, 0x800) lseek(r1, 0x0, 0x2) bind$802154_raw(r1, &(0x7f0000000080)={0x24, @long={0x3, 0x3}}, 0x14) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r3 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x8400fffffffa) [ 399.320288] audit: type=1804 audit(1630461605.585:283): pid=23680 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/247/file0/bus" dev="loop1" ino=1 res=1 02:00:05 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1da, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 02:00:05 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1db, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 02:00:05 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1dc, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 02:00:05 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000000b000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) [ 399.535858] FAULT_INJECTION: forcing a failure. [ 399.535858] name failslab, interval 1, probability 0, space 0, times 0 [ 399.600034] audit: type=1804 audit(1630461605.895:284): pid=23716 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/248/file0/bus" dev="loop1" ino=1 res=1 [ 399.602629] CPU: 0 PID: 23691 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 399.631984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 399.637576] audit: type=1804 audit(1630461605.935:285): pid=23721 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir682481588/syzkaller.OfauUO/248/file0/bus" dev="loop1" ino=1 res=1 [ 399.641339] Call Trace: [ 399.641362] dump_stack+0x1fc/0x2ef [ 399.641383] should_fail.cold+0xa/0xf [ 399.641401] ? setup_fault_attr+0x200/0x200 [ 399.679697] __should_failslab+0x115/0x180 [ 399.683963] should_failslab+0x5/0x10 [ 399.687771] kmem_cache_alloc+0x3f/0x370 [ 399.692100] ? mempool_alloc+0x350/0x350 [ 399.696169] mempool_alloc+0x146/0x350 02:00:06 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./bus\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x401}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x880}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) r1 = open(&(0x7f0000000080)='./bus\x00', 0x420800, 0x84) lseek(r0, 0x0, 0x2) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0)={r0}, 0x8) write$UHID_DESTROY(r2, &(0x7f0000000140), 0x4) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000280)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x2b, 0xda1, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000200)={'veth1_to_bridge\x00'}) ioctl$BTRFS_IOC_QGROUP_CREATE(r3, 0x4010942a, &(0x7f0000000240)={0x1, 0x2}) r4 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r0, r4, 0x0, 0x8400fffffffa) [ 399.700066] ? mempool_resize+0x790/0x790 [ 399.704233] ? lock_downgrade+0x720/0x720 [ 399.708392] ? mark_held_locks+0xa6/0xf0 [ 399.712465] bio_alloc_bioset+0x389/0x5e0 [ 399.716620] ? __find_get_block+0x314/0xde0 [ 399.720949] ? bvec_alloc+0x2f0/0x2f0 [ 399.724761] ? __getblk_slow+0x6a3/0x9e0 [ 399.728834] submit_bh_wbc+0x141/0x760 [ 399.732741] __bread_gfp+0x14e/0x300 [ 399.736466] btrfs_read_dev_super+0x8a/0x230 [ 399.740886] btrfs_get_bdev_and_sb+0xf6/0x2f0 [ 399.745392] open_fs_devices+0x5a3/0xa50 [ 399.749467] ? find_fsid+0xb0/0xb0 [ 399.753023] btrfs_open_devices+0x114/0x150 [ 399.757448] btrfs_mount_root+0xa60/0x1830 [ 399.761709] ? btrfs_decode_error+0x70/0x70 [ 399.766041] ? __mutex_unlock_slowpath+0xea/0x610 [ 399.770899] ? check_preemption_disabled+0x41/0x280 [ 399.775956] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 399.780979] ? pcpu_alloc+0xc9/0x1190 [ 399.784823] ? __lockdep_init_map+0x100/0x5a0 [ 399.789334] mount_fs+0xa3/0x310 [ 399.792722] vfs_kern_mount.part.0+0x68/0x470 [ 399.797224] ? kfree+0x110/0x210 [ 399.800601] vfs_kern_mount+0x3c/0x60 [ 399.804413] btrfs_mount+0x23a/0xaa0 [ 399.808141] ? btrfs_show_options+0xfd0/0xfd0 [ 399.812640] ? __mutex_unlock_slowpath+0xea/0x610 [ 399.817496] ? check_preemption_disabled+0x41/0x280 [ 399.822526] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 399.827551] ? pcpu_alloc+0xc9/0x1190 [ 399.831366] ? __lockdep_init_map+0x100/0x5a0 [ 399.835872] mount_fs+0xa3/0x310 [ 399.839256] vfs_kern_mount.part.0+0x68/0x470 [ 399.843765] do_mount+0x115c/0x2f50 [ 399.847402] ? cmp_ex_sort+0xc0/0xc0 [ 399.851124] ? __do_page_fault+0x180/0xd60 [ 399.855368] ? copy_mount_string+0x40/0x40 [ 399.860140] ? memset+0x20/0x40 [ 399.863431] ? copy_mount_options+0x26f/0x380 [ 399.867936] ksys_mount+0xcf/0x130 [ 399.871484] __x64_sys_mount+0xba/0x150 [ 399.875472] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 399.880065] do_syscall_64+0xf9/0x620 [ 399.883883] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 399.889076] RIP: 0033:0x467b1a [ 399.892278] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 399.911180] RSP: 002b:00007fbaf0827fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 399.918897] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 399.926173] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fbaf0828000 [ 399.933447] RBP: 00007fbaf0828040 R08: 00007fbaf0828040 R09: 0000000020000000 [ 399.940723] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 399.948002] R13: 0000000020000100 R14: 00007fbaf0828000 R15: 0000000020001080 02:00:06 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1dd, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 400.001388] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by syz-executor.3 (23689) 02:00:06 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x700000000000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) [ 400.074989] BTRFS warning (device ): duplicate device /dev/loop3 devid 0 generation 0 scanned by systemd-udevd (19881) [ 400.098470] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 02:00:06 executing program 2: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffff1f00, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001", 0x33, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 02:00:06 executing program 5 (fault-call:0 fault-nth:63): syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000000000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, &(0x7f0000001080)=ANY=[]) 02:00:06 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e8500000010000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) 02:00:06 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1de, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 02:00:06 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1df, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 02:00:06 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e850000003f000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) [ 400.315653] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop1. 02:00:06 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1e0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 02:00:06 executing program 1: syz_mount_image$minix(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000010000)="00040000000001000100440000000000ffffff7f800000005a4d", 0x1a, 0x400}, {&(0x7f0000000a00)="feffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffefffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0300000000e0ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000009ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffed4103", 0x783, 0x882}, {0x0, 0x0, 0x11000}], 0x0, &(0x7f0000000200)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$omfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x35f, 0x2, &(0x7f0000000280)=[{&(0x7f0000000140)="5cdd0002bf0b0f9110eb561332df7ab7a63178764e4efc686d9d5d69ebca7c520f703e5e5244af8282c64735a421", 0x2e, 0x1f}, {&(0x7f0000000200)="d23fbc6105cc4066a3e458585964bd09e49a3ebed800c3bbf6bc5b8ae9afc9cb92f9952570f48d1b55587663eba27265b055c826e66b3bc0f2fe568f08012625a77594af", 0x44, 0x20}], 0x8088, &(0x7f00000002c0)={[{'minix\x00'}, {'&::'}, {}, {'minix\x00'}, {}, {'minix\x00'}, {'&'}], [{@smackfsroot={'smackfsroot', 0x3d, 'minix\x00'}}, {@subj_type}, {@audit}]}) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ftruncate(r0, 0x800) lseek(r0, 0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x2b, 0xda1, 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$sock_SIOCINQ(r2, 0x541b, &(0x7f0000003c40)) mmap(&(0x7f000042a000/0x3000)=nil, 0x3000, 0x1, 0x2010, r2, 0xc4596000) r3 = open(&(0x7f0000000640)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, 0x0, 0x8400fffffffa) 02:00:06 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1e1, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) 02:00:06 executing program 0: syz_mount_image$btrfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="90e42e85fffffdef000000000000000000000000000000000800000000000000f90cac8b044b4fa88bee4b8d3da88dc2000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}, {0x0}, {0x0}], 0x0, &(0x7f0000001080)=ANY=[]) [ 400.534850] FAULT_INJECTION: forcing a failure. [ 400.534850] name failslab, interval 1, probability 0, space 0, times 0 [ 400.558227] CPU: 0 PID: 23765 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 400.566138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 400.575598] Call Trace: [ 400.578468] dump_stack+0x1fc/0x2ef [ 400.582298] should_fail.cold+0xa/0xf [ 400.586094] ? setup_fault_attr+0x200/0x200 [ 400.590633] ? lock_acquire+0x170/0x3c0 [ 400.594738] __should_failslab+0x115/0x180 [ 400.599150] should_failslab+0x5/0x10 [ 400.603465] kmem_cache_alloc_trace+0x284/0x380 [ 400.608125] btrfs_alloc_device+0xae/0x670 [ 400.612347] ? btrfs_finish_sprout+0x6c0/0x6c0 [ 400.616964] ? blkdev_put+0x85/0x520 [ 400.620666] close_fs_devices.part.0+0x245/0x860 [ 400.630193] btrfs_close_devices+0x95/0x1f0 [ 400.634507] btrfs_mount_root+0x10b9/0x1830 [ 400.638844] ? btrfs_decode_error+0x70/0x70 [ 400.643207] ? __mutex_unlock_slowpath+0xea/0x610 [ 400.648044] ? check_preemption_disabled+0x41/0x280 [ 400.653077] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 400.658193] ? pcpu_alloc+0xc9/0x1190 [ 400.661998] ? __lockdep_init_map+0x100/0x5a0 [ 400.666492] mount_fs+0xa3/0x310 [ 400.669852] vfs_kern_mount.part.0+0x68/0x470 [ 400.674343] ? kfree+0x110/0x210 [ 400.677706] vfs_kern_mount+0x3c/0x60 [ 400.681497] btrfs_mount+0x23a/0xaa0 [ 400.685203] ? btrfs_show_options+0xfd0/0xfd0 [ 400.689687] ? __mutex_unlock_slowpath+0xea/0x610 [ 400.694527] ? check_preemption_disabled+0x41/0x280 [ 400.699533] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 400.704657] ? pcpu_alloc+0xc9/0x1190 [ 400.708459] ? __lockdep_init_map+0x100/0x5a0 [ 400.712955] mount_fs+0xa3/0x310 [ 400.716429] vfs_kern_mount.part.0+0x68/0x470 [ 400.720921] do_mount+0x115c/0x2f50 [ 400.724791] ? cmp_ex_sort+0xc0/0xc0 [ 400.728498] ? __do_page_fault+0x180/0xd60 [ 400.732728] ? copy_mount_string+0x40/0x40 [ 400.737159] ? memset+0x20/0x40 [ 400.740428] ? copy_mount_options+0x26f/0x380 [ 400.744912] ksys_mount+0xcf/0x130 [ 400.748440] __x64_sys_mount+0xba/0x150 [ 400.752415] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 400.757021] do_syscall_64+0xf9/0x620 [ 400.760820] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 400.766037] RIP: 0033:0x467b1a [ 400.769230] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 400.788125] RSP: 002b:00007fbaf0827fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 400.795820] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 400.803080] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fbaf0828000 [ 400.810338] RBP: 00007fbaf0828040 R08: 00007fbaf0828040 R09: 0000000020000000 [ 400.817595] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 400.824847] R13: 0000000020000100 R14: 00007fbaf0828000 R15: 0000000020001080 [ 400.846831] ------------[ cut here ]------------ [ 400.851608] kernel BUG at fs/btrfs/volumes.c:1058! [ 400.858615] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 400.863997] CPU: 0 PID: 23765 Comm: syz-executor.5 Not tainted 4.19.205-syzkaller #0 [ 400.871891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 400.881261] RIP: 0010:close_fs_devices.part.0+0x674/0x860 [ 400.886783] Code: 03 0f 8e 10 01 00 00 48 8b 44 24 10 c7 80 10 01 00 00 00 00 00 00 48 83 c4 40 5b 5d 41 5c 41 5d 41 5e 41 5f c3 e8 2c b6 71 fe <0f> 0b e8 25 b6 71 fe 0f 0b e8 ae 8a a7 fe e9 f8 fb ff ff 4c 89 f7 [ 400.905666] RSP: 0018:ffff8880922bf840 EFLAGS: 00010246 [ 400.911008] RAX: 0000000000040000 RBX: ffff88809b1f64c0 RCX: ffffc9001072f000 [ 400.918281] RDX: 0000000000040000 RSI: ffffffff82f0dc94 RDI: 0000000000000007 [ 400.925553] RBP: ffff88808e03a2c0 R08: 0000000000000000 R09: fffffffffffff000 [ 400.932829] R10: 0000000000000007 R11: 0000000000000000 R12: dffffc0000000000 [ 400.940078] R13: ffff88809b1f6560 R14: ffff88809b1f64e0 R15: fffffffffffffff4 [ 400.947358] FS: 00007fbaf0828700(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 [ 400.955562] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 400.961421] CR2: 0000000000970004 CR3: 00000000a0f96000 CR4: 00000000001426f0 [ 400.968673] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 400.975924] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 400.983172] Call Trace: [ 400.985765] btrfs_close_devices+0x95/0x1f0 [ 400.990160] btrfs_mount_root+0x10b9/0x1830 [ 400.994478] ? btrfs_decode_error+0x70/0x70 [ 400.998792] ? __mutex_unlock_slowpath+0xea/0x610 [ 401.003631] ? check_preemption_disabled+0x41/0x280 [ 401.008732] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 401.013976] ? pcpu_alloc+0xc9/0x1190 [ 401.017943] ? __lockdep_init_map+0x100/0x5a0 [ 401.022684] mount_fs+0xa3/0x310 [ 401.026047] vfs_kern_mount.part.0+0x68/0x470 [ 401.030699] ? kfree+0x110/0x210 [ 401.034064] vfs_kern_mount+0x3c/0x60 [ 401.037859] btrfs_mount+0x23a/0xaa0 [ 401.041567] ? btrfs_show_options+0xfd0/0xfd0 [ 401.046055] ? __mutex_unlock_slowpath+0xea/0x610 [ 401.051016] ? check_preemption_disabled+0x41/0x280 [ 401.056108] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 401.061127] ? pcpu_alloc+0xc9/0x1190 [ 401.064934] ? __lockdep_init_map+0x100/0x5a0 [ 401.069430] mount_fs+0xa3/0x310 [ 401.072781] vfs_kern_mount.part.0+0x68/0x470 [ 401.077437] do_mount+0x115c/0x2f50 [ 401.081075] ? cmp_ex_sort+0xc0/0xc0 [ 401.084783] ? __do_page_fault+0x180/0xd60 [ 401.089012] ? copy_mount_string+0x40/0x40 [ 401.093411] ? memset+0x20/0x40 [ 401.096736] ? copy_mount_options+0x26f/0x380 [ 401.101420] ksys_mount+0xcf/0x130 [ 401.104974] __x64_sys_mount+0xba/0x150 [ 401.108960] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 401.113555] do_syscall_64+0xf9/0x620 [ 401.117350] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 401.122526] RIP: 0033:0x467b1a [ 401.125714] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 02:00:07 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff4000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff4000/0x2000)=nil, &(0x7f0000ff3000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') preadv(r1, &(0x7f00000017c0), 0x1e2, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) [ 401.144621] RSP: 002b:00007fbaf0827fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 401.152336] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467b1a [ 401.159617] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fbaf0828000 [ 401.166872] RBP: 00007fbaf0828040 R08: 00007fbaf0828040 R09: 0000000020000000 [ 401.174134] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 401.181636] R13: 0000000020000100 R14: 00007fbaf0828000 R15: 0000000020001080 [ 401.188906] Modules linked in: [ 401.197063] ---[ end trace b830809c9e6c69d9 ]--- [ 401.202323] RIP: 0010:close_fs_devices.part.0+0x674/0x860 [ 401.208942] Code: 03 0f 8e 10 01 00 00 48 8b 44 24 10 c7 80 10 01 00 00 00 00 00 00 48 83 c4 40 5b 5d 41 5c 41 5d 41 5e 41 5f c3 e8 2c b6 71 fe <0f> 0b e8 25 b6 71 fe 0f 0b e8 ae 8a a7 fe e9 f8 fb ff ff 4c 89 f7 [ 401.231098] RSP: 0018:ffff8880922bf840 EFLAGS: 00010246 [ 401.239869] RAX: 0000000000040000 RBX: ffff88809b1f64c0 RCX: ffffc9001072f000 [ 401.248285] RDX: 0000000000040000 RSI: ffffffff82f0dc94 RDI: 0000000000000007 [ 401.258545] RBP: ffff88808e03a2c0 R08: 0000000000000000 R09: fffffffffffff000 [ 401.267013] R10: 0000000000000007 R11: 0000000000000000 R12: dffffc0000000000 [ 401.277257] R13: ffff88809b1f6560 R14: ffff88809b1f64e0 R15: fffffffffffffff4 [ 401.285895] FS: 00007fbaf0828700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 [ 401.304156] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 401.310137] CR2: 00007ffe066bcf88 CR3: 00000000a0f96000 CR4: 00000000001426e0 [ 401.318047] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 401.326652] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 401.357545] Kernel panic - not syncing: Fatal exception [ 401.364211] Kernel Offset: disabled [ 401.367977] Rebooting in 86400 seconds..