------------[ cut here ]------------ WARNING: CPU: 1 PID: 5302 at mm/page_alloc.c:5525 __alloc_pages+0x412/0x5b0 mm/page_alloc.c:5525 Modules linked in: CPU: 1 PID: 5302 Comm: syz-executor.0 Not tainted 6.2.0-rc1-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 RIP: 0010:__alloc_pages+0x412/0x5b0 mm/page_alloc.c:5525 Code: ff ff 00 0f 84 c3 fd ff ff 80 ce 01 e9 bb fd ff ff 83 fe 0a 0f 86 ce fc ff ff 80 3d 33 c1 98 0c 00 75 09 c6 05 2a c1 98 0c 01 <0f> 0b 45 31 f6 e9 52 fe ff ff 65 ff 05 15 c1 3e 7e 48 c7 c0 e0 3a RSP: 0018:ffffc9000499fac0 EFLAGS: 00010246 RAX: 0000000000000000 RBX: 1ffff92000933f59 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000014 RDI: 0000000000000000 RBP: 0000000000040d40 R08: 0000000000000007 R09: 0000000000000000 R10: 0000000100000000 R11: 0000000000000000 R12: 0000000000000014 R13: 0000000000000000 R14: 0000000000040d40 R15: ffff88806c944620 FS: 00007ff8b159f700(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f2061384998 CR3: 000000001d888000 CR4: 0000000000350ef0 Call Trace: __alloc_pages_node include/linux/gfp.h:237 [inline] alloc_pages_node include/linux/gfp.h:260 [inline] __kmalloc_large_node+0x85/0x160 mm/slab_common.c:1113 __do_kmalloc_node mm/slab_common.c:956 [inline] __kmalloc+0x91/0xd0 mm/slab_common.c:981 kmalloc include/linux/slab.h:584 [inline] kzalloc include/linux/slab.h:720 [inline] v9fs_fid_get_acl+0x78/0x120 fs/9p/acl.c:32 __v9fs_get_acl fs/9p/acl.c:66 [inline] v9fs_get_acl+0x120/0x5f0 fs/9p/acl.c:93 v9fs_mount+0x662/0xca0 fs/9p/vfs_super.c:183 legacy_get_tree+0x109/0x220 fs/fs_context.c:610 vfs_get_tree+0x8d/0x2f0 fs/super.c:1489 do_new_mount fs/namespace.c:3145 [inline] path_mount+0x132a/0x1e20 fs/namespace.c:3475 do_mount fs/namespace.c:3488 [inline] __do_sys_mount fs/namespace.c:3697 [inline] __se_sys_mount fs/namespace.c:3674 [inline] __x64_sys_mount+0x283/0x300 fs/namespace.c:3674 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7ff8b088c0a9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ff8b159f168 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007ff8b09ac050 RCX: 00007ff8b088c0a9 RDX: 0000000020000140 RSI: 0000000020000200 RDI: 0000000000000000 RBP: 00007ff8b08e7ae9 R08: 00000000200003c0 R09: 0000000000000000 R10: 0000000002004812 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffc491f579f R14: 00007ff8b159f300 R15: 0000000000022000