f456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) 22:23:44 executing program 1: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:23:45 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600130000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:23:45 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x8035}, 0x30) 22:23:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c0000001900010200000000000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) 22:23:45 executing program 1: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:23:45 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600140000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:23:45 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x8100}, 0x30) 22:23:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:23:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)=0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_settime(0x0, 0x3, &(0x7f0000000100)={{r3, r4+30000000}, {0x0, 0x9}}, 0x0) timer_delete(r2) io_setup(0xb1, &(0x7f0000000280)=0x0) io_submit(r5, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) io_getevents(r5, 0x2, 0x2, &(0x7f0000000300)=[{}, {}], 0x0) tkill(r1, 0x14) 22:23:47 executing program 1: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:23:47 executing program 3: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000180)="d345a7babc2db515f7718000000053ff07") pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000040)={0x3, [0x2, 0x3, 0x0]}, &(0x7f0000000080)=0xa) 22:23:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:23:47 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600150000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:23:47 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x8847}, 0x30) 22:23:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:23:48 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) 22:23:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:23:48 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) 22:23:48 executing program 1: syz_emit_ethernet(0x0, 0x0, 0x0) 22:23:48 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x8848}, 0x30) 22:23:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) ptrace$setregset(0x4205, r1, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)="dd96068b574b60029fd82d0e7e46c1b43a9744529531df739338ad33d48dd4c3a9842fbe44c5c76d0ed025a4fb70e596c26dcc8c91d141baeacc86ac36fc9a34d0aeaaa23f0ab08a19ae01915343dcf620df20e6a2c78d916c7114b564fcd5407e41c5b3c35bf1f774121c109bbcd52e", 0x70}) io_submit(0x0, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) io_getevents(0x0, 0x1, 0x2, &(0x7f0000000200)=[{}, {}], 0x0) process_vm_readv(r1, &(0x7f0000000680)=[{&(0x7f00000002c0)=""/198, 0xc6}, {&(0x7f0000000240)=""/32, 0x20}, {&(0x7f00000003c0)=""/33, 0x21}, {&(0x7f0000000400)=""/13, 0xd}, {&(0x7f0000000440)=""/252, 0xfc}, {&(0x7f0000000540)=""/64, 0x40}, {&(0x7f0000000580)=""/131, 0x83}, {&(0x7f0000000640)}], 0x8, &(0x7f0000001b80)=[{&(0x7f0000000700)=""/58, 0x3a}, {&(0x7f0000000740)=""/205, 0xcd}, {&(0x7f0000000840)=""/170, 0xaa}, {&(0x7f0000000900)=""/160, 0xa0}, {&(0x7f00000009c0)=""/4096, 0x1000}, {&(0x7f00000019c0)=""/73, 0x49}, {&(0x7f0000001a40)=""/40, 0x28}, {&(0x7f0000001a80)=""/179, 0xb3}, {&(0x7f0000001b40)=""/62, 0x3e}], 0x9, 0x0) tkill(r1, 0x14) 22:23:51 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600160000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:23:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:23:51 executing program 1: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:23:51 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x8864}, 0x30) 22:23:51 executing program 3: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000180)="d345a7babc2db515f7718000000053ff07") r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x22000, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x28, 0x250, r0, 0x8000000) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) 22:23:51 executing program 1: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:23:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c0000001900010200000000000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) 22:23:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) io_setup(0xb1, &(0x7f0000000280)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) io_getevents(r2, 0x2, 0x2, &(0x7f0000000300)=[{}, {}], 0x0) tkill(r1, 0x14) r3 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x3, 0x400) ioctl$VT_WAITACTIVE(r3, 0x5607) 22:23:51 executing program 1: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x0, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:23:51 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600170000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:23:51 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x8906}, 0x30) 22:23:51 executing program 1: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:23:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:23:51 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0xe803}, 0x30) 22:23:51 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600180000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:23:51 executing program 1: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:23:51 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200400, 0x0) ioctl$sock_ax25_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, 0x7, [@default, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}) ioctl$VIDIOC_S_FBUF(r0, 0x4030560b, &(0x7f0000000100)={0x6, 0x8, &(0x7f00000000c0)="680d9f4b16b8629c854ceaa26e7596b5a4eb657a6bb01cb5403a5172e6a60461dc3d033c26", {0x9, 0x8001, 0x7747577f, 0x0, 0x1f, 0x3, 0x3, 0x6}}) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000180)="d345a7babc2db515f7718000000053ff07") 22:23:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:23:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x1f, 0x2000) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r2, 0x6, 0x21, &(0x7f0000000240)="68e0585f20a3253e65f714e9c579b637", 0x10) io_setup(0x10000000000000b1, &(0x7f00000000c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x100, 0x0) openat$cgroup_type(r4, &(0x7f00000001c0)='cgroup.type\x00', 0x2, 0x0) io_getevents(r3, 0x2, 0x2, &(0x7f0000000300)=[{}, {}], 0x0) timer_create(0x4, &(0x7f00000002c0)={0x0, 0x2e, 0x1, @thr={&(0x7f0000000280)="4bbfa1", &(0x7f0000000340)="c0ab62c970651cc2af7d7b9058a4d21f16b489a3a594aacd6f333fa1bb02e7332e878e29a926fe4d135e30546f68a8e77a5f0603d01ea849aeace231e38b955a2cb338572481354a5f22c496f1b271549c3cf00f0cbed5d112a20fd4d43f3899cdd1cf90b9512a7ab7877e22475eea68b3e4b2a1434595a354066c1cbc2c292e5786b2ca9ec4208c053d6d9c32f94b890c933c151374be34724f233095ef9ade86cc47316968c7ca632ee90e087cd690f756d3d5abc250a7d46ab6edc87c9f09851e225c014edd4d24a2fea42589937e19333173883a132104fa54c642f1"}}, &(0x7f0000000440)) tkill(r1, 0x14) 22:23:51 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0xf401}, 0x30) 22:23:51 executing program 1: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:23:51 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600190000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:23:52 executing program 1: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev}}}}}}}, 0x0) 22:23:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:23:52 executing program 1: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev}}}}}}}, 0x0) 22:23:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:23:52 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x34000}, 0x30) 22:23:52 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="1503000006001a0000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:23:52 executing program 3: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000180)="d345a7babc2db515f7718000000053ff07") r0 = syz_open_procfs(0x0, &(0x7f0000000000)='status\x00') epoll_wait(r0, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}], 0x6, 0x4) 22:23:52 executing program 1: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev}}}}}}}, 0x0) 22:23:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)=0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) timer_settime(r2, 0x0, &(0x7f0000000100)={{0x0, 0x8}, {r3, r4+10000000}}, 0x0) io_setup(0x100b1, &(0x7f0000000280)=0x0) io_submit(r5, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) r6 = syz_open_dev$swradio(&(0x7f00000002c0)='/dev/swradio#\x00', 0x1, 0x2) openat$cgroup_type(r6, &(0x7f0000000340)='cgroup.type\x00', 0x2, 0x0) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x20000, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r7, 0xf, 0x1, 0x8, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xa}, 0x20) io_getevents(r5, 0x0, 0x2, &(0x7f0000000300)=[{}, {}], 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x80000, 0x0) tkill(r1, 0x14) 22:23:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c0000001900010200000000000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) 22:23:52 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="1503000006001b0000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:23:52 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x400300}, 0x30) 22:23:52 executing program 1: syz_emit_ethernet(0x6a, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x34, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e7"}}}}}}}, 0x0) 22:23:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:23:53 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x1000000}, 0x30) 22:23:53 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="1503000006001c0000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:23:53 executing program 1: syz_emit_ethernet(0x6a, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x34, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e7"}}}}}}}, 0x0) 22:23:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:23:53 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000180)={0x0, 0xfff}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000280)={r1, @in={{0x2, 0x4e24, @rand_addr=0x6}}}, &(0x7f0000000100)=0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000001c0)={r2, @in={{0x2, 0x4e23, @rand_addr=0x8}}}, 0x84) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000140)="d345a7babc2db515f7718000000053ff07") 22:23:53 executing program 1: syz_emit_ethernet(0x6a, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x34, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e7"}}}}}}}, 0x0) 22:23:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) io_setup(0xb1, &(0x7f0000000280)=0x0) r3 = socket$xdp(0x2c, 0x3, 0x0) poll(&(0x7f0000000340)=[{r0, 0x10}, {r0, 0x2}, {r0, 0x10}, {r0, 0x1000}, {r0, 0x1}, {r3, 0x40}, {r0, 0x110}, {r0, 0x10}, {r0, 0x9040}, {r0, 0x40}], 0xa, 0x5) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) io_getevents(r2, 0x2, 0x2, &(0x7f0000000300)=[{}, {}], 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) write$apparmor_exec(r4, &(0x7f0000000100)={'stack ', '\x00'}, 0x7) tkill(r1, 0x14) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f00000001c0)={0x0, 0x9}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000240)=@sack_info={r5, 0x81}, &(0x7f00000002c0)=0xc) 22:23:55 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x2000000}, 0x30) 22:23:55 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="1503000006001d0000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:23:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:23:55 executing program 1: syz_emit_ethernet(0x6c, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x36, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f00"}}}}}}}, 0x0) 22:23:55 executing program 3: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000180)="d345a7babc2db515f7718000000053ff07") r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='map_files\x00') ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000080)={&(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0xff}) 22:23:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:23:55 executing program 1: syz_emit_ethernet(0x6c, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x36, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f00"}}}}}}}, 0x0) 22:23:56 executing program 1: syz_emit_ethernet(0x6c, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x36, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f00"}}}}}}}, 0x0) 22:23:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c0000001900010200000000000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) 22:23:56 executing program 1: syz_emit_ethernet(0x6d, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x37, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f0004"}}}}}}}, 0x0) 22:23:56 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x4000000}, 0x30) 22:23:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) io_setup(0xb1, &(0x7f0000000280)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) tkill(r1, 0x14) 22:23:56 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="1503000006001e0000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:23:56 executing program 1: syz_emit_ethernet(0x6d, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x37, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f0004"}}}}}}}, 0x0) 22:23:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:23:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:23:56 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="1503000006001f0000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:23:56 executing program 1: syz_emit_ethernet(0x6d, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x37, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f0004"}}}}}}}, 0x0) 22:23:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) io_setup(0xb1, &(0x7f0000000280)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) io_getevents(r2, 0x2, 0x2, &(0x7f0000000300)=[{}, {}], 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) fcntl$getown(r0, 0x9) tkill(r1, 0x14) 22:23:56 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x5000000}, 0x30) 22:23:56 executing program 3: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000180)="d345a7babc2db515f7718000000053ff07") r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x40000, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000002c0)={@llc={0x1a, 0x37, 0x401, 0x1, 0x4, 0x5, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, {&(0x7f00000001c0)=""/196, 0xc4}, &(0x7f00000000c0), 0x70}, 0xa0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x440, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000040)={0x7}, 0x1) 22:23:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:23:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:23:56 executing program 1: r0 = userfaultfd(0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) ioctl$UFFDIO_REGISTER(r0, 0xc028aa03, &(0x7f00000002c0)={{&(0x7f00005e3000/0x800000)=nil, 0x800500}, 0x204000}) 22:23:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:23:56 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:23:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:23:57 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x8000000}, 0x30) 22:23:57 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="1503000006003a0000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:23:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f00000001c0)="8d778188b7ba9fd57f01b5a82fa21e3342638c4a6d7f3e4b757883f6a3e69c4789f76aed6bd04ef7ce8f9306e6f4dc5381bc311b19eeef08ab17ff44803b020442408c8dc6b11d6ec21e124afd251edadaf6d627b11ba2dd60052b9e3a62bc542f4eb2a9b943adbf52e00e52851061e60d8abf1f6ce03bd3b589ed8349315b299a6336c61664e3e8", &(0x7f0000000340)="5bc79a5b214bfe0e44dcdce7d8eabcc9259d462b26536781414ae77f495c6c1f6045b496dbb9d40c1a117b89c98f8c8b783fcde77767df543ef677cba3bdfe5f27ca6d327f4b310450a1e2e820f1cd6956ea75be9592ec294e24abd655aea0dd2c8856398b136d7e581d9aa5047c024070cf2d8a7994e635a453e4649d9f6e694030de43843cda30137f565963f19261878a11684b2df5a24f94a876bd2fd8fce7aeb5bc47"}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x101000, 0x0) io_setup(0x4, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) ioctl$VIDIOC_S_SELECTION(r2, 0xc040565f, &(0x7f0000000100)={0x6, 0x102, 0x2, {0x87, 0xbe2f, 0x3, 0xa36e}}) io_getevents(r3, 0x2, 0x2, &(0x7f0000000300)=[{}, {}], 0x0) tkill(r1, 0x14) ioctl$TIOCCBRK(r2, 0x5428) 22:23:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 651.710567][T29382] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 0 /dev/loop1 22:23:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:23:57 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='fd/4\x00') write$P9_ROPEN(r0, &(0x7f0000000180)={0x18, 0x71, 0x2, {{0x80, 0x2, 0x3}}}, 0x18) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x9, 0x84480) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r1, 0x28, &(0x7f00000001c0)}, 0x10) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000240)={{0xa, 0x4e20, 0x100, @loopback, 0x5}, {0xa, 0x4e24, 0x6e92, @empty, 0xa5}, 0x7f, [0x6ec5f683, 0x2, 0x5, 0x6, 0x7fffffff, 0x0, 0xbd4a452, 0x5]}, 0x5c) setsockopt$inet_buf(r1, 0x0, 0x9, &(0x7f0000000040)="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", 0xfe) 22:23:57 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x8060000}, 0x30) 22:23:57 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="1503000006003f0000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:23:57 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:23:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:23:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = gettid() timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) io_setup(0xb1, &(0x7f0000000280)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) io_getevents(r2, 0x2, 0x2, &(0x7f0000000300)=[{}, {}], 0x0) tkill(r1, 0x14) 22:23:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="130000001900010200000000000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) 22:23:57 executing program 3: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000180)="d345a7babc2db515f7718000000053ff07") r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x1, 0x0, 0xa000}, 0x4) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x80000) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x5) 22:23:57 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:23:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:23:57 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0xa000000}, 0x30) 22:23:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = gettid() timer_create(0x0, &(0x7f0000000200)={0x0, 0x1a, 0x0, @tid=r1}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) io_setup(0xb1, &(0x7f0000000280)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) io_getevents(r2, 0x2, 0x2, &(0x7f0000000300)=[{}, {}], 0x0) modify_ldt$read(0x0, &(0x7f0000000340)=""/226, 0xe2) tkill(r1, 0x14) 22:23:57 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000602400000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:23:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) io_setup(0xb1, &(0x7f0000000280)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) io_getevents(r2, 0x2, 0x2, &(0x7f0000000300)=[{}, {}], 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='memory.swap.current\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r3, 0x84, 0x74, &(0x7f00000001c0)=""/191, &(0x7f0000000100)=0xbf) tkill(r1, 0x14) 22:23:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:23:58 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:23:58 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0xe000000}, 0x30) 22:23:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:23:58 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000604400000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:23:58 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0xd1c7b812403027fe, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000040)={0x4c9a00c8}, 0x1) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x10000, 0x0) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f0000000080)={0x3, 0x7ff, [{0xfff, 0x0, 0x4}, {0x20, 0x0, 0x7}, {0x8, 0x0, 0x8}]}) clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)="020700000000f88cb19dc17b1b8dda409e6108442dd51e0a364b25943a0bef15f5cf7ce0d0f19a740d4ed0cfe407c7208bcc6d712ae17ea8745d8f55228577e0182418db015f360072cd21c430950b7c618e83e5dc706e0c59e4ce88610658f87906784606dafcf4674045118a1295170aca0e6a71c3e57ba1c1ddfe021408c88e932b00000000204d41783860d0815de487758d3a8e0000000000000000a59c0000003c99585be38c47913ac29e72bd25110c6c96a2c71867ceb6fcc86f23de8bd6f61814708d0ec9352e8ad537050c78ae036c1e060e05") 22:23:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) io_setup(0xb1, &(0x7f0000000280)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) io_getevents(r2, 0x2, 0x2, &(0x7f0000000300)=[{}, {}], 0x0) tkill(r1, 0x14) socket$inet_udplite(0x2, 0x2, 0x88) 22:23:58 executing program 1: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:23:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:23:58 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x11000000}, 0x30) 22:23:58 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000605400000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:23:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:23:58 executing program 3: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000180)="d345a7babc2db515f7718000000053ff07") r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$KVM_GET_PIT(r0, 0xc048ae65, &(0x7f0000000040)) 22:23:58 executing program 1: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:23:58 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x18000000}, 0x30) 22:23:58 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="15030000060a400000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:23:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="effdffff1900010200000000000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) 22:23:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) io_setup(0xb1, &(0x7f0000000280)=0x0) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000200), 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x2) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) io_getevents(r2, 0x2, 0x2, &(0x7f0000000300)=[{}, {}], 0x0) r3 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0xa08d, 0x0) ioctl$CAPI_CLR_FLAGS(r3, 0x80044325, &(0x7f0000000100)=0x1) tkill(r1, 0x1f) 22:23:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 653.692179][ C1] protocol 88fb is buggy, dev hsr_slave_0 22:23:59 executing program 1: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:23:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:23:59 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x26000000}, 0x30) 22:23:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) r2 = syz_open_dev$dspn(&(0x7f00000002c0)='/dev/dsp#\x00', 0x2, 0x101000) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000440)={0xfffffffffffff61e, 0x0, 0x7fffffff, 0x7, 0x0}, &(0x7f0000000480)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000004c0)={r3, 0x9}, &(0x7f0000000500)=0x8) timer_create(0x3, &(0x7f0000000100)={0x0, 0x3a, 0x4, @thr={&(0x7f00000000c0)="c46f0c32e3ebd036ced0687e25a28b13549bb0a01235ff762a6d564f292ca71abd2e725556391ebfe05a0f18ea0df6c854ea", &(0x7f0000000340)="41d65fce90beb5f1bbeda1e62aee651768a7d0056ef7ac943273ef69e8fa900bb56f535e676c4fd197118c27dc3bd965bb22ed0ea1cce9341646300f597cc182ad179a6d207823e0db01454e39f3808d98d5aefe9a58793dd1038d8146e33942a57c21200714c44f2e021c7c48430248f1f3b74099cd364225b82bbcff4d91d80eb987834d57dcb3d69e06befa98e3735ba712fc68a8de2ca3c385950d867505f095738c94e417d354c87042dcf804d9cb96e5614c667b4eec41803c663616d9b54c9898f6905bf5e4c3a693c577d6db614dfe"}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) io_setup(0xb1, &(0x7f0000000280)=0x0) tkill(r1, 0x28) io_submit(r4, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) io_getevents(r4, 0x2, 0x2, &(0x7f0000000300)=[{}, {}], 0x0) tkill(r1, 0x15) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x10, &(0x7f0000000240)={0x83}) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000200)) 22:23:59 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="15030000060c400000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:23:59 executing program 3: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000180)="d345a7babc2db515f7718000000053ff07") r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x1, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000000c0)=""/102, &(0x7f0000000140)=0x66) setsockopt$CAIFSO_REQ_PARAM(r0, 0x116, 0x80, &(0x7f0000000080)="1ce019c794087ba5a144aab241e4e216b23d1da5cbb07dd53d4f91f69cd118e9", 0x20) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) fsync(r1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='ifb0\x00', 0x10) 22:23:59 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:23:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:23:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) r2 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x3, 0x2) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000100)=r2, 0x29) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) io_setup(0xb1, &(0x7f0000000280)=0x0) io_submit(r3, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f0000000340)=""/4096) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, &(0x7f00000001c0)={0x0, 0x0, [], @raw_data=[0x65be02ab, 0x995, 0x81, 0x6, 0x1, 0x2, 0x6, 0x0, 0xe6f, 0x9, 0x4, 0x7ff, 0x1, 0x0, 0x10001, 0x2, 0x4, 0x85, 0x200, 0x1, 0x97, 0x3f, 0x6, 0x100, 0x9, 0x80, 0xfff, 0x5, 0x69a, 0x2, 0x20]}) io_getevents(r3, 0x2, 0x2, &(0x7f0000000300)=[{}, {}], 0x0) tkill(r1, 0x14) 22:23:59 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x40000000}, 0x30) 22:23:59 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="15030000060d400000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:23:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:23:59 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:23:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:00 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="15030000060e400000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:00 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x43050000}, 0x30) 22:24:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) lsetxattr$security_smack_entry(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f00000001c0)='%\x00', 0x2, 0x2) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) io_setup(0xb1, &(0x7f0000000280)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) io_getevents(r2, 0x2, 0x2, &(0x7f0000000300)=[{}, {}], 0x0) tkill(r1, 0x14) 22:24:00 executing program 3: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000200)="d345a7babc2db534107280000000530008e951ba21a1c70adaaa0f9e8f30d3eaf70120b894f8d8969041aabf4ea40285fbfe7f568626ce71313ed894959e6ef4835f025a58ed394408192bb95a3b3a4c7e65e9c62d894247a38ea5cdc05d92e6c308ffc15719ee2d14bd3b1f028e8261c07dca9375914469bbeee3a91b38bba93729271ba6644a81fd6a84e34ce9828c70b7d6c6008f8862dfb6817ac72cb0ce3700719f46f65d8ddfd9baa2591fb09446e878d6934073ecf48d6f16") 22:24:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c0600001900010200000000000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) 22:24:00 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000611400000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:00 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x60000000}, 0x30) 22:24:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) io_setup(0xb1, &(0x7f0000000280)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) io_getevents(r2, 0x2, 0x2, &(0x7f0000000300)=[{}, {}], 0x0) tkill(r1, 0x14) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f00000000c0), &(0x7f0000000100)=0x40) 22:24:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:24:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c0900001900010200000000000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) 22:24:00 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x65580000}, 0x30) 22:24:00 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="15030000062d400000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) io_setup(0xb1, &(0x7f0000000280)=0x0) io_submit(r1, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x7}]) r2 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x5, 0x200) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r2, 0x80045530, &(0x7f0000000340)=""/209) io_getevents(r1, 0x2, 0x2, &(0x7f0000000300)=[{}, {}], 0x0) 22:24:01 executing program 3: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000180)="d345a7babc2db515f7718000000053ff07") openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) 22:24:01 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:24:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:01 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000632400000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:01 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x80350000}, 0x30) 22:24:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 656.332186][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 656.332221][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 656.338400][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 656.344234][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 656.357252][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:24:01 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:24:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:01 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000638400000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:01 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x81000000}, 0x30) 22:24:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:02 executing program 0: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000340)='/dev/cachefiles\x00', 0x101400, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) io_setup(0xb1, &(0x7f0000000280)=0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x44800, 0x0) ioctl$MON_IOCH_MFLUSH(r4, 0x9208, 0x6f) gettid() io_submit(r3, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x2e8}]) io_getevents(r3, 0x2, 0x2, &(0x7f0000000300)=[{}, {}], 0x0) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x2000, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r6, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=[@prinfo={0x18, 0x84, 0x5, {0x2}}], 0x18}, 0x0) timer_create(0x7, &(0x7f0000000100)={0x0, 0x1b, 0x0, @tid=r2}, &(0x7f00000002c0)) tkill(r2, 0x14) syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0xff, 0x0) ioctl(r5, 0x80000000, &(0x7f0000000380)="6b3653a49f56ecc44ddcab2ab638b8209ff38dd62e90e1040198806f84bbeb7a7dd2665bbaf8ae73b5554840cb81a013bbd5ebf4f49c926a35889a5e5a4840a60cfb70dddb4a211adb64368ab207c998ac52d12660a6de5388ca75bfbd784c24c55aedc9aa0e") 22:24:02 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x2, 0xfffffffffffff001}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000000c0)={r1, 0x1010000000000000, 0x10}, 0xc) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f0000000100)={0x5, 0x0, 0x200, 0x36ae28dc, '\x00', 0x8}) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000180)="d345a7babc2db515f7718000000053ff07") 22:24:02 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 22:24:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:02 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000639400000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:02 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x86ddffff}, 0x30) 22:24:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x5, @tid=r1}, &(0x7f0000000080)) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) io_setup(0xb1, &(0x7f0000000280)=0x0) io_submit(r3, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) io_getevents(r3, 0x2, 0x2, &(0x7f0000000300)=[{}, {}], 0x0) tkill(r1, 0x14) 22:24:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:02 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 22:24:02 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x88470000}, 0x30) 22:24:02 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000642400000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:02 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 22:24:03 executing program 3: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000180)="d345a7babc2db515f7718000000053ff07") prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000200)="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", 0x1000) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f00000001c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000040)}}, 0x18) 22:24:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:03 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x88480000}, 0x30) 22:24:03 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 22:24:03 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600460000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:05 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000380)='/dev/snd/pcmC#D#p\x00', 0xffff, 0x101) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000480)={'nat\x00', 0x0, 0x4, 0x0, [], 0x5, &(0x7f00000003c0)=[{}, {}, {}, {}, {}], &(0x7f0000000440)}, &(0x7f0000000500)=0x78) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) r3 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xd}}}}, &(0x7f0000000100)=0x84) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000440)=r0, 0x4) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f00000002c0)={r4, 0x41a2}, &(0x7f0000000340)=0x8) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) io_setup(0xb1, &(0x7f0000000280)=0x0) io_submit(r5, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_getevents(r5, 0x2, 0x2, &(0x7f0000000300)=[{}, {}], 0x0) tkill(r2, 0x14) 22:24:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 22:24:05 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000605ee0000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:05 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x88640000}, 0x30) 22:24:05 executing program 3: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000000)="d345a7babc2db515f7718000000053ff07") r0 = accept4$x25(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x12, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'rose0\x00', 0xa000}) 22:24:05 executing program 3: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000040)="d345a7babc2db515b7718000000053ff07fa4378b57250dcfaa88638ab352ba16d82a20c8a5291021c185e697c4d9b12c46cab3cc4098e8fe4736a") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x45}) 22:24:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 22:24:05 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600020000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:05 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x88a8ffff}, 0x30) 22:24:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c6000001900010200000000000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) 22:24:06 executing program 0: r0 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) io_setup(0xb1, &(0x7f0000000280)=0x0) io_submit(r1, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) io_getevents(r1, 0x2, 0x2, &(0x7f0000000300)=[{}, {}], 0x0) tkill(r0, 0x14) 22:24:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 22:24:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:06 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600030000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:06 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x88caffff}, 0x30) 22:24:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) io_setup(0xb1, &(0x7f0000000280)=0x0) io_submit(r1, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) io_getevents(r1, 0x0, 0x1, &(0x7f00000001c0)=[{}, {}], 0x0) tkill(0x0, 0x14) 22:24:06 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$NBD_CLEAR_SOCK(r0, 0xab04) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000180)="d345a7babc2db515f7718000000053ff07") ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x2) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f00000000c0)=@ccm_128={{0x304}, "593967cfc72ecd21", "e68251ac054c5fd6c3b1025ded19213e", "be052921", "e81e3efbe7b56804"}, 0x28) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f00000001c0)={0x7, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {0x0}]}) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f0000000240)={r1, 0x3}) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000200)={0x22, 0x0, 0x40005ca, 0x9, 0x80000000, 0x3a, 0x5, 0x3cd, 0x1000, 0x7fff, 0x8001}, 0x7) accept4$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000140)=0x1c, 0x80000) 22:24:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 22:24:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) io_setup(0xb1, &(0x7f0000000280)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000100)) io_getevents(r2, 0x2, 0x2, &(0x7f0000000300)=[{}, {}], 0x0) r3 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x51b, 0x8000) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r3, 0xc1105518, &(0x7f0000000340)={{0x9, 0x6, 0x1, 0x1f, '\x00', 0x6}, 0x3, 0x20, 0x1, r1, 0x6, 0xffffffffffffff81, 'syz0\x00', &(0x7f00000001c0)=['user-\x00', 'bdeveth0#./\x00', '%em1proccgroup%-\\^\x00', '.vboxnet0)\x00', '*,wlan0cpuset-,\x00', '\x00'], 0x41, [], [0x1f, 0xfffffffffffffffb, 0x7, 0x7f]}) tkill(r1, 0x14) 22:24:06 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600040000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:06 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x89060000}, 0x30) 22:24:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0), 0x0, 0x10000}], 0x0, 0x0) 22:24:06 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0xa0010000}, 0x30) 22:24:06 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600050000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:07 executing program 3: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000180)="d345a7babc2db515f7718000000053ff07") r0 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000080)=0x60) openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0xc0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) 22:24:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)=0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) timer_settime(r2, 0x0, &(0x7f0000000040)={{r3, r4+10000000}, {0x0, 0x9}}, 0x0) io_setup(0xb2, &(0x7f0000000100)=0x0) io_submit(r5, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) socket$key(0xf, 0x3, 0x2) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f00000000c0)) r6 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x2, 0x8002) ioctl$SIOCX25GDTEFACILITIES(r6, 0x89ea, &(0x7f0000000200)) io_getevents(r5, 0x2, 0x2, &(0x7f0000000300)=[{}, {}], 0x0) tkill(r1, 0x14) 22:24:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) 22:24:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:07 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600060000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:07 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0xe8030000}, 0x30) 22:24:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c000b001900010200000000000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) 22:24:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) 22:24:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:07 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600070000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:07 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0xf4010000}, 0x30) 22:24:07 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) [ 662.572174][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 662.572197][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 662.578051][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 662.583729][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 662.589491][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 662.600896][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:24:08 executing program 3: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f00000001c0)="d345a7babc2db515f7718000009353ff073557d559a09b20532941e027851d9ea0ccdf475d648866f88f4c2d81dcc09fed30586635673c639876434414886965d9659c654b2cca0c472591873244f1248764690937a48f6267782e4ae62102dce734a1528bf31aa0ecfb80365038ceac6a029301a300ec5e7b475464e1d0b71e66b5fa4a1ec570bc6204dd81f0e1dbbb731b2c82ff64546c162598311d7568e58eb603c25868780d16f971eaf05b4a91001a750171b91ea4b6a5b40a69452323f66a0c25cc7b3ab394374f6033ef9ef3e3c5e035c822a7cdf85a0ce82e102b33a9e5bedda07323bc9a7807") io_setup(0x5, &(0x7f0000000000)=0x0) io_destroy(r0) 22:24:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) io_setup(0x20b1, &(0x7f00000000c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) io_getevents(r2, 0x2, 0x2, &(0x7f0000000300)=[{}, {}], 0x0) tkill(r1, 0x14) 22:24:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 22:24:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c000e001900010200000000000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) 22:24:10 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600080000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:10 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0xffffa888}, 0x30) 22:24:10 executing program 3: r0 = msgget$private(0x0, 0x20) r1 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x400, 0x4000) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000300)={0x0, 0x0, 0x3, 0x0, [], [{0x2, 0x6, 0x5, 0x0, 0x7f, 0x95}, {0x7fff, 0x800, 0x8, 0x8, 0x4ec2, 0x1000}], [[], [], []]}) msgctl$MSG_INFO(r0, 0xc, &(0x7f00000011c0)=""/4096) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000180)="d345a7babc2db515f7718000000053ff07") openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) 22:24:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c000f001900010200000000000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) 22:24:10 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 22:24:10 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0xffffca88}, 0x30) 22:24:11 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600090000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c0011001900010200000000000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) 22:24:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) io_setup(0xb1, &(0x7f0000000280)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) io_getevents(r2, 0x2, 0x2, &(0x7f0000000300)=[{}, {}], 0x0) r3 = dup2(r0, r0) ioctl$RTC_WKALM_RD(r3, 0x80287010, &(0x7f00000000c0)) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f0000000100)=0xed, 0x8) tkill(r1, 0x14) [ 665.692175][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 665.698042][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:24:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 22:24:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:11 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0xffffdd86}, 0x30) 22:24:11 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="1503000006000a0000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:11 executing program 3: eventfd(0x800) 22:24:11 executing program 0: ioprio_set$pid(0x2, 0x0, 0x0) clone(0x200085fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x802a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 22:24:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffff", 0x3f, 0x10000}], 0x0, 0x0) 22:24:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c0014001900010200000000000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) 22:24:11 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x1a0ffffffff}, 0x30) 22:24:11 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="1503000006000b0000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:11 executing program 0: ioprio_set$pid(0x2, 0x0, 0x0) clone(0x200085fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x802a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 22:24:11 executing program 0: ioprio_set$pid(0x2, 0x0, 0x0) clone(0x200085fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x802a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 22:24:11 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20140, 0x0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000000140)=0x1) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000180)="d345a7babc2db515f7718000000053ff07") r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x402) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x10001}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000001c0)={r2, 0xbe, "49dc49266e3deaf0ae9acd8248372dc020fe2146f400a83f649f9384cff5c4f02060340ab57549a55779766b093b8339602209ef7ea945a1640911bb40a8fb2a437556ef14c858a1ed6e2102e5727fb3e429afc9f60a8fbed2e95dce237e6880d7ff580ef4b44dc21586ed1e6fbb48fc97c2aab0dddbbe8215ce08a1140f0b5fc775aba46c5ef24f201948acacb7498c44edf10834468f272c6efca24a04506c67e370c91056af49b2a532b82f652653b6a7f2a23260d01bc7d972803559"}, &(0x7f00000000c0)=0xc6) 22:24:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:11 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffff", 0x3f, 0x10000}], 0x0, 0x0) 22:24:11 executing program 0: ioprio_set$pid(0x2, 0x0, 0x0) clone(0x200085fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x802a4500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 22:24:11 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="1503000006000c0000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:11 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x40030000000000}, 0x30) 22:24:11 executing program 0: setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000080)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_triestat\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000480), 0x1000000000000110, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) 22:24:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c6558001900010200000000000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) 22:24:12 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="1503000006000d0000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffff", 0x3f, 0x10000}], 0x0, 0x0) 22:24:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:12 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x100000000000000}, 0x30) 22:24:12 executing program 3: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x200, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x402, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="f5000000bd01000001010000048d2aa18c859591e7ebe8f49ff015e557dd26b0847d4c5475fa722463603df8865377b725cd050d4efefcbe0a1ee5b54ef483e27ae156255bda6b87effbeeb71d233345cd18d4040a0680ee840e9902d9ea01f2fdb698b57900dd736ae5fa8b7bcb610886db7d9ffedc4f6881f216da74d42b91705ee85ba94e0f81d77515204b9982ebf25decf302c7f35ecfbc48e038631a97c18fe42f580031c8f12f5f3449b469850e3300c377772b00c71b20844b39f246ac8d899621c5446dd99b20a63a65dfea14e14d1b7b40a1999e053f4e595a2b2f1bb676328d14d6b8065d4c1bfbdde47502293616f3b89048e4c9f979d79cfcac00"]) r1 = dup2(r0, r0) clone(0x208860fc, 0x0, 0x0, 0x0, &(0x7f0000000180)="d345a7babc2db515f7718000000053ff07") ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000001c0)={'bcsf0\x00', 0x2000}) fcntl$getown(r1, 0x9) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) 22:24:12 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="1503000006000e0000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:12 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x200000000000000}, 0x30) 22:24:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f424852", 0x44, 0x10000}], 0x0, 0x0) 22:24:12 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c5865001900010200000000000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) 22:24:12 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000001b00), 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x20) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$netlink(r0, 0x10e, 0x9, 0x0, &(0x7f0000000280)) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 22:24:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c0081001900010200000000000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) [ 667.654606][T30214] QAT: Invalid ioctl [ 667.686671][T30214] QAT: Invalid ioctl [ 667.700781][T30214] QAT: Invalid ioctl 22:24:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f424852", 0x44, 0x10000}], 0x0, 0x0) [ 667.736930][T30226] QAT: Invalid ioctl 22:24:13 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="1503000006000f0000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c06c5001900010200000000000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) 22:24:13 executing program 0: sched_setaffinity(0x0, 0x0, 0x0) clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 22:24:13 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x400000000000000}, 0x30) [ 667.834698][T30214] QAT: Invalid ioctl 22:24:13 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200000, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000040)=ANY=[@ANYBLOB="ac1414bbac1414bb01ff03000000000000ffffff"], 0x14) r1 = openat$cgroup(r0, &(0x7f00000001c0)='syz1\x00', 0x200002, 0x0) fallocate(r1, 0x4, 0x7, 0x9) ioctl$VIDIOC_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000080)={0x0, 0x0, [], @raw_data=[0x8, 0x0, 0xffffffff, 0xa2, 0xfffffffffffff001, 0xdb8f, 0x6, 0x0, 0xd6, 0x9, 0x7, 0x1, 0x2, 0xffffffffffffff7f, 0x5, 0x8, 0x2, 0x3, 0x2, 0x3, 0x8, 0x1, 0x4, 0x400, 0x0, 0x2, 0x6b8, 0x1, 0x4, 0xc47, 0x1000, 0xfffffffffffffff8]}) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000180)="d345a7babc2db515f7718000000053ff07") 22:24:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000000c0)) r2 = syz_open_procfs(r1, &(0x7f0000000100)='oom_score\x00') getresuid(&(0x7f0000000540)=0x0, &(0x7f0000000580), &(0x7f00000005c0)) setuid(r3) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000500)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000380)={0x11c, r4, 0x0, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x4c, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7e8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3751}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffffffffffbff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x401}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_PROP={0x4}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xe8ec}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xc00000000}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000000}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_BEARER={0x38, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xdc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8}]}]}, 0x11c}}, 0x10) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f00000001c0)=""/181, &(0x7f0000000080)=0xb5) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) io_setup(0xb1, &(0x7f0000000280)=0x0) io_submit(r5, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) io_getevents(r5, 0x2, 0x2, &(0x7f0000000300)=[{}, {}], 0x0) fchdir(r0) tkill(r1, 0x14) 22:24:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f424852", 0x44, 0x10000}], 0x0, 0x0) 22:24:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:13 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600100000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f4248526653", 0x46, 0x10000}], 0x0, 0x0) 22:24:13 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x500000000000000}, 0x30) 22:24:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) io_setup(0xb1, &(0x7f0000000280)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) io_getevents(r2, 0x2, 0x2, &(0x7f0000000300)=[{}, {}], 0x0) tkill(r1, 0x14) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000340)="00cfa4c65a234030980a77b4b2e5a47b996c7540004792551a4552f5e4449eed5f44d602906bf91a2bccc81f43c0d2c8eb43302add96ddfefce6c5410434b95a11f8fa5ebdf41ecd3215b7113c0b37e69ad1f805a49d3b09aef8a1654acd6fd6c5c303d8bda7c7439ca4dbe11efc843c2973e342f5f231c0206bae6a1370c5bd70f8e1fba4c752e9855f54d85e9ac200912b645da6fe18addb3b55780d9ba8d42e47b8d0a63276502da199548bb7afd0af8209c97bb7e0529877ccde021fda25f54a2c9ecccf347e5de0648065f61d62d3ca5458a4a18275ec5344c5d9", 0xdd, 0xfffffffffffffffa) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440)='/dev/hwrng\x00', 0x701000, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r4, 0xc008ae67, &(0x7f0000000480)={0x8, 0x3}) r5 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$reject(0x13, r3, 0x2, 0x6ad39eab, r5) r6 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0xffff, 0x84000) ioctl$KVM_CREATE_PIT2(r6, 0x4040ae77, &(0x7f0000000100)={0x116b}) 22:24:13 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f4248526653", 0x46, 0x10000}], 0x0, 0x0) 22:24:13 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600110000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:14 executing program 3: clone(0x2000, 0x0, 0x0, 0x0, &(0x7f0000000180)="d345a7babc2db515f7710200000053ff07") r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000080)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/snmp6\x00') ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x17, 0x2f, 0xc, 0xe, 0xb, 0x3, 0x0, 0x7a, 0x1}}) fsetxattr$security_smack_transmute(r1, &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x2) openat$cgroup_ro(r1, &(0x7f0000000140)='cpu.stat\x00', 0x0, 0x0) 22:24:14 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x800000000000000}, 0x30) 22:24:14 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000200)="150300000600400000000200850cf7c41975e697080000026b2a2fcddad8897c6f11876d886b17b07783af113b860f84f789cca7a7659866a63deae307d02f746100"/75, 0x4b, 0x0, 0x0, 0x0) recvfrom$inet6(r2, &(0x7f0000000180)=""/71, 0x47, 0x0, 0x0, 0x0) 22:24:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f4248526653", 0x46, 0x10000}], 0x0, 0x0) 22:24:14 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600120000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 22:24:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:14 executing program 3: clone(0x40020886100, 0x0, 0x0, 0x0, &(0x7f0000000040)="d345a7babc31e4ff8a0dd1e373dfa8eded5b8effffffffffff4aff07000000000000ebb20004e690d93226891b670600687995f977b36c099d61fd379aaaf8e3944b83c020675ff05a91791853343f2b0432b976480be460eaada46ffe59d95d19ae96e4") 22:24:14 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600130000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:14 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x806000000000000}, 0x30) 22:24:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:14 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 22:24:15 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000200)="150300000600400000000200850cf7c41975e697080000026b2a2fcddad8897c6f11876d886b17b07783af113b860f84f789cca7a7659866a63deae307d02f74610000000000000000000000963c8b7fc0a6e13c14e6ea", 0x57, 0x0, 0x0, 0x0) recvfrom$inet6(r2, &(0x7f0000000180)=""/71, 0x47, 0x0, 0x0, 0x0) 22:24:15 executing program 3: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000180)="d345a7babc2db515f7718000000053ff07") r0 = creat(&(0x7f0000000000)='./file0\x00', 0x14) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e23, @multicast1}}, 0x0, 0x7, 0x7ff, 0x3f, 0xa}, &(0x7f0000000100)=0x98) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={r1}, 0x8) 22:24:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 22:24:15 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0xa00000000000000}, 0x30) 22:24:15 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600140000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c000a001900010200000000000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) 22:24:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48}], 0x0, 0x0) 22:24:15 executing program 0 (fault-call:0 fault-nth:0): syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 669.929584][T30402] FAULT_INJECTION: forcing a failure. [ 669.929584][T30402] name failslab, interval 1, probability 0, space 0, times 0 [ 669.942409][T30402] CPU: 1 PID: 30402 Comm: syz-executor.0 Not tainted 5.3.0-rc1+ #84 [ 669.942427][T30402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 669.942443][T30402] Call Trace: [ 669.960521][T30402] dump_stack+0x172/0x1f0 [ 669.960543][T30402] should_fail.cold+0xa/0x15 [ 669.960559][T30402] ? fault_create_debugfs_attr+0x180/0x180 22:24:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:15 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0xe00000000000000}, 0x30) 22:24:15 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600150000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) [ 669.960590][T30402] ? __mutex_lock+0x3da/0x1340 [ 669.983322][T30402] __should_failslab+0x121/0x190 [ 669.988277][T30402] should_failslab+0x9/0x14 [ 669.992790][T30402] kmem_cache_alloc+0x47/0x710 [ 669.997581][T30402] ? process_buffer_measurement.constprop.0+0x2f0/0x2f0 [ 670.004525][T30402] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 670.010779][T30402] __build_skb+0x26/0x70 [ 670.015032][T30402] __napi_alloc_skb+0x1d2/0x300 [ 670.019895][T30402] napi_get_frags+0x65/0x140 [ 670.024507][T30402] tun_get_user+0x16bd/0x3fa0 [ 670.029226][T30402] ? lock_downgrade+0x920/0x920 [ 670.034094][T30402] ? tun_device_event+0x10e0/0x10e0 [ 670.039282][T30402] ? lock_downgrade+0x920/0x920 [ 670.044116][T30402] ? tun_chr_close+0x180/0x180 [ 670.048865][T30402] tun_chr_write_iter+0xbd/0x156 [ 670.053784][T30402] do_iter_readv_writev+0x5f8/0x8f0 [ 670.058962][T30402] ? no_seek_end_llseek_size+0x70/0x70 [ 670.064407][T30402] ? apparmor_file_permission+0x25/0x30 [ 670.069940][T30402] ? rw_verify_area+0x126/0x360 [ 670.074793][T30402] do_iter_write+0x184/0x610 [ 670.079387][T30402] ? dup_iter+0x250/0x250 [ 670.083698][T30402] ? __kasan_check_read+0x11/0x20 [ 670.088714][T30402] vfs_writev+0x1b3/0x2f0 [ 670.093062][T30402] ? vfs_iter_write+0xb0/0xb0 [ 670.097742][T30402] ? ksys_dup3+0x3e0/0x3e0 [ 670.102954][T30402] ? wait_for_completion+0x440/0x440 [ 670.109472][T30402] ? __fget_light+0x1a9/0x230 [ 670.114294][T30402] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 670.120944][T30402] do_writev+0x15b/0x330 [ 670.125568][T30402] ? vfs_writev+0x2f0/0x2f0 [ 670.130303][T30402] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 670.136864][T30402] __x64_sys_writev+0x75/0xb0 [ 670.141540][T30402] do_syscall_64+0xfd/0x6a0 [ 670.146053][T30402] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 670.151935][T30402] RIP: 0033:0x4596e1 [ 670.155813][T30402] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 b9 fb ff c3 48 83 ec 08 e8 fa 2c 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 43 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 670.175415][T30402] RSP: 002b:00007fd129317ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 670.183815][T30402] RAX: ffffffffffffffda RBX: 000000000000006e RCX: 00000000004596e1 [ 670.191773][T30402] RDX: 0000000000000001 RSI: 00007fd129317c00 RDI: 00000000000000f0 [ 670.199736][T30402] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 670.207702][T30402] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fd1293186d4 [ 670.215673][T30402] R13: 00000000004c8745 R14: 00000000004df458 R15: 0000000000000003 22:24:15 executing program 3: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000180)="d345a7babc2db515f7718000000053ff07") r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x80000, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000040)={'nr0\x00', {0x2, 0x4e21, @remote}}) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) 22:24:15 executing program 0 (fault-call:0 fault-nth:1): syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48}], 0x0, 0x0) 22:24:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:15 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600160000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:15 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x1100000000000000}, 0x30) [ 670.633158][T30436] FAULT_INJECTION: forcing a failure. [ 670.633158][T30436] name failslab, interval 1, probability 0, space 0, times 0 [ 670.645890][T30436] CPU: 1 PID: 30436 Comm: syz-executor.0 Not tainted 5.3.0-rc1+ #84 [ 670.654672][T30436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 670.654679][T30436] Call Trace: [ 670.654709][T30436] dump_stack+0x172/0x1f0 [ 670.654735][T30436] should_fail.cold+0xa/0x15 [ 670.654763][T30436] ? fault_create_debugfs_attr+0x180/0x180 22:24:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c000f001900010200000000000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) [ 670.668114][T30436] ? mark_held_locks+0xf0/0xf0 [ 670.668136][T30436] __should_failslab+0x121/0x190 [ 670.668158][T30436] should_failslab+0x9/0x14 [ 670.682877][T30436] kmem_cache_alloc_trace+0x4b/0x790 [ 670.682895][T30436] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 670.682920][T30436] ? ___neigh_lookup_noref.constprop.0+0x53b/0x780 [ 670.697099][T30436] find_match+0x842/0xd70 [ 670.697120][T30436] __find_rr_leaf+0x14e/0x750 [ 670.697142][T30436] ? nexthop_is_blackhole+0x750/0x750 [ 670.729538][T30436] ? fib6_add+0x3900/0x3900 [ 670.734048][T30436] ? __kasan_check_read+0x11/0x20 [ 670.739096][T30436] ? lock_downgrade+0x920/0x920 [ 670.744050][T30436] fib6_table_lookup+0x697/0xdb0 [ 670.749008][T30436] ? rt6_age_exceptions+0x130/0x130 [ 670.754224][T30436] ip6_pol_route+0x1f6/0xaf0 [ 670.758818][T30436] ? ip6_pol_route_lookup+0x1240/0x1240 [ 670.764359][T30436] ? ip6_multipath_l3_keys+0x3a7/0xa00 [ 670.769806][T30436] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 670.775679][T30436] ? flow_hash_from_keys+0x393/0xa90 [ 670.780953][T30436] ip6_pol_route_input+0x65/0x80 [ 670.785885][T30436] fib6_rule_lookup+0x133/0x7a0 [ 670.790741][T30436] ? ip6_pol_route+0xaf0/0xaf0 [ 670.795493][T30436] ? fib6_lookup+0x340/0x340 [ 670.800082][T30436] ? fib6_table_lookup+0xdb0/0xdb0 [ 670.805192][T30436] ? ip6t_do_table+0xd75/0x1c80 [ 670.810072][T30436] ? ip6t_do_table+0xdcb/0x1c80 [ 670.814928][T30436] ? nf_conntrack_icmpv6_error+0x3c1/0x560 [ 670.820740][T30436] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 670.826623][T30436] ip6_route_input_lookup+0xb7/0xd0 [ 670.831810][T30436] ip6_route_input+0x5e2/0xa00 [ 670.836567][T30436] ? ip6_route_check_nh+0x670/0x670 [ 670.841757][T30436] ? nf_nat_icmpv6_reply_translation+0x6c0/0x6c0 [ 670.848088][T30436] ? nf_conntrack_update+0x960/0x960 [ 670.853491][T30436] ? __kasan_check_read+0x11/0x20 [ 670.858855][T30436] ? nf_nat_ipv6_out+0x480/0x480 [ 670.863918][T30436] ip6_rcv_finish_core.isra.0+0x174/0x560 [ 670.869643][T30436] ip6_rcv_finish+0x17a/0x2f0 [ 670.874347][T30436] ipv6_rcv+0x10e/0x420 [ 670.878675][T30436] ? ip6_rcv_core.isra.0+0x1bb0/0x1bb0 [ 670.884145][T30436] ? ip6_rcv_finish_core.isra.0+0x560/0x560 [ 670.890041][T30436] ? __might_fault+0x12b/0x1e0 [ 670.894796][T30436] ? ip6_rcv_core.isra.0+0x1bb0/0x1bb0 [ 670.900240][T30436] __netif_receive_skb_one_core+0x113/0x1a0 [ 670.906142][T30436] ? __netif_receive_skb_core+0x3060/0x3060 [ 670.912024][T30436] ? lock_acquire+0x190/0x410 [ 670.916692][T30436] ? netif_receive_skb_internal+0x86/0x390 [ 670.922492][T30436] __netif_receive_skb+0x2c/0x1d0 [ 670.927511][T30436] netif_receive_skb_internal+0x108/0x390 [ 670.933237][T30436] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 670.939475][T30436] ? __netif_receive_skb+0x1d0/0x1d0 [ 670.944759][T30436] ? eth_gro_receive+0x890/0x890 [ 670.949702][T30436] napi_gro_frags+0xb3d/0xd70 [ 670.954395][T30436] tun_get_user+0x2e8f/0x3fa0 [ 670.959066][T30436] ? lock_downgrade+0x920/0x920 [ 670.963903][T30436] ? tun_device_event+0x10e0/0x10e0 [ 670.969103][T30436] ? tun_chr_close+0x180/0x180 [ 670.973967][T30436] tun_chr_write_iter+0xbd/0x156 [ 670.978897][T30436] do_iter_readv_writev+0x5f8/0x8f0 [ 670.984112][T30436] ? no_seek_end_llseek_size+0x70/0x70 [ 670.989568][T30436] ? apparmor_file_permission+0x25/0x30 [ 670.995096][T30436] ? rw_verify_area+0x126/0x360 [ 670.999936][T30436] do_iter_write+0x184/0x610 [ 671.004529][T30436] ? dup_iter+0x250/0x250 [ 671.008846][T30436] ? __kasan_check_read+0x11/0x20 [ 671.013899][T30436] vfs_writev+0x1b3/0x2f0 [ 671.018213][T30436] ? vfs_iter_write+0xb0/0xb0 [ 671.022875][T30436] ? ksys_dup3+0x3e0/0x3e0 [ 671.027281][T30436] ? wait_for_completion+0x440/0x440 [ 671.032550][T30436] ? __fget_light+0x1a9/0x230 [ 671.037211][T30436] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 671.043442][T30436] do_writev+0x15b/0x330 [ 671.047700][T30436] ? vfs_writev+0x2f0/0x2f0 [ 671.052191][T30436] ? switch_fpu_return+0x1fa/0x4f0 [ 671.057314][T30436] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 671.063363][T30436] __x64_sys_writev+0x75/0xb0 [ 671.068026][T30436] do_syscall_64+0xfd/0x6a0 [ 671.072533][T30436] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 671.078404][T30436] RIP: 0033:0x4596e1 [ 671.082284][T30436] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 b9 fb ff c3 48 83 ec 08 e8 fa 2c 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 43 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 671.101898][T30436] RSP: 002b:00007fd129317ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 671.110302][T30436] RAX: ffffffffffffffda RBX: 000000000000006e RCX: 00000000004596e1 [ 671.118252][T30436] RDX: 0000000000000001 RSI: 00007fd129317c00 RDI: 00000000000000f0 [ 671.126211][T30436] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 22:24:16 executing program 0 (fault-call:0 fault-nth:2): syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 671.134199][T30436] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fd1293186d4 [ 671.142156][T30436] R13: 00000000004c8745 R14: 00000000004df458 R15: 0000000000000003 22:24:16 executing program 1: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48}], 0x0, 0x0) [ 671.237618][T30453] FAULT_INJECTION: forcing a failure. [ 671.237618][T30453] name failslab, interval 1, probability 0, space 0, times 0 [ 671.250321][T30453] CPU: 0 PID: 30453 Comm: syz-executor.0 Not tainted 5.3.0-rc1+ #84 [ 671.258400][T30453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 671.268461][T30453] Call Trace: [ 671.271771][T30453] dump_stack+0x172/0x1f0 [ 671.276124][T30453] should_fail.cold+0xa/0x15 [ 671.280735][T30453] ? fault_create_debugfs_attr+0x180/0x180 [ 671.286536][T30453] __should_failslab+0x121/0x190 [ 671.291478][T30453] should_failslab+0x9/0x14 [ 671.295988][T30453] kmem_cache_alloc+0x47/0x710 [ 671.300758][T30453] ? lock_acquire+0x190/0x410 [ 671.300777][T30453] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 671.300794][T30453] ? __raw_v6_lookup+0x3b9/0x490 [ 671.300816][T30453] skb_clone+0x154/0x3d0 [ 671.320883][T30453] raw6_local_deliver+0x332/0xae0 [ 671.325916][T30453] ? rawv6_rcv+0x1130/0x1130 [ 671.325938][T30453] ? mark_held_locks+0xf0/0xf0 22:24:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 671.325958][T30453] ip6_protocol_deliver_rcu+0x360/0x1660 [ 671.325986][T30453] ? lock_acquire+0x190/0x410 [ 671.345617][T30453] ? ip6_protocol_deliver_rcu+0x1660/0x1660 [ 671.351524][T30453] ip6_input_finish+0x84/0x170 [ 671.356299][T30453] ip6_input+0xe4/0x3f0 [ 671.360490][T30453] ? ip6_input_finish+0x170/0x170 [ 671.365522][T30453] ? ip6_protocol_deliver_rcu+0x1660/0x1660 [ 671.371424][T30453] ? ipv6_chk_mcast_addr+0x2f2/0x6f0 [ 671.377331][T30453] ip6_mc_input+0x4aa/0xf09 [ 671.381844][T30453] ? ip6_input+0x3f0/0x3f0 [ 671.386284][T30453] ip6_rcv_finish+0x1de/0x2f0 [ 671.390973][T30453] ipv6_rcv+0x10e/0x420 [ 671.395148][T30453] ? ip6_rcv_core.isra.0+0x1bb0/0x1bb0 [ 671.400646][T30453] ? ip6_rcv_finish_core.isra.0+0x560/0x560 [ 671.406540][T30453] ? __might_fault+0x12b/0x1e0 [ 671.411313][T30453] ? ip6_rcv_core.isra.0+0x1bb0/0x1bb0 [ 671.411331][T30453] __netif_receive_skb_one_core+0x113/0x1a0 [ 671.411347][T30453] ? __netif_receive_skb_core+0x3060/0x3060 [ 671.411366][T30453] ? lock_acquire+0x190/0x410 [ 671.411388][T30453] ? netif_receive_skb_internal+0x86/0x390 [ 671.422720][T30453] __netif_receive_skb+0x2c/0x1d0 [ 671.422737][T30453] netif_receive_skb_internal+0x108/0x390 [ 671.422754][T30453] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 671.422768][T30453] ? __netif_receive_skb+0x1d0/0x1d0 [ 671.422783][T30453] ? eth_gro_receive+0x890/0x890 [ 671.422800][T30453] napi_gro_frags+0xb3d/0xd70 [ 671.422819][T30453] tun_get_user+0x2e8f/0x3fa0 [ 671.422833][T30453] ? lock_downgrade+0x920/0x920 [ 671.422853][T30453] ? tun_device_event+0x10e0/0x10e0 22:24:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 671.422871][T30453] ? tun_chr_close+0x180/0x180 [ 671.422890][T30453] tun_chr_write_iter+0xbd/0x156 [ 671.422905][T30453] do_iter_readv_writev+0x5f8/0x8f0 [ 671.422920][T30453] ? no_seek_end_llseek_size+0x70/0x70 [ 671.422934][T30453] ? apparmor_file_permission+0x25/0x30 [ 671.422951][T30453] ? rw_verify_area+0x126/0x360 [ 671.422963][T30453] do_iter_write+0x184/0x610 [ 671.422986][T30453] ? dup_iter+0x250/0x250 [ 671.423008][T30453] ? __kasan_check_read+0x11/0x20 [ 671.531581][T30453] vfs_writev+0x1b3/0x2f0 [ 671.535907][T30453] ? vfs_iter_write+0xb0/0xb0 [ 671.540586][T30453] ? ksys_dup3+0x3e0/0x3e0 [ 671.544996][T30453] ? wait_for_completion+0x440/0x440 [ 671.550293][T30453] ? __fget_light+0x1a9/0x230 [ 671.554993][T30453] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 671.561231][T30453] do_writev+0x15b/0x330 [ 671.565455][T30453] ? vfs_writev+0x2f0/0x2f0 [ 671.570056][T30453] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 671.576128][T30453] __x64_sys_writev+0x75/0xb0 [ 671.580791][T30453] do_syscall_64+0xfd/0x6a0 [ 671.585304][T30453] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 671.591176][T30453] RIP: 0033:0x4596e1 [ 671.595075][T30453] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 b9 fb ff c3 48 83 ec 08 e8 fa 2c 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 43 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 671.614681][T30453] RSP: 002b:00007fd129317ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 671.623103][T30453] RAX: ffffffffffffffda RBX: 000000000000006e RCX: 00000000004596e1 [ 671.631092][T30453] RDX: 0000000000000001 RSI: 00007fd129317c00 RDI: 00000000000000f0 22:24:16 executing program 3: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000180)="d345a7babc2db515f7718000000053ff07") r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) r2 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x40, 0x40282) setsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000100)=0x81, 0x4) ioctl$TIOCGWINSZ(r2, 0x5413, &(0x7f00000000c0)) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x10000, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)={0x4, 0x7, 0x4, 0xfffffffffffeffff, 0x6, [{0x8001, 0x6, 0x1ff, 0x0, 0x0, 0x1000}, {0x7, 0x8cc, 0x8, 0x0, 0x0, 0x108}, {0x7, 0x1f, 0x10000, 0x0, 0x0, 0x4}, {0xc38, 0x1, 0x4, 0x0, 0x0, 0x1002}, {0x621, 0xd1, 0x7fffffff, 0x0, 0x0, 0x4}, {0x9, 0x6, 0x4f6f, 0x0, 0x0, 0x400}]}) 22:24:17 executing program 0 (fault-call:0 fault-nth:3): syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:17 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x1800000000000000}, 0x30) [ 671.639153][T30453] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 671.647130][T30453] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fd1293186d4 [ 671.655118][T30453] R13: 00000000004c8745 R14: 00000000004df458 R15: 0000000000000003 22:24:17 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600170000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) [ 671.700357][T30470] FAULT_INJECTION: forcing a failure. [ 671.700357][T30470] name failslab, interval 1, probability 0, space 0, times 0 [ 671.713071][T30470] CPU: 0 PID: 30470 Comm: syz-executor.0 Not tainted 5.3.0-rc1+ #84 [ 671.721095][T30470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 671.731166][T30470] Call Trace: [ 671.734474][T30470] dump_stack+0x172/0x1f0 [ 671.738828][T30470] should_fail.cold+0xa/0x15 [ 671.738859][T30470] ? fault_create_debugfs_attr+0x180/0x180 [ 671.749245][T30470] ? __sock_queue_rcv_skb+0x60d/0xf60 [ 671.749271][T30470] __should_failslab+0x121/0x190 [ 671.749294][T30470] should_failslab+0x9/0x14 [ 671.764089][T30470] kmem_cache_alloc+0x47/0x710 [ 671.768867][T30470] ? sock_queue_rcv_skb+0x4e/0x60 [ 671.773997][T30470] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 671.780243][T30470] ? __raw_v6_lookup+0x3b9/0x490 [ 671.785223][T30470] skb_clone+0x154/0x3d0 [ 671.789645][T30470] raw6_local_deliver+0x332/0xae0 [ 671.794697][T30470] ? rawv6_rcv+0x1130/0x1130 [ 671.794717][T30470] ? mark_held_locks+0xf0/0xf0 [ 671.794735][T30470] ip6_protocol_deliver_rcu+0x360/0x1660 [ 671.794751][T30470] ? lock_acquire+0x190/0x410 [ 671.794766][T30470] ? ip6_protocol_deliver_rcu+0x1660/0x1660 [ 671.794781][T30470] ip6_input_finish+0x84/0x170 [ 671.794794][T30470] ip6_input+0xe4/0x3f0 [ 671.794809][T30470] ? ip6_input_finish+0x170/0x170 [ 671.794826][T30470] ? ip6_protocol_deliver_rcu+0x1660/0x1660 [ 671.794840][T30470] ? ipv6_chk_mcast_addr+0x2f2/0x6f0 [ 671.794857][T30470] ip6_mc_input+0x4aa/0xf09 [ 671.794872][T30470] ? ip6_input+0x3f0/0x3f0 [ 671.794892][T30470] ip6_rcv_finish+0x1de/0x2f0 [ 671.794907][T30470] ipv6_rcv+0x10e/0x420 [ 671.794923][T30470] ? ip6_rcv_core.isra.0+0x1bb0/0x1bb0 [ 671.794945][T30470] ? ip6_rcv_finish_core.isra.0+0x560/0x560 [ 671.840333][T30470] ? __might_fault+0x12b/0x1e0 [ 671.840356][T30470] ? ip6_rcv_core.isra.0+0x1bb0/0x1bb0 [ 671.840374][T30470] __netif_receive_skb_one_core+0x113/0x1a0 [ 671.840390][T30470] ? __netif_receive_skb_core+0x3060/0x3060 [ 671.840408][T30470] ? lock_acquire+0x190/0x410 [ 671.840422][T30470] ? netif_receive_skb_internal+0x86/0x390 [ 671.840441][T30470] __netif_receive_skb+0x2c/0x1d0 [ 671.879587][T30470] netif_receive_skb_internal+0x108/0x390 [ 671.901474][T30470] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 671.901496][T30470] ? __netif_receive_skb+0x1d0/0x1d0 [ 671.901512][T30470] ? eth_gro_receive+0x890/0x890 [ 671.901532][T30470] napi_gro_frags+0xb3d/0xd70 [ 671.939152][T30470] tun_get_user+0x2e8f/0x3fa0 [ 671.943878][T30470] ? lock_downgrade+0x920/0x920 [ 671.948748][T30470] ? tun_device_event+0x10e0/0x10e0 [ 671.953965][T30470] ? tun_chr_close+0x180/0x180 [ 671.958837][T30470] tun_chr_write_iter+0xbd/0x156 [ 671.963781][T30470] do_iter_readv_writev+0x5f8/0x8f0 [ 671.968997][T30470] ? no_seek_end_llseek_size+0x70/0x70 [ 671.974556][T30470] ? apparmor_file_permission+0x25/0x30 [ 671.980111][T30470] ? rw_verify_area+0x126/0x360 [ 671.984965][T30470] do_iter_write+0x184/0x610 [ 671.989576][T30470] ? dup_iter+0x250/0x250 [ 671.993911][T30470] ? __kasan_check_read+0x11/0x20 [ 671.998950][T30470] vfs_writev+0x1b3/0x2f0 [ 672.003291][T30470] ? vfs_iter_write+0xb0/0xb0 [ 672.007990][T30470] ? ksys_dup3+0x3e0/0x3e0 [ 672.012418][T30470] ? wait_for_completion+0x440/0x440 [ 672.017712][T30470] ? __fget_light+0x1a9/0x230 [ 672.022402][T30470] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 672.028824][T30470] do_writev+0x15b/0x330 [ 672.033072][T30470] ? vfs_writev+0x2f0/0x2f0 [ 672.037585][T30470] ? switch_fpu_return+0x1fa/0x4f0 [ 672.042698][T30470] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe 22:24:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c0013001900010200000000000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) [ 672.048772][T30470] __x64_sys_writev+0x75/0xb0 [ 672.053459][T30470] do_syscall_64+0xfd/0x6a0 [ 672.057973][T30470] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 672.063871][T30470] RIP: 0033:0x4596e1 [ 672.067772][T30470] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 b9 fb ff c3 48 83 ec 08 e8 fa 2c 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 43 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 672.087384][T30470] RSP: 002b:00007fd129317ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 22:24:17 executing program 1 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 672.095798][T30470] RAX: ffffffffffffffda RBX: 000000000000006e RCX: 00000000004596e1 [ 672.103771][T30470] RDX: 0000000000000001 RSI: 00007fd129317c00 RDI: 00000000000000f0 [ 672.111745][T30470] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 672.111766][T30470] R10: 0000000000000064 R11: 0000000000000293 R12: 00007fd1293186d4 [ 672.127735][T30470] R13: 00000000004c8745 R14: 00000000004df458 R15: 0000000000000003 [ 672.157517][T30491] FAULT_INJECTION: forcing a failure. [ 672.157517][T30491] name failslab, interval 1, probability 0, space 0, times 0 [ 672.179495][T30491] CPU: 0 PID: 30491 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 672.187513][T30491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 672.197569][T30491] Call Trace: [ 672.200885][T30491] dump_stack+0x172/0x1f0 22:24:17 executing program 0 (fault-call:0 fault-nth:4): syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 672.205247][T30491] should_fail.cold+0xa/0x15 [ 672.209854][T30491] ? fault_create_debugfs_attr+0x180/0x180 [ 672.215667][T30491] ? page_to_nid.part.0+0x20/0x20 [ 672.220694][T30491] ? ___might_sleep+0x163/0x280 [ 672.225558][T30491] __should_failslab+0x121/0x190 [ 672.230503][T30491] should_failslab+0x9/0x14 [ 672.235020][T30491] __kmalloc+0x2e0/0x770 [ 672.239304][T30491] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 672.245556][T30491] ? fput_many+0x12c/0x1a0 [ 672.249991][T30491] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 22:24:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c0014001900010200000000000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) [ 672.256230][T30491] ? strnlen_user+0x1ed/0x2e0 [ 672.260910][T30491] ? __x64_sys_memfd_create+0x13c/0x470 [ 672.266465][T30491] __x64_sys_memfd_create+0x13c/0x470 [ 672.271847][T30491] ? memfd_fcntl+0x1580/0x1580 [ 672.276638][T30491] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 672.282705][T30491] ? trace_hardirqs_off_caller+0x65/0x230 [ 672.288530][T30491] ? trace_hardirqs_on+0x67/0x240 [ 672.293563][T30491] do_syscall_64+0xfd/0x6a0 [ 672.298075][T30491] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 672.303975][T30491] RIP: 0033:0x459829 [ 672.307880][T30491] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 672.332093][T30491] RSP: 002b:00007faa47624a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 672.332108][T30491] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459829 [ 672.332114][T30491] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be748 22:24:17 executing program 1 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:17 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c0060001900010200000000000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) [ 672.332121][T30491] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 672.332127][T30491] R10: 0000000000010000 R11: 0000000000000246 R12: 00007faa476256d4 [ 672.332134][T30491] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:17 executing program 0: syz_emit_ethernet(0xd, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 672.436536][T30505] FAULT_INJECTION: forcing a failure. [ 672.436536][T30505] name failslab, interval 1, probability 0, space 0, times 0 [ 672.480179][T30505] CPU: 0 PID: 30505 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 672.488243][T30505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 672.498317][T30505] Call Trace: [ 672.501638][T30505] dump_stack+0x172/0x1f0 [ 672.506012][T30505] should_fail.cold+0xa/0x15 [ 672.510653][T30505] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 672.516745][T30505] ? fault_create_debugfs_attr+0x180/0x180 [ 672.522572][T30505] ? page_to_nid.part.0+0x20/0x20 [ 672.527615][T30505] ? ___might_sleep+0x163/0x280 [ 672.532490][T30505] __should_failslab+0x121/0x190 [ 672.537426][T30505] ? shmem_destroy_inode+0x80/0x80 [ 672.542542][T30505] should_failslab+0x9/0x14 [ 672.547046][T30505] kmem_cache_alloc+0x2aa/0x710 [ 672.551881][T30505] ? __alloc_fd+0x487/0x620 [ 672.556389][T30505] ? __kasan_check_read+0x11/0x20 [ 672.561405][T30505] ? shmem_destroy_inode+0x80/0x80 [ 672.566516][T30505] shmem_alloc_inode+0x1c/0x50 [ 672.571264][T30505] alloc_inode+0x68/0x1e0 [ 672.575589][T30505] new_inode_pseudo+0x19/0xf0 [ 672.580271][T30505] new_inode+0x1f/0x40 [ 672.584357][T30505] shmem_get_inode+0x84/0x7e0 [ 672.589020][T30505] __shmem_file_setup.part.0+0x7e/0x2b0 [ 672.594556][T30505] shmem_file_setup+0x66/0x90 [ 672.599269][T30505] __x64_sys_memfd_create+0x2a2/0x470 [ 672.604662][T30505] ? memfd_fcntl+0x1580/0x1580 [ 672.609421][T30505] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 672.615664][T30505] ? trace_hardirqs_off_caller+0x65/0x230 [ 672.621367][T30505] ? trace_hardirqs_on+0x67/0x240 [ 672.626382][T30505] do_syscall_64+0xfd/0x6a0 [ 672.630872][T30505] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 672.636752][T30505] RIP: 0033:0x459829 [ 672.640637][T30505] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 672.660351][T30505] RSP: 002b:00007faa47624a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 672.668759][T30505] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459829 [ 672.676714][T30505] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be748 [ 672.684667][T30505] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 672.692640][T30505] R10: 0000000000010000 R11: 0000000000000246 R12: 00007faa476256d4 [ 672.700603][T30505] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:18 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x2, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000180)="d345a7babc2db515f7718000000053ff07") ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000080)=0x5) 22:24:18 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:18 executing program 1 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:18 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600180000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:18 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x2600000000000000}, 0x30) [ 672.902628][T30525] FAULT_INJECTION: forcing a failure. [ 672.902628][T30525] name failslab, interval 1, probability 0, space 0, times 0 [ 672.921257][T30525] CPU: 0 PID: 30525 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 672.929276][T30525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 672.939338][T30525] Call Trace: [ 672.942654][T30525] dump_stack+0x172/0x1f0 [ 672.947010][T30525] should_fail.cold+0xa/0x15 22:24:18 executing program 0: syz_emit_ethernet(0x140, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 672.951619][T30525] ? fault_create_debugfs_attr+0x180/0x180 [ 672.957441][T30525] ? page_to_nid.part.0+0x20/0x20 [ 672.962492][T30525] ? ___might_sleep+0x163/0x280 [ 672.967370][T30525] __should_failslab+0x121/0x190 [ 672.972345][T30525] should_failslab+0x9/0x14 [ 672.976871][T30525] kmem_cache_alloc+0x2aa/0x710 [ 672.981749][T30525] ? lock_acquire+0x190/0x410 [ 672.986460][T30525] ? current_time+0x6b/0x140 [ 672.991081][T30525] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 672.997351][T30525] ? timespec64_trunc+0xf0/0x180 22:24:18 executing program 0: syz_emit_ethernet(0xfdef, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 673.002321][T30525] __d_alloc+0x2e/0x8c0 [ 673.006527][T30525] d_alloc_pseudo+0x1e/0x70 [ 673.006545][T30525] alloc_file_pseudo+0xe2/0x280 [ 673.006560][T30525] ? alloc_file+0x4d0/0x4d0 [ 673.006587][T30525] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 673.026738][T30525] __shmem_file_setup.part.0+0x108/0x2b0 [ 673.032401][T30525] shmem_file_setup+0x66/0x90 [ 673.037113][T30525] __x64_sys_memfd_create+0x2a2/0x470 [ 673.042515][T30525] ? memfd_fcntl+0x1580/0x1580 [ 673.047308][T30525] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe 22:24:18 executing program 0: syz_emit_ethernet(0x2000006e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 673.053407][T30525] ? trace_hardirqs_off_caller+0x65/0x230 [ 673.059146][T30525] ? trace_hardirqs_on+0x67/0x240 [ 673.064185][T30525] do_syscall_64+0xfd/0x6a0 [ 673.068695][T30525] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 673.074672][T30525] RIP: 0033:0x459829 [ 673.078572][T30525] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:24:18 executing program 0: syz_emit_ethernet(0x7ffff000, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 673.098180][T30525] RSP: 002b:00007faa47624a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 673.106597][T30525] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459829 [ 673.114574][T30525] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be748 [ 673.122555][T30525] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 673.130530][T30525] R10: 0000000000010000 R11: 0000000000000246 R12: 00007faa476256d4 [ 673.138506][T30525] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:18 executing program 1 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 673.235493][T30552] FAULT_INJECTION: forcing a failure. [ 673.235493][T30552] name failslab, interval 1, probability 0, space 0, times 0 [ 673.250362][T30552] CPU: 1 PID: 30552 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 673.258361][T30552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 673.268433][T30552] Call Trace: [ 673.271737][T30552] dump_stack+0x172/0x1f0 [ 673.276095][T30552] should_fail.cold+0xa/0x15 [ 673.280703][T30552] ? __kasan_check_read+0x11/0x20 [ 673.285747][T30552] ? fault_create_debugfs_attr+0x180/0x180 [ 673.291573][T30552] ? page_to_nid.part.0+0x20/0x20 [ 673.296616][T30552] ? ___might_sleep+0x163/0x280 [ 673.301465][T30552] __should_failslab+0x121/0x190 [ 673.306428][T30552] should_failslab+0x9/0x14 [ 673.310923][T30552] kmem_cache_alloc+0x2aa/0x710 [ 673.315764][T30552] ? rwlock_bug.part.0+0x90/0x90 [ 673.320781][T30552] ? __d_instantiate+0x82/0x470 [ 673.325642][T30552] ? lock_downgrade+0x920/0x920 [ 673.330500][T30552] __alloc_file+0x27/0x340 [ 673.334905][T30552] alloc_empty_file+0x72/0x170 [ 673.339703][T30552] alloc_file+0x5e/0x4d0 [ 673.343948][T30552] alloc_file_pseudo+0x189/0x280 [ 673.348873][T30552] ? alloc_file+0x4d0/0x4d0 [ 673.353373][T30552] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 673.359606][T30552] __shmem_file_setup.part.0+0x108/0x2b0 [ 673.365361][T30552] shmem_file_setup+0x66/0x90 [ 673.370058][T30552] __x64_sys_memfd_create+0x2a2/0x470 [ 673.375419][T30552] ? memfd_fcntl+0x1580/0x1580 [ 673.380171][T30552] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 673.386224][T30552] ? trace_hardirqs_off_caller+0x65/0x230 [ 673.391926][T30552] ? trace_hardirqs_on+0x67/0x240 [ 673.396966][T30552] do_syscall_64+0xfd/0x6a0 [ 673.401603][T30552] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 673.407506][T30552] RIP: 0033:0x459829 [ 673.411398][T30552] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 673.431028][T30552] RSP: 002b:00007faa47624a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 673.439541][T30552] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459829 [ 673.447613][T30552] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be748 [ 673.455580][T30552] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 673.463562][T30552] R10: 0000000000010000 R11: 0000000000000246 R12: 00007faa476256d4 [ 673.471529][T30552] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:19 executing program 3: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000180)="d345a7babc2db515f7718000000053ff07") r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x10000, 0x0) readlinkat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/27, 0x1b) 22:24:19 executing program 0: syz_emit_ethernet(0xfffffdef, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:19 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x4000000000000000}, 0x30) 22:24:19 executing program 1 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:19 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600190000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:19 executing program 0: syz_emit_ethernet(0xfffffffffffffdef, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 673.907802][T30567] FAULT_INJECTION: forcing a failure. [ 673.907802][T30567] name failslab, interval 1, probability 0, space 0, times 0 [ 673.937960][T30567] CPU: 0 PID: 30567 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 673.946011][T30567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 673.956099][T30567] Call Trace: [ 673.959408][T30567] dump_stack+0x172/0x1f0 [ 673.963759][T30567] should_fail.cold+0xa/0x15 [ 673.968396][T30567] ? fault_create_debugfs_attr+0x180/0x180 [ 673.974223][T30567] ? page_to_nid.part.0+0x20/0x20 [ 673.979258][T30567] ? ___might_sleep+0x163/0x280 [ 673.984131][T30567] __should_failslab+0x121/0x190 [ 673.989082][T30567] should_failslab+0x9/0x14 [ 673.993635][T30567] kmem_cache_alloc+0x2aa/0x710 [ 673.998476][T30567] ? memcg_kmem_put_cache+0x3e/0x50 [ 674.003667][T30567] ? kmem_cache_alloc+0x314/0x710 [ 674.008679][T30567] security_file_alloc+0x39/0x170 [ 674.013765][T30567] __alloc_file+0xde/0x340 [ 674.018295][T30567] alloc_empty_file+0x72/0x170 [ 674.023063][T30567] alloc_file+0x5e/0x4d0 [ 674.027293][T30567] alloc_file_pseudo+0x189/0x280 [ 674.032210][T30567] ? alloc_file+0x4d0/0x4d0 [ 674.036698][T30567] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 674.042935][T30567] __shmem_file_setup.part.0+0x108/0x2b0 [ 674.048555][T30567] shmem_file_setup+0x66/0x90 [ 674.053229][T30567] __x64_sys_memfd_create+0x2a2/0x470 [ 674.058603][T30567] ? memfd_fcntl+0x1580/0x1580 [ 674.063363][T30567] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 674.069422][T30567] ? trace_hardirqs_off_caller+0x65/0x230 [ 674.075137][T30567] ? trace_hardirqs_on+0x67/0x240 [ 674.080146][T30567] do_syscall_64+0xfd/0x6a0 [ 674.084651][T30567] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 674.090520][T30567] RIP: 0033:0x459829 [ 674.094403][T30567] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 674.114030][T30567] RSP: 002b:00007faa47624a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 674.122604][T30567] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459829 [ 674.130561][T30567] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be748 [ 674.138518][T30567] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 674.146477][T30567] R10: 0000000000010000 R11: 0000000000000246 R12: 00007faa476256d4 22:24:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 674.154530][T30567] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:19 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x2, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:19 executing program 1 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:19 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="1503000006001a0000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) [ 674.307757][T30591] FAULT_INJECTION: forcing a failure. [ 674.307757][T30591] name failslab, interval 1, probability 0, space 0, times 0 [ 674.326227][T30591] CPU: 1 PID: 30591 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 674.334263][T30591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 674.344329][T30591] Call Trace: [ 674.347642][T30591] dump_stack+0x172/0x1f0 [ 674.351997][T30591] should_fail.cold+0xa/0x15 [ 674.356610][T30591] ? fault_create_debugfs_attr+0x180/0x180 [ 674.362430][T30591] ? unwind_get_return_address+0x61/0xa0 [ 674.369061][T30591] ? profile_setup.cold+0xbb/0xbb [ 674.374093][T30591] ? ___might_sleep+0x163/0x280 [ 674.378958][T30591] __should_failslab+0x121/0x190 [ 674.384104][T30591] should_failslab+0x9/0x14 [ 674.388714][T30591] __kmalloc+0x2e0/0x770 [ 674.392965][T30591] ? mark_held_locks+0xf0/0xf0 [ 674.397740][T30591] ? stack_trace_save+0xac/0xe0 [ 674.402612][T30591] ? stack_trace_consume_entry+0x190/0x190 [ 674.408420][T30591] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 674.414212][T30591] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 674.419914][T30591] tomoyo_realpath_from_path+0xcd/0x7b0 [ 674.425467][T30591] ? tomoyo_path_perm+0x1cb/0x430 [ 674.430510][T30591] tomoyo_path_perm+0x230/0x430 [ 674.435344][T30591] ? tomoyo_path_perm+0x1cb/0x430 [ 674.442356][T30591] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 674.448409][T30591] ? __fget+0x35d/0x560 [ 674.452550][T30591] ? __kasan_check_read+0x11/0x20 [ 674.457572][T30591] ? __kasan_check_read+0x11/0x20 [ 674.462580][T30591] ? __fget+0xa3/0x560 [ 674.466643][T30591] ? lock_acquire+0x190/0x410 [ 674.471323][T30591] ? do_sys_ftruncate+0x282/0x550 [ 674.476371][T30591] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 674.482617][T30591] tomoyo_path_truncate+0x1d/0x30 [ 674.487632][T30591] security_path_truncate+0xf2/0x150 [ 674.492907][T30591] do_sys_ftruncate+0x3d9/0x550 [ 674.497741][T30591] __x64_sys_ftruncate+0x59/0x80 [ 674.502663][T30591] do_syscall_64+0xfd/0x6a0 [ 674.507154][T30591] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 674.513262][T30591] RIP: 0033:0x4597f7 [ 674.517167][T30591] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 674.536774][T30591] RSP: 002b:00007faa47624a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 674.545216][T30591] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004597f7 [ 674.553200][T30591] RDX: 0000000020000228 RSI: 0000000000020000 RDI: 0000000000000004 [ 674.561161][T30591] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 674.569151][T30591] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 674.577130][T30591] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 [ 674.590400][T30591] ERROR: Out of memory at tomoyo_realpath_from_path. 22:24:20 executing program 3: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000180)="d345a7babc2db515f7718000000053ff07") r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) mlockall(0x1) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000040)={{0x8000, 0x89, 0x0, 0x3}, 'syz1\x00', 0x40}) 22:24:20 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x3, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:20 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x4305000000000000}, 0x30) 22:24:20 executing program 1 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:20 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="1503000006001b0000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:20 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x4, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 674.861926][T30612] FAULT_INJECTION: forcing a failure. [ 674.861926][T30612] name failslab, interval 1, probability 0, space 0, times 0 [ 674.906669][T30612] CPU: 1 PID: 30612 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 674.914698][T30612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 674.924767][T30612] Call Trace: [ 674.928074][T30612] dump_stack+0x172/0x1f0 [ 674.932422][T30612] should_fail.cold+0xa/0x15 [ 674.937031][T30612] ? fault_create_debugfs_attr+0x180/0x180 [ 674.942851][T30612] ? unwind_get_return_address+0x61/0xa0 [ 674.948495][T30612] ? profile_setup.cold+0xbb/0xbb [ 674.953536][T30612] ? ___might_sleep+0x163/0x280 [ 674.953556][T30612] __should_failslab+0x121/0x190 [ 674.953572][T30612] should_failslab+0x9/0x14 [ 674.953583][T30612] __kmalloc+0x2e0/0x770 [ 674.953607][T30612] ? mark_held_locks+0xf0/0xf0 [ 674.972107][T30612] ? stack_trace_save+0xac/0xe0 [ 674.972122][T30612] ? stack_trace_consume_entry+0x190/0x190 [ 674.972138][T30612] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 674.972151][T30612] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 674.972167][T30612] tomoyo_realpath_from_path+0xcd/0x7b0 [ 674.972190][T30612] ? tomoyo_path_perm+0x1cb/0x430 [ 675.009789][T30612] tomoyo_path_perm+0x230/0x430 [ 675.014651][T30612] ? tomoyo_path_perm+0x1cb/0x430 [ 675.019682][T30612] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 675.025760][T30612] ? __fget+0x35d/0x560 [ 675.029948][T30612] ? __kasan_check_read+0x11/0x20 [ 675.034974][T30612] ? __kasan_check_read+0x11/0x20 [ 675.040040][T30612] ? __fget+0xa3/0x560 [ 675.044133][T30612] ? lock_acquire+0x190/0x410 [ 675.048823][T30612] ? do_sys_ftruncate+0x282/0x550 22:24:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c00000b1900010200000000000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) 22:24:20 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x5, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:20 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:20 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x6, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 675.053858][T30612] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 675.060103][T30612] tomoyo_path_truncate+0x1d/0x30 [ 675.065130][T30612] security_path_truncate+0xf2/0x150 [ 675.070424][T30612] do_sys_ftruncate+0x3d9/0x550 [ 675.075282][T30612] __x64_sys_ftruncate+0x59/0x80 [ 675.080228][T30612] do_syscall_64+0xfd/0x6a0 [ 675.084743][T30612] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 675.090638][T30612] RIP: 0033:0x4597f7 [ 675.094534][T30612] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 675.114168][T30612] RSP: 002b:00007faa47624a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 675.114183][T30612] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004597f7 [ 675.114190][T30612] RDX: 0000000020000228 RSI: 0000000000020000 RDI: 0000000000000004 [ 675.114196][T30612] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 675.114203][T30612] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 22:24:20 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x7, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 675.114209][T30612] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 [ 675.343659][T30612] ERROR: Out of memory at tomoyo_realpath_from_path. 22:24:21 executing program 3: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000180)="d345a7babc2db515f7718000000053ff07") r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) flock(r0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000040)={0x0, 0x8001}) ioctl$KVM_ASSIGN_SET_MSIX_NR(r0, 0x4008ae73, &(0x7f0000000080)={0x2, 0x4}) 22:24:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:21 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="1503000006001c0000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:21 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x6000000000000000}, 0x30) 22:24:21 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x8, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:21 executing program 1 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 676.056770][T30661] FAULT_INJECTION: forcing a failure. [ 676.056770][T30661] name failslab, interval 1, probability 0, space 0, times 0 [ 676.095921][T30661] CPU: 0 PID: 30661 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 676.103958][T30661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 676.114032][T30661] Call Trace: [ 676.117340][T30661] dump_stack+0x172/0x1f0 [ 676.121689][T30661] should_fail.cold+0xa/0x15 [ 676.126298][T30661] ? __kasan_check_read+0x11/0x20 [ 676.131334][T30661] ? fault_create_debugfs_attr+0x180/0x180 [ 676.137144][T30661] ? __kasan_check_write+0x14/0x20 [ 676.142263][T30661] ? lock_downgrade+0x920/0x920 [ 676.147115][T30661] ? ___might_sleep+0x163/0x280 [ 676.151977][T30661] __should_failslab+0x121/0x190 [ 676.156935][T30661] should_failslab+0x9/0x14 [ 676.161473][T30661] __kmalloc+0x2e0/0x770 [ 676.165727][T30661] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 676.171969][T30661] ? simple_dname+0xd1/0x1f0 [ 676.176567][T30661] ? tomoyo_encode2.part.0+0xf5/0x400 [ 676.181949][T30661] tomoyo_encode2.part.0+0xf5/0x400 [ 676.187154][T30661] tomoyo_encode+0x2b/0x50 [ 676.191571][T30661] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 676.197390][T30661] ? tomoyo_path_perm+0x1cb/0x430 [ 676.202430][T30661] tomoyo_path_perm+0x230/0x430 22:24:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:21 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0xb, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 676.207286][T30661] ? tomoyo_path_perm+0x1cb/0x430 [ 676.212321][T30661] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 676.218403][T30661] ? __fget+0x35d/0x560 [ 676.222561][T30661] ? __kasan_check_read+0x11/0x20 [ 676.227587][T30661] ? __kasan_check_read+0x11/0x20 [ 676.232621][T30661] ? __fget+0xa3/0x560 [ 676.236705][T30661] ? lock_acquire+0x190/0x410 [ 676.241393][T30661] ? do_sys_ftruncate+0x282/0x550 [ 676.246427][T30661] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 676.252681][T30661] tomoyo_path_truncate+0x1d/0x30 22:24:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:21 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0xd, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 676.257720][T30661] security_path_truncate+0xf2/0x150 [ 676.263024][T30661] do_sys_ftruncate+0x3d9/0x550 [ 676.268052][T30661] __x64_sys_ftruncate+0x59/0x80 [ 676.273024][T30661] do_syscall_64+0xfd/0x6a0 [ 676.277533][T30661] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 676.283424][T30661] RIP: 0033:0x4597f7 [ 676.287325][T30661] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 676.306937][T30661] RSP: 002b:00007faa47624a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 676.315356][T30661] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 00000000004597f7 [ 676.323331][T30661] RDX: 0000000020000228 RSI: 0000000000020000 RDI: 0000000000000004 [ 676.331308][T30661] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 676.339282][T30661] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 676.347265][T30661] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 [ 676.361657][T30661] ERROR: Out of memory at tomoyo_realpath_from_path. 22:24:22 executing program 3: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000180)="d345a7babc2db515f7718000000053ff07") r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000000)={@in={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x3, 0x0, "e51adcc659fffbd7dce549951cbbc124be5fc785a94d54179fbd1ab39bf2c9a6f2845c69483b5f4126d39eac78fd6a58674500dd98fd8f8ac9239bc96756276f10ff848b810b700fe02fd71afe4a4fda"}, 0xd8) 22:24:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:22 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x28, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:22 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x6558000000000000}, 0x30) 22:24:22 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="1503000006001d0000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:22 executing program 1 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 676.976755][T30705] FAULT_INJECTION: forcing a failure. [ 676.976755][T30705] name failslab, interval 1, probability 0, space 0, times 0 [ 676.989397][T30705] CPU: 1 PID: 30705 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 676.997379][T30705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 677.007438][T30705] Call Trace: [ 677.010761][T30705] dump_stack+0x172/0x1f0 [ 677.015115][T30705] should_fail.cold+0xa/0x15 [ 677.019730][T30705] ? fault_create_debugfs_attr+0x180/0x180 22:24:22 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x60, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:22 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0xf0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 677.025554][T30705] ? __kasan_check_read+0x11/0x20 [ 677.030595][T30705] __should_failslab+0x121/0x190 [ 677.035546][T30705] should_failslab+0x9/0x14 [ 677.040062][T30705] kmem_cache_alloc+0x47/0x710 [ 677.044832][T30705] ? lock_downgrade+0x920/0x920 [ 677.049693][T30705] ? percpu_ref_tryget_live+0x290/0x290 [ 677.055258][T30705] xas_alloc+0x346/0x460 [ 677.059512][T30705] xas_create+0x2cd/0x1060 [ 677.063943][T30705] xas_create_range+0x198/0x5d0 [ 677.068809][T30705] shmem_add_to_page_cache+0x8ed/0x14c0 22:24:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 677.074373][T30705] ? shmem_writepage+0xee0/0xee0 [ 677.079336][T30705] shmem_getpage_gfp+0xeb0/0x2680 [ 677.084379][T30705] ? shmem_unuse_inode+0x1010/0x1010 [ 677.089712][T30705] ? lock_acquire+0x190/0x410 [ 677.094404][T30705] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 677.100650][T30705] ? iov_iter_fault_in_readable+0x22c/0x450 [ 677.106547][T30705] shmem_write_begin+0x105/0x1e0 [ 677.106568][T30705] generic_perform_write+0x23b/0x540 [ 677.106585][T30705] ? timespec64_trunc+0x180/0x180 [ 677.106609][T30705] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4b0/0x4b0 [ 677.130357][T30705] ? current_time+0x140/0x140 [ 677.135050][T30705] ? __kasan_check_write+0x14/0x20 [ 677.140173][T30705] ? down_write+0xdf/0x150 [ 677.144608][T30705] __generic_file_write_iter+0x25e/0x630 [ 677.150275][T30705] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 677.156103][T30705] generic_file_write_iter+0x356/0x620 [ 677.161583][T30705] ? __generic_file_write_iter+0x630/0x630 [ 677.167407][T30705] ? aa_path_link+0x460/0x460 [ 677.172107][T30705] ? __sanitizer_cov_trace_cmp4+0x16/0x20 22:24:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 677.177844][T30705] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 677.184100][T30705] ? iov_iter_init+0xee/0x210 [ 677.188795][T30705] new_sync_write+0x4d3/0x770 [ 677.193499][T30705] ? new_sync_read+0x800/0x800 [ 677.198286][T30705] ? mark_held_locks+0xf0/0xf0 [ 677.203066][T30705] ? common_file_perm+0x238/0x720 [ 677.208111][T30705] ? vfs_write+0x485/0x5d0 [ 677.212543][T30705] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 677.218792][T30705] __vfs_write+0xe1/0x110 [ 677.223130][T30705] vfs_write+0x268/0x5d0 22:24:22 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x1a0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 677.223146][T30705] ksys_pwrite64+0x183/0x1c0 [ 677.223158][T30705] ? __ia32_sys_pread64+0xf0/0xf0 [ 677.223171][T30705] ? fput+0x1b/0x20 [ 677.223187][T30705] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 677.223207][T30705] __x64_sys_pwrite64+0x97/0xf0 [ 677.251852][T30705] do_syscall_64+0xfd/0x6a0 [ 677.256360][T30705] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 677.262255][T30705] RIP: 0033:0x413777 22:24:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 677.266152][T30705] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 677.285762][T30705] RSP: 002b:00007faa47624a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 677.294203][T30705] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 0000000000413777 [ 677.302192][T30705] RDX: 0000000000000048 RSI: 00000000200008c0 RDI: 0000000000000004 [ 677.310172][T30705] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 677.318153][T30705] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 677.329955][T30705] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:23 executing program 3: clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)="d345a7babc2db515f7718000000053ff07") 22:24:23 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x300, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:23 executing program 1 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:23 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="1503000006001e0000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:23 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x8035000000000000}, 0x30) [ 677.923910][T30751] FAULT_INJECTION: forcing a failure. [ 677.923910][T30751] name failslab, interval 1, probability 0, space 0, times 0 [ 677.936558][T30751] CPU: 0 PID: 30751 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 677.936568][T30751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 677.936574][T30751] Call Trace: [ 677.936600][T30751] dump_stack+0x172/0x1f0 [ 677.936628][T30751] should_fail.cold+0xa/0x15 [ 677.967193][T30751] ? fault_create_debugfs_attr+0x180/0x180 22:24:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 677.967219][T30751] ? __kasan_check_read+0x11/0x20 [ 677.978056][T30751] __should_failslab+0x121/0x190 [ 677.983023][T30751] should_failslab+0x9/0x14 [ 677.987534][T30751] kmem_cache_alloc+0x47/0x710 [ 677.992298][T30751] ? __alloc_pages_slowpath+0x2520/0x2520 [ 677.998034][T30751] ? percpu_ref_get_many+0x98/0x150 [ 678.003237][T30751] ? __kasan_check_read+0x11/0x20 [ 678.008272][T30751] xas_alloc+0x346/0x460 [ 678.012522][T30751] xas_create+0x2cd/0x1060 [ 678.016955][T30751] xas_create_range+0x198/0x5d0 22:24:23 executing program 3: syz_open_dev$vbi(&(0x7f0000007a40)='/dev/vbi#\x00', 0x0, 0x2) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000007940)="d345a7babc2db515f7718000f1571afefe964ca9013c82987dae1e673a9c35cb305dae7bc35e78baa023faa58061a81b86a2e99b3ca2b18405d454108458c97e8418d2f62531e0b0045446fb468306211fce98d0d52ce2f3736a1036aa5273f282ca47dab723fba968e470935591d240c46d618733bdce913666e557babd95d556f42037851ae06d0066d2e44f1636b0e85c392948de0000000000000000") clock_gettime(0x0, &(0x7f0000007740)={0x0, 0x0}) r2 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x1, 0x2) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0x7, &(0x7f0000007a00)={0x0, 0x4, 0x1c2c, 0x80000000}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000007500)=[{{&(0x7f00000002c0)=@l2, 0x80, &(0x7f0000001580)=[{&(0x7f0000000340)=""/166, 0xa6}, {&(0x7f0000000400)=""/23, 0x17}, {&(0x7f0000000440)=""/248, 0xf8}, {&(0x7f0000000540)=""/4096, 0x1000}, {&(0x7f0000001540)=""/6, 0x6}], 0x5, &(0x7f0000001600)=""/4096, 0x1000}, 0xc09a}, {{&(0x7f0000002600)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000002880)=[{&(0x7f0000002680)=""/207, 0xcf}, {&(0x7f0000002780)=""/18, 0x12}, {&(0x7f00000027c0)=""/138, 0x8a}], 0x3, &(0x7f00000028c0)=""/25, 0x19}, 0x3ff}, {{&(0x7f0000002900)=@x25={0x9, @remote}, 0x80, &(0x7f0000002b00)=[{&(0x7f0000002980)=""/219, 0xdb}, {&(0x7f0000002a80)=""/112, 0x70}], 0x2, &(0x7f0000002b40)=""/145, 0x91}, 0x6}, {{&(0x7f0000002c00)=@can, 0x80, &(0x7f0000004000)=[{&(0x7f0000002c80)=""/4096, 0x1000}, {&(0x7f0000003c80)=""/122, 0x7a}, {&(0x7f0000003d00)=""/38, 0x26}, {&(0x7f0000003d40)=""/164, 0xa4}, {&(0x7f0000003e00)=""/179, 0xb3}, {&(0x7f0000003ec0)=""/59, 0x3b}, {&(0x7f0000003f00)=""/208, 0xd0}], 0x7}, 0x7ff}, {{&(0x7f0000004080)=@tipc=@name, 0x80, &(0x7f0000004180)=[{&(0x7f0000004100)=""/91, 0x5b}], 0x1}, 0x54}, {{&(0x7f00000041c0)=@pppol2tpin6, 0x80, &(0x7f00000053c0)=[{&(0x7f0000004240)=""/4096, 0x1000}, {&(0x7f0000005240)=""/204, 0xcc}, {&(0x7f0000005340)=""/80, 0x50}], 0x3, &(0x7f0000005400)=""/96, 0x60}, 0x7}, {{&(0x7f0000005480)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005800)=[{&(0x7f0000005500)=""/11, 0xb}, {&(0x7f0000005540)=""/247, 0xf7}, {&(0x7f0000005640)=""/19, 0x13}, {&(0x7f0000005680)=""/25, 0x19}, {&(0x7f00000056c0)=""/181, 0xb5}, {&(0x7f0000005780)=""/117, 0x75}], 0x6, &(0x7f0000005880)=""/174, 0xae}, 0x2}, {{&(0x7f0000005940)=@tipc=@id, 0x80, &(0x7f0000005e00)=[{&(0x7f00000059c0)=""/241, 0xf1}, {&(0x7f0000005ac0)=""/182, 0xb6}, {&(0x7f0000005b80)=""/67, 0x43}, {&(0x7f0000005c00)=""/62, 0x3e}, {&(0x7f0000005c40)=""/170, 0xaa}, {&(0x7f0000005d00)=""/239, 0xef}], 0x6, &(0x7f0000005e80)=""/4096, 0x1000}, 0x5b0d}, {{&(0x7f0000006e80)=@pppoe, 0x80, &(0x7f0000007400)=[{&(0x7f0000006f00)=""/206, 0xce}, {&(0x7f0000007000)=""/41, 0x29}, {&(0x7f0000007040)=""/93, 0x5d}, {&(0x7f00000070c0)=""/150, 0x96}, {&(0x7f0000007180)=""/164, 0xa4}, {&(0x7f0000007240)=""/176, 0xb0}, {&(0x7f0000007300)=""/34, 0x22}, {&(0x7f0000007340)=""/171, 0xab}], 0x8, &(0x7f0000007480)=""/100, 0x64}, 0x9}], 0x9, 0x2000, &(0x7f0000007780)={r0, r1+30000000}) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000077c0)={0x0, 0xb285, 0x30, 0x9, 0x5}, &(0x7f0000007800)=0x18) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000007840)={r4, 0x11, "c45ae9f382155bbae13712631b4cc6f4e5"}, &(0x7f0000007880)=0x9) r5 = add_key(&(0x7f0000000000)='.request_key_auth\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="bdcf7cb151177324ea24fff7dda1688d23a13904276e2dcb34aa55e45f87ebbaf8dfe8d9fb84cf0250c22e821ece96c24b68300aa8f585e8bb326d688028fa2c7e7db787dda2aea443621bb7739a941827a88c6e2ba58f63d1230cf218ca33d386cc5274e1e3d2b7ce7f03596a7293179a86d15d14b50707757d85f2c0512e302d3205cb7a7b2e6869749c24c41c1dfbc2c61606d23643ee6925221a344b80d288ba065ed218262de4c57932", 0xac, 0xfffffffffffffffa) r6 = syz_open_dev$media(&(0x7f00000078c0)='/dev/media#\x00', 0x698, 0x8640) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r6, 0x80dc5521, &(0x7f0000007900)=""/55) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000140)={r5, 0x24, 0x32}, &(0x7f0000007a80)=ANY=[@ANYBLOB="656e633d706b63733120686173683d736c613235362d636500000000000000007537eb6160c73792c1000000000000000000000000000200008ed08bc3adcf917c0000000000000000000000000000ba46d010658ead3540bc2b090086bc9a75ca1cdff6f9540a7da8f6a314895d5419beb07d7f374fd62eedb759"], &(0x7f0000000240)="f66250952cffa959889a20584ed619216d0b711a4bfd291cd30635bed08fe9cc902709d8", &(0x7f0000000280)=""/50) [ 678.021832][T30751] shmem_add_to_page_cache+0x8ed/0x14c0 [ 678.027398][T30751] ? shmem_writepage+0xee0/0xee0 [ 678.032357][T30751] shmem_getpage_gfp+0xeb0/0x2680 [ 678.037404][T30751] ? shmem_unuse_inode+0x1010/0x1010 [ 678.042801][T30751] ? lock_acquire+0x190/0x410 [ 678.047496][T30751] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 678.053748][T30751] ? iov_iter_fault_in_readable+0x22c/0x450 [ 678.059654][T30751] shmem_write_begin+0x105/0x1e0 [ 678.064703][T30751] generic_perform_write+0x23b/0x540 [ 678.064720][T30751] ? timespec64_trunc+0x180/0x180 [ 678.064742][T30751] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4b0/0x4b0 [ 678.064763][T30751] ? current_time+0x140/0x140 [ 678.088079][T30751] ? __kasan_check_write+0x14/0x20 [ 678.093198][T30751] ? down_write+0xdf/0x150 [ 678.097639][T30751] __generic_file_write_iter+0x25e/0x630 [ 678.103285][T30751] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 678.109022][T30751] generic_file_write_iter+0x356/0x620 [ 678.109043][T30751] ? __generic_file_write_iter+0x630/0x630 [ 678.109059][T30751] ? aa_path_link+0x460/0x460 [ 678.109082][T30751] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 678.130729][T30751] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 678.136988][T30751] ? iov_iter_init+0xee/0x210 [ 678.141681][T30751] new_sync_write+0x4d3/0x770 [ 678.146360][T30751] ? new_sync_read+0x800/0x800 [ 678.146380][T30751] ? mark_held_locks+0xf0/0xf0 [ 678.146398][T30751] ? common_file_perm+0x238/0x720 [ 678.146418][T30751] ? vfs_write+0x485/0x5d0 [ 678.165348][T30751] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 22:24:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 678.171599][T30751] __vfs_write+0xe1/0x110 [ 678.175938][T30751] vfs_write+0x268/0x5d0 [ 678.180201][T30751] ksys_pwrite64+0x183/0x1c0 [ 678.184799][T30751] ? __ia32_sys_pread64+0xf0/0xf0 [ 678.189837][T30751] ? fput+0x1b/0x20 [ 678.193652][T30751] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 678.199728][T30751] __x64_sys_pwrite64+0x97/0xf0 [ 678.204593][T30751] do_syscall_64+0xfd/0x6a0 [ 678.209108][T30751] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 678.215010][T30751] RIP: 0033:0x413777 [ 678.218913][T30751] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 678.238521][T30751] RSP: 002b:00007faa47624a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 678.246933][T30751] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 0000000000413777 [ 678.246940][T30751] RDX: 0000000000000048 RSI: 00000000200008c0 RDI: 0000000000000004 [ 678.246947][T30751] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 22:24:23 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x500, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 678.246953][T30751] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 678.246959][T30751] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:23 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x543, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:23 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="1503000006003a0000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:23 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x600, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:23 executing program 1 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:23 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x8100000000000000}, 0x30) 22:24:23 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x608, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 678.545518][T30800] FAULT_INJECTION: forcing a failure. [ 678.545518][T30800] name failslab, interval 1, probability 0, space 0, times 0 [ 678.565195][T30800] CPU: 1 PID: 30800 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 678.573215][T30800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 678.583281][T30800] Call Trace: [ 678.586588][T30800] dump_stack+0x172/0x1f0 [ 678.590947][T30800] should_fail.cold+0xa/0x15 22:24:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 678.595557][T30800] ? fault_create_debugfs_attr+0x180/0x180 [ 678.601548][T30800] ? page_to_nid.part.0+0x20/0x20 [ 678.606588][T30800] ? ___might_sleep+0x163/0x280 [ 678.611452][T30800] __should_failslab+0x121/0x190 [ 678.616406][T30800] should_failslab+0x9/0x14 [ 678.620918][T30800] kmem_cache_alloc+0x2aa/0x710 [ 678.625784][T30800] getname_flags+0xd6/0x5b0 [ 678.630311][T30800] getname+0x1a/0x20 [ 678.634215][T30800] do_sys_open+0x2c9/0x5d0 [ 678.638640][T30800] ? filp_open+0x80/0x80 [ 678.642894][T30800] ? fput+0x1b/0x20 [ 678.646715][T30800] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 678.652793][T30800] __x64_sys_open+0x7e/0xc0 [ 678.657311][T30800] do_syscall_64+0xfd/0x6a0 [ 678.661819][T30800] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 678.667711][T30800] RIP: 0033:0x413711 [ 678.671610][T30800] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 678.691227][T30800] RSP: 002b:00007faa47624a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 678.691242][T30800] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413711 [ 678.691249][T30800] RDX: 00007faa47624b0a RSI: 0000000000000002 RDI: 00007faa47624b00 [ 678.691255][T30800] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 678.691261][T30800] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 678.691268][T30800] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:24 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x689, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:24 executing program 1 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:24 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600460000000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:24 executing program 3: clone(0x61800000, 0x0, 0x0, 0x0, &(0x7f0000000180)="d345a7babc2db515f7718000000053ff07") 22:24:24 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x86ddffff00000000}, 0x30) [ 678.936466][T30765] cgroup: fork rejected by pids controller in /syz3 [ 679.033760][T30924] FAULT_INJECTION: forcing a failure. [ 679.033760][T30924] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 679.048064][T30924] CPU: 1 PID: 30924 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 679.057595][T30924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 679.067773][T30924] Call Trace: [ 679.071165][T30924] dump_stack+0x172/0x1f0 [ 679.075538][T30924] should_fail.cold+0xa/0x15 22:24:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c0000051900010200000000000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) [ 679.080157][T30924] ? fault_create_debugfs_attr+0x180/0x180 [ 679.085985][T30924] ? __kasan_check_write+0x14/0x20 [ 679.091129][T30924] ? up_write+0x9d/0x280 [ 679.095686][T30924] should_fail_alloc_page+0x50/0x60 [ 679.100892][T30924] __alloc_pages_nodemask+0x1a1/0x8f0 [ 679.106281][T30924] ? __generic_file_write_iter+0x630/0x630 [ 679.112126][T30924] ? __alloc_pages_slowpath+0x2520/0x2520 [ 679.117859][T30924] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 679.117875][T30924] ? __kasan_check_read+0x11/0x20 [ 679.117901][T30924] ? fault_create_debugfs_attr+0x180/0x180 [ 679.134358][T30924] cache_grow_begin+0x90/0xd20 [ 679.139138][T30924] ? getname_flags+0xd6/0x5b0 [ 679.143831][T30924] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 679.143847][T30924] kmem_cache_alloc+0x64e/0x710 [ 679.143868][T30924] getname_flags+0xd6/0x5b0 [ 679.143884][T30924] getname+0x1a/0x20 [ 679.143896][T30924] do_sys_open+0x2c9/0x5d0 [ 679.143910][T30924] ? filp_open+0x80/0x80 [ 679.143926][T30924] ? fput+0x1b/0x20 [ 679.143950][T30924] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 679.159536][T30924] __x64_sys_open+0x7e/0xc0 [ 679.159566][T30924] do_syscall_64+0xfd/0x6a0 [ 679.159589][T30924] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 679.175921][T30924] RIP: 0033:0x413711 [ 679.175938][T30924] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 679.175946][T30924] RSP: 002b:00007faa47624a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 22:24:24 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x700, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 679.175967][T30924] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413711 [ 679.220637][T30924] RDX: 00007faa47624b0a RSI: 0000000000000002 RDI: 00007faa47624b00 [ 679.220646][T30924] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 679.220652][T30924] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 679.220658][T30924] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 [ 679.279740][T30930] IPVS: ftp: loaded support on port[0] = 21 22:24:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:24 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x806, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:24 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600ee0500000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:24 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x8847000000000000}, 0x30) 22:24:24 executing program 1 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 679.431183][T30930] IPVS: ftp: loaded support on port[0] = 21 22:24:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c0000081900010200000000000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) 22:24:24 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0xb00, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:24 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600400000000100850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) [ 679.565772][T30962] FAULT_INJECTION: forcing a failure. [ 679.565772][T30962] name failslab, interval 1, probability 0, space 0, times 0 [ 679.612443][T30962] CPU: 1 PID: 30962 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 679.620532][T30962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 679.620541][T30962] Call Trace: [ 679.620576][T30962] dump_stack+0x172/0x1f0 [ 679.620605][T30962] should_fail.cold+0xa/0x15 [ 679.633963][T30962] ? is_bpf_text_address+0xd3/0x170 [ 679.633984][T30962] ? fault_create_debugfs_attr+0x180/0x180 [ 679.634003][T30962] ? page_to_nid.part.0+0x20/0x20 [ 679.634020][T30962] ? ___might_sleep+0x163/0x280 [ 679.634043][T30962] __should_failslab+0x121/0x190 [ 679.642950][T30962] should_failslab+0x9/0x14 [ 679.642964][T30962] kmem_cache_alloc+0x2aa/0x710 [ 679.642979][T30962] ? stack_trace_save+0xac/0xe0 [ 679.642999][T30962] ? stack_trace_consume_entry+0x190/0x190 [ 679.643015][T30962] __alloc_file+0x27/0x340 [ 679.643038][T30962] alloc_empty_file+0x72/0x170 [ 679.654056][T30962] path_openat+0xef/0x4630 [ 679.654072][T30962] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 679.654083][T30962] ? kasan_slab_alloc+0xf/0x20 [ 679.654095][T30962] ? kmem_cache_alloc+0x121/0x710 [ 679.654108][T30962] ? getname_flags+0xd6/0x5b0 [ 679.654129][T30962] ? getname+0x1a/0x20 [ 679.663990][T30962] ? do_sys_open+0x2c9/0x5d0 [ 679.664001][T30962] ? __x64_sys_open+0x7e/0xc0 [ 679.664018][T30962] ? do_syscall_64+0xfd/0x6a0 [ 679.664031][T30962] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 679.664049][T30962] ? __isolate_free_page+0x4c0/0x4c0 [ 679.664062][T30962] ? up_write+0x9d/0x280 [ 679.664078][T30962] ? __kasan_check_read+0x11/0x20 [ 679.664101][T30962] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 679.675646][T30962] ? __kasan_check_read+0x11/0x20 [ 679.675662][T30962] ? __alloc_pages_nodemask+0x576/0x8f0 [ 679.675682][T30962] ? cache_grow_end+0xa4/0x190 [ 679.685374][T30962] ? __kasan_check_read+0x11/0x20 [ 679.685394][T30962] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 679.685412][T30962] do_filp_open+0x1a1/0x280 [ 679.685427][T30962] ? may_open_dev+0x100/0x100 [ 679.685454][T30962] ? lock_downgrade+0x920/0x920 [ 679.685468][T30962] ? rwlock_bug.part.0+0x90/0x90 [ 679.685495][T30962] ? __alloc_fd+0x35/0x620 [ 679.695723][T30962] ? __kasan_check_read+0x11/0x20 [ 679.695741][T30962] ? do_raw_spin_unlock+0x57/0x270 [ 679.695765][T30962] ? _raw_spin_unlock+0x2d/0x50 [ 679.704937][T30962] ? __alloc_fd+0x487/0x620 [ 679.704960][T30962] do_sys_open+0x3fe/0x5d0 [ 679.704973][T30962] ? filp_open+0x80/0x80 [ 679.704989][T30962] ? fput+0x1b/0x20 [ 679.705003][T30962] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 679.705017][T30962] __x64_sys_open+0x7e/0xc0 [ 679.705033][T30962] do_syscall_64+0xfd/0x6a0 [ 679.705054][T30962] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 679.715623][T30962] RIP: 0033:0x413711 [ 679.715639][T30962] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 679.715647][T30962] RSP: 002b:00007faa47624a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 679.715658][T30962] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413711 [ 679.715665][T30962] RDX: 00007faa47624b0a RSI: 0000000000000002 RDI: 00007faa47624b00 [ 679.715673][T30962] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 679.715679][T30962] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 679.715687][T30962] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:26 executing program 3: prctl$PR_GET_FPEMU(0x9, &(0x7f0000000080)) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000000)="d345a7babc2db515f7718000000053ff07") r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x8000, 0x80) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x16) fchdir(r0) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000140)='blacklist\x00', &(0x7f0000000180)=')ppp1{selfprocGPL\x00') 22:24:26 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0xd00, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:26 executing program 1 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:26 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x8848000000000000}, 0x30) 22:24:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:26 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600400200000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c00000a1900010200000000000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) [ 681.026926][T30984] FAULT_INJECTION: forcing a failure. [ 681.026926][T30984] name failslab, interval 1, probability 0, space 0, times 0 22:24:26 executing program 3: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000040)="d345a7babc2db515f7718000000053ff07") [ 681.112313][T30984] CPU: 0 PID: 30984 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 681.120342][T30984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 681.130405][T30984] Call Trace: [ 681.133719][T30984] dump_stack+0x172/0x1f0 [ 681.138069][T30984] should_fail.cold+0xa/0x15 [ 681.142689][T30984] ? fault_create_debugfs_attr+0x180/0x180 [ 681.148518][T30984] ? page_to_nid.part.0+0x20/0x20 [ 681.153556][T30984] ? ___might_sleep+0x163/0x280 [ 681.158433][T30984] __should_failslab+0x121/0x190 [ 681.163379][T30984] should_failslab+0x9/0x14 [ 681.167907][T30984] kmem_cache_alloc+0x2aa/0x710 [ 681.172781][T30984] ? memcg_kmem_put_cache+0x3e/0x50 [ 681.177991][T30984] ? kmem_cache_alloc+0x314/0x710 [ 681.183032][T30984] security_file_alloc+0x39/0x170 [ 681.188068][T30984] __alloc_file+0xde/0x340 [ 681.192494][T30984] alloc_empty_file+0x72/0x170 [ 681.197313][T30984] path_openat+0xef/0x4630 [ 681.201742][T30984] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 681.207554][T30984] ? kasan_slab_alloc+0xf/0x20 [ 681.212329][T30984] ? kmem_cache_alloc+0x121/0x710 [ 681.217369][T30984] ? getname_flags+0xd6/0x5b0 [ 681.222054][T30984] ? getname+0x1a/0x20 [ 681.226473][T30984] ? do_sys_open+0x2c9/0x5d0 [ 681.231068][T30984] ? __x64_sys_open+0x7e/0xc0 [ 681.235752][T30984] ? do_syscall_64+0xfd/0x6a0 [ 681.240461][T30984] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 681.246538][T30984] ? __isolate_free_page+0x4c0/0x4c0 [ 681.251830][T30984] ? up_write+0x9d/0x280 [ 681.256091][T30984] ? __kasan_check_read+0x11/0x20 [ 681.261136][T30984] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 681.266522][T30984] ? __kasan_check_read+0x11/0x20 [ 681.271570][T30984] ? __alloc_pages_nodemask+0x576/0x8f0 [ 681.277137][T30984] ? cache_grow_end+0xa4/0x190 [ 681.281914][T30984] ? __kasan_check_read+0x11/0x20 [ 681.286947][T30984] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 681.292696][T30984] do_filp_open+0x1a1/0x280 [ 681.297217][T30984] ? may_open_dev+0x100/0x100 [ 681.301919][T30984] ? lock_downgrade+0x920/0x920 [ 681.307004][T30984] ? rwlock_bug.part.0+0x90/0x90 [ 681.311962][T30984] ? __alloc_fd+0x35/0x620 [ 681.316408][T30984] ? __kasan_check_read+0x11/0x20 [ 681.321445][T30984] ? do_raw_spin_unlock+0x57/0x270 [ 681.326592][T30984] ? _raw_spin_unlock+0x2d/0x50 [ 681.331463][T30984] ? __alloc_fd+0x487/0x620 [ 681.336008][T30984] do_sys_open+0x3fe/0x5d0 [ 681.340436][T30984] ? filp_open+0x80/0x80 [ 681.344681][T30984] ? fput+0x1b/0x20 [ 681.348497][T30984] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 681.354578][T30984] __x64_sys_open+0x7e/0xc0 [ 681.359098][T30984] do_syscall_64+0xfd/0x6a0 [ 681.364110][T30984] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 681.370009][T30984] RIP: 0033:0x413711 [ 681.373902][T30984] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 681.393515][T30984] RSP: 002b:00007faa47624a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 681.393529][T30984] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413711 22:24:26 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0xe80, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:26 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x2800, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:26 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x3580, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:26 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x3f00, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:26 executing program 1 (fault-call:0 fault-nth:14): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 681.393537][T30984] RDX: 00007faa47624b0a RSI: 0000000000000002 RDI: 00007faa47624b00 [ 681.393554][T30984] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 681.418016][T30984] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 681.418024][T30984] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:26 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x8864000000000000}, 0x30) 22:24:26 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x4000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:26 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:26 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600400400000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) [ 681.534771][T31023] FAULT_INJECTION: forcing a failure. [ 681.534771][T31023] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 681.548036][T31023] CPU: 0 PID: 31023 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 681.556021][T31023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 681.566087][T31023] Call Trace: [ 681.569403][T31023] dump_stack+0x172/0x1f0 [ 681.573758][T31023] should_fail.cold+0xa/0x15 [ 681.578363][T31023] ? percpu_ref_put_many+0x94/0x190 [ 681.583576][T31023] ? fault_create_debugfs_attr+0x180/0x180 [ 681.589399][T31023] should_fail_alloc_page+0x50/0x60 [ 681.594605][T31023] __alloc_pages_nodemask+0x1a1/0x8f0 [ 681.600008][T31023] ? lock_downgrade+0x920/0x920 [ 681.604883][T31023] ? __alloc_pages_slowpath+0x2520/0x2520 [ 681.610624][T31023] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 681.616370][T31023] ? fault_create_debugfs_attr+0x180/0x180 [ 681.622208][T31023] cache_grow_begin+0x90/0xd20 [ 681.627017][T31023] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 681.632749][T31023] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 681.632766][T31023] __kmalloc+0x6b2/0x770 [ 681.632791][T31023] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 681.643271][T31023] tomoyo_realpath_from_path+0xcd/0x7b0 [ 681.643291][T31023] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 681.643313][T31023] tomoyo_check_open_permission+0x2a8/0x3f0 [ 681.643330][T31023] ? tomoyo_path_number_perm+0x520/0x520 [ 681.643366][T31023] ? lock_downgrade+0x920/0x920 [ 681.654724][T31023] ? rwlock_bug.part.0+0x90/0x90 [ 681.654740][T31023] ? lockref_get+0x16/0x60 [ 681.654757][T31023] tomoyo_file_open+0xa9/0xd0 [ 681.654780][T31023] security_file_open+0x71/0x300 [ 681.666956][T31023] do_dentry_open+0x373/0x1250 [ 681.666971][T31023] ? match_exception_partial+0x242/0x2d0 [ 681.666998][T31023] ? chown_common+0x5c0/0x5c0 [ 681.667015][T31023] ? inode_permission+0xb4/0x560 [ 681.667035][T31023] vfs_open+0xa0/0xd0 [ 681.721308][T31023] path_openat+0x10e9/0x4630 [ 681.725885][T31023] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 681.731683][T31023] ? kasan_slab_alloc+0xf/0x20 [ 681.736440][T31023] ? kmem_cache_alloc+0x121/0x710 [ 681.741466][T31023] ? getname_flags+0xd6/0x5b0 [ 681.746130][T31023] ? getname+0x1a/0x20 [ 681.750506][T31023] ? do_sys_open+0x2c9/0x5d0 [ 681.755088][T31023] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 681.760450][T31023] ? __alloc_pages_nodemask+0x576/0x8f0 [ 681.765995][T31023] ? cache_grow_end+0xa4/0x190 [ 681.770763][T31023] ? __kasan_check_read+0x11/0x20 [ 681.775784][T31023] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 681.781491][T31023] do_filp_open+0x1a1/0x280 [ 681.786022][T31023] ? may_open_dev+0x100/0x100 [ 681.790696][T31023] ? __kasan_check_read+0x11/0x20 [ 681.795734][T31023] ? do_raw_spin_unlock+0x57/0x270 [ 681.800844][T31023] ? _raw_spin_unlock+0x2d/0x50 [ 681.805682][T31023] ? __alloc_fd+0x487/0x620 [ 681.810177][T31023] do_sys_open+0x3fe/0x5d0 [ 681.814614][T31023] ? filp_open+0x80/0x80 [ 681.818872][T31023] ? switch_fpu_return+0x1fa/0x4f0 [ 681.823980][T31023] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 681.830052][T31023] __x64_sys_open+0x7e/0xc0 [ 681.834563][T31023] do_syscall_64+0xfd/0x6a0 [ 681.839068][T31023] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 681.844965][T31023] RIP: 0033:0x413711 [ 681.848846][T31023] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 681.868725][T31023] RSP: 002b:00007faa47624a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 681.877136][T31023] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413711 [ 681.885127][T31023] RDX: 00007faa47624b0a RSI: 0000000000000002 RDI: 00007faa47624b00 [ 681.893084][T31023] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 681.901063][T31023] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 681.909025][T31023] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:27 executing program 3: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000180)="d345a7babc2db515f7718000000053ff07") r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x8000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000140)=ANY=[@ANYBLOB="0a001b00", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f00000001c0)=0x2c) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000000040)=""/244) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000200)=0x1, 0x4) 22:24:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c00000f1900010200000000000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) 22:24:27 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x4305, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:27 executing program 1 (fault-call:0 fault-nth:15): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:27 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600400500000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c0000101900010200000000000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) 22:24:27 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x88a8ffff00000000}, 0x30) 22:24:27 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x4788, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 682.179896][T31054] FAULT_INJECTION: forcing a failure. [ 682.179896][T31054] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 682.193165][T31054] CPU: 0 PID: 31054 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 682.201159][T31054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 682.211223][T31054] Call Trace: [ 682.214538][T31054] dump_stack+0x172/0x1f0 [ 682.218901][T31054] should_fail.cold+0xa/0x15 [ 682.223512][T31054] ? percpu_ref_put_many+0x94/0x190 22:24:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:27 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x4888, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 682.228732][T31054] ? fault_create_debugfs_attr+0x180/0x180 [ 682.234561][T31054] should_fail_alloc_page+0x50/0x60 [ 682.239766][T31054] __alloc_pages_nodemask+0x1a1/0x8f0 [ 682.245145][T31054] ? lock_downgrade+0x920/0x920 [ 682.250007][T31054] ? __alloc_pages_slowpath+0x2520/0x2520 [ 682.255738][T31054] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 682.261467][T31054] ? fault_create_debugfs_attr+0x180/0x180 [ 682.267292][T31054] cache_grow_begin+0x90/0xd20 [ 682.272062][T31054] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 682.272080][T31054] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 682.272099][T31054] __kmalloc+0x6b2/0x770 [ 682.288311][T31054] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 682.294049][T31054] tomoyo_realpath_from_path+0xcd/0x7b0 [ 682.299615][T31054] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 682.305892][T31054] tomoyo_check_open_permission+0x2a8/0x3f0 [ 682.312244][T31054] ? tomoyo_path_number_perm+0x520/0x520 [ 682.317918][T31054] ? lock_downgrade+0x920/0x920 22:24:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:27 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x6000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 682.322806][T31054] ? rwlock_bug.part.0+0x90/0x90 [ 682.333843][T31054] ? lockref_get+0x16/0x60 [ 682.338275][T31054] tomoyo_file_open+0xa9/0xd0 [ 682.342972][T31054] security_file_open+0x71/0x300 [ 682.347930][T31054] do_dentry_open+0x373/0x1250 [ 682.352728][T31054] ? match_exception_partial+0x242/0x2d0 [ 682.358383][T31054] ? chown_common+0x5c0/0x5c0 [ 682.364590][T31054] ? inode_permission+0xb4/0x560 [ 682.369539][T31054] vfs_open+0xa0/0xd0 [ 682.373529][T31054] path_openat+0x10e9/0x4630 [ 682.378164][T31054] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 682.383977][T31054] ? kasan_slab_alloc+0xf/0x20 [ 682.388753][T31054] ? kmem_cache_alloc+0x121/0x710 [ 682.393783][T31054] ? getname_flags+0xd6/0x5b0 [ 682.398462][T31054] ? getname+0x1a/0x20 [ 682.402541][T31054] ? do_sys_open+0x2c9/0x5d0 [ 682.407146][T31054] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 682.412526][T31054] ? __alloc_pages_nodemask+0x576/0x8f0 [ 682.418080][T31054] ? cache_grow_end+0xa4/0x190 [ 682.422857][T31054] ? __kasan_check_read+0x11/0x20 [ 682.427894][T31054] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 682.433621][T31054] do_filp_open+0x1a1/0x280 [ 682.438130][T31054] ? may_open_dev+0x100/0x100 [ 682.442824][T31054] ? __kasan_check_read+0x11/0x20 [ 682.447853][T31054] ? do_raw_spin_unlock+0x57/0x270 [ 682.452991][T31054] ? _raw_spin_unlock+0x2d/0x50 [ 682.457859][T31054] ? __alloc_fd+0x487/0x620 [ 682.462384][T31054] do_sys_open+0x3fe/0x5d0 [ 682.466805][T31054] ? filp_open+0x80/0x80 [ 682.471058][T31054] ? fput+0x1b/0x20 [ 682.474873][T31054] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 682.480951][T31054] __x64_sys_open+0x7e/0xc0 [ 682.485480][T31054] do_syscall_64+0xfd/0x6a0 [ 682.490006][T31054] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 682.495903][T31054] RIP: 0033:0x413711 [ 682.499803][T31054] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 682.519526][T31054] RSP: 002b:00007faa47624a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 682.519541][T31054] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413711 [ 682.519548][T31054] RDX: 00007faa47624b0a RSI: 0000000000000002 RDI: 00007faa47624b00 [ 682.519554][T31054] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 682.519560][T31054] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 682.519567][T31054] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:28 executing program 3: lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='security.apparmor\x00', &(0x7f0000000080)=""/226, 0xe2) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000180)="d345a7babc2db515f7718000000053ff07") r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) sendmmsg$nfc_llcp(r0, &(0x7f0000001ac0)=[{&(0x7f0000000200)={0x27, 0x0, 0x2, 0x7, 0x0, 0x5, "81ce93c94d828db69f234afd203c1de7c7e5c198cb787bdba9cb2a96285e7cc3c3db000bbf4652951f7f4a9c839c9ce8858a3f94ba612b5c3ebf3a9b0f5013", 0x12}, 0x60, &(0x7f0000001540)=[{&(0x7f0000000280)="66a0a117e59b5b53e72ba3fc26880ed3f3277d5b6c9e9481b35ad95fe9644a917d606640ab8e106648d50047465bd1622e4317493e45a9123608268e25942678524f21320d663582c661025d63ca035258a38a682b30210dfd40885d8f296967c4cd37096cf4a7f0cc090615d83588c8835430ac3769611ad2f883d06b8b98b402a157588c2a53354383955a2133fa34e7a7371a", 0x94}, {&(0x7f0000000340)="c957b2075346d3098f18", 0xa}, {&(0x7f0000000380)}, {&(0x7f00000003c0)="bacb793c8181081e88a4962cdcc6267796ab7bdc398b08434162a20f6f4ab86054bcb2a3da70e5f35a63aeea5328841055e15134155173e70a8c21b287416bd2a42049a3a6afdd2fc71bbbeb72167241991b036aeddd59617b1a79b8c8594cd8", 0x60}, {&(0x7f0000000440)="cf22d3ad310665a3f51415af0478760a6316d56732cb5e5fd0595de11231d20bf6c02cd7c87ff3c9b0244fe29af6cd459b05e0bf707bf5dc729549e93c3535", 0x3f}, {&(0x7f0000000480)="6fe5a7b795116c1f09487b6b0192a8da67e2772f89310808dedf4aaa113047f934b5969223b105d29608f4a338ef55b87d56f3388a3ac03591db3ee10da34f87c07df8911b7719e8381bd07db28506f3260dbab970399cb753708d200ad50aa560338777fa52caa08b449503b20d83dffe733fb7dafb4ba272992ae249f023ba03ad8d88aa7fe6c7eec63f4f0dab8985ac949a7a7398ed2ac6a0b307292bd78bf721b499d405360583f5f40b9970df30fef7ee6b68553123dbb3ba4caaee873ab2a983182929fc3a96ec1626aff7f56e451eab5143838bbdfad748d0f0f2e60de100fd5b2adb2393355eecd17824a0163f76744c1c8fb135ae8f775558f9a2d9c41a5b80cb09eb4a2fcf371b5c9549863055790e57362952bb649b6297a48ecf6276b66b57078c75a77261fd04eb8f305d7e4714f28af1b160a76f3c7939369b134fb8217ca184ff7a3bed74ea3331741ce7f54ae13da9264f6d9e96dfb4e369bd2960125dfba2c7e7747e8b61923299cec99b4c45315b37943334610db8225c14873bc30c0ba8820bd3b3fddacdc18f459c628f2a02d873f141fb82d2a306abb9a7c98122aab2adf3d0690ab9317e1d5e00b0cce65706de95e4b0bf85d6f161381d8092019531f749534a65c787281243f5eae6bb399946f2f741d2d952d2655439780fff2ed6b3420a2c292225073781c90a8a7ddd6264ff07020c1b1cca4ff36e3e8f070801c7a8f0299258c3e67f32269675fa84d1449708fca15b2cb71c34615cdfb14d4b3f01bfdc126cfaba6436954114ca2761ea56b9a43308fbabbb0726fe3adda3ae4193fb9e3d82143f175a84caaefdee37cde9b77023e3d89ca159c39e8b5c4d5db26ecad8a028878e4a4c3459ea43650380a7311f8fbba88b674f655bbefd4b04f23f88d66d516271a0b308c0c5fecd403a5e49b5c1a12954820c3d2d7d0744eb108fc1bfad08d8962cb973613ababe61061e81f174dfc3d7de50e678ab1eb1f791232be862cc08b5f0d478d55b8e4c37a49074359356eb412bc0d07d9565a100880d32464f7e62d87efaeeb4eba7ed589c53f5115654f9b1fe593563df90b3e2e659f3129c7cfb4dc946e2d9a7e5382bdd7b623cd381dffe9829b63ec09ff6be6830ad2eab99509bfd3adfb2a0623c0a4516498fcd0453089c6434f06bf0eeba9648428b1d58a811ea327b721bc98ed85dd00b50f73624ee0332b50595b7e839669c21d2cdb82c5fccf7d3d1f5c185a018160a2c6f44b756f1c002a0b0f1d0daabf3082f237a4bd9e9e596794e48effc6599afc54fa788fe84ef6c293c6782cdbb754bbe9ff4d39e716902880fbbb06b3a7d2e589e62eb4154551986be355c86497b9c0c5207125da6a8eb33bddc7ae88cc5578cf51bef64ca77103be16637cf437744711060177a87c72260a7983d15f1ca08b519f2840e9226c46fd6965a9a4c6dbd00cb87d3170fff0a024a36969278ca0ab297726d5c85e7c674db3c17307531c5c8045aa9f2418e139dfaf9393db15f728008fd6bb6ef36b3eeb2ce38f04d504372b1f20b8a89656ebf6d495252b99d4b4fa63a23f70459710b7a23cb56814dfa9ea8ba1da42129c82bff1a892cd06e98c32ef96f48942e53b283430dc4a1d8f31c996aff1b8d8602176ad752bb3064973b371f2607e010e4d056f2f731906038ec4864e69f5909ba1a272b9e50b672e66ea1789174f734078de45c1962da0556ce8125f0368e88af03ca2439dd2d7a9a2cc8fb9279ac0b04aa3108e16c28149bc5de588c9018d238d639aea6712d8c2d05133ab59a87c4f5a067ec834da4b289b6bdf189b0c70587fe2a95f861b9ce5e32e08f5eb267f677b521fb2e28b5a3b26c7f9f285e31febc22032774bbc0e966591eef9cd5b3120ba9029bf9c14ae3a6c1fe6bd6eab1ddea9f969f27d544436299c7aba30ae4bfc94d4f212b38acacafe7cba287ec3ee63318f1b34fa8d1e38acd1f88b8b6cdd86888cbf6d8f15d7d9d445c7f946c8373e0f314bf4e53dbeb67c020ec729b7fc1766e075891e90373f0b593e030103a5c83009ae4ca55029bb12f236c52e9d20f0e50d20f6405edd845b426cdd85d6bca06fd4f69fd3279e432c512387ce2f790285ff59bfee4d035a9bea714d47c5f438452f320044605d7daeb6c6656117f84fc743ebc7b62e7784accfae6d82603894c045c1857becbd20a2818a933dd06e08c4534871b41dc56dab139f2ec045a532934929be4baed0d30a7886e04f2d6423a9e883af6b732055b77b9366a239dd672b34140b0ea8c5399bfb382796810764dc136f03a734201432d219bc2b309eec21384e5b3a403b65f475939ff0dd4055b0e5508e3c5d997ab8e28c97afa44e175628104348951d0fda642c83584a3376293c24cb09ba31e5d19b22b77fc01ed81e4b75aab4b864fc297efb6d8346aab68fd23653b4ba3fc395ae9411174139a3a0e6a5b3c3574869b73ae96166c8bbf7c89405d2e9e0a6c00cc3011530968faa7933748562f486871e1ddcd1bb58d4414db45eb5295a73dc4224f5206b01b399e23a0dd0d32d4cee7ec448b5ad05b0b173061757a31c321a08b4e09e0c166b5e457696d6449bc7782a3accc6c99105efe5a3d73070ccf89d20e0014fe1dc50e18744c2fac24435f0b6fb16fd0f1e79376da9fc48e559d150a56b13c33406e987478562f51f342a13323bc804d2aaa80a3e30fb30e6947b523dee78197310b91275e35c9c3a4ae40f1ca7ec59e2e0c508a78fe7bc67e6df891fc1118b2e7628dd7f833e922f4de05b725c455365bbcca3bd005e39357f836368e3976a3171b9dc459b0730e0d2f2dc959e2a2f7df4c7c230505434d9ab212caf7f242039adf6cb391498eb00989722c20b8a2add2cbdf68afecc9315aa3391d05c20ede55121044aec00f405430596ce88fa23cd8bf2a89713304e2fa0b19830eb91de9c69a6108679a5fa8f315f6e7b3c3caebd8518f15daf26851357f66362ab78148cbdd94b1f17b42ba0de4aa743e7557267ea1c1835630c891949d8e2c05558995d47b3498d3f2f7835928a83e2300e41a3a21fbdea9ff72702e491c526c16a984a87dd4b5367ff36efb76785dab4cec746d73462faf992c80f6a90ab7ab01e8e83b047f03cbb8af6652d206b7457f8a81c35db04f0ee96d5d64f52133d9c086093f4a7eddbfb6b987960d577e90c73883781c77ab19629338e8a4dbbbf2225d9c3cc0c1dfa50a39cc9f6ab0b80cc028c7a6d2420075ddf92a5327e78bdf4c309faec04cc320099814b8a966d00dbb9a4348017b0e6714fb5be3506ab3562aa0165073fa38f4cd703a5780a68d31a4d089758517eb49c4c8fdb26016c217c517d354d2f9234c2249989a9df04714f7d337d510f170f6dccdd7624aa9ccc4917c0741b840e523333dfb6663847a7191b05af0df9365fa496d28477ac9338c2ce1a680f00552471664bc2ca6ccc0ff39824395077b2ef2a986ff3d8448865dc04b09397c8bba7cdf4651c456b479691ad2dad0cf7b59a39046040368dc5d6882b2caf05cd228a63d3b609f052945ef590eb0b3bfee62ec72c422cf4b303565125f698f0944d6e1e22638e72996a639b7c18ca98c4b3add20d0b83a97fcadc925730f2934a93b335fffed0959df0d5035828c5b78fb1cc9039cef0cefe0f40a835fb15ee6c5d4bfdb23088b1019c396f9218063cc96003d371a0bed694b9e7f74a76a69e238a835d874d187248c377bba72ea9e343ba90f1554a43bd3bbf50a22d62949e654a030061c2207bbb7925c66cd55c76b42b118281638067fe693348e7a76f452e7fa0059f1613e3d627cf75718b9f80f05e045b068993b92dcf67881814e2029b86daa346494e4e8f987fcb5e6c9aafbffe2eb4570dbee5283b9cff3afa65605674e4c9a13a02daca6ff5e4d9cedebeb3a7b2818ad69aabc58965b99deb72e877524e1e0e0c09848a9dc825186cdddd539f36f0e631ce1f1e141a7229ffd90289017f28d87228a414f412c53a7366dd983b724a0bd64e32b8cb8cdd73ec2d7d956bad3828b33fd636d70bc4207d8ced591df3752130bad67cc0ce6f4965e4025ab3b0a7704ba759d22585ea83b4d3cabe2ad862e02c8f96fb06c83ab5920aaebf85bb2a72a0c4ea1a4c8b1a5651f2ac4f4bcb42b620072726f0ebcfc7d1dc8c1a4367e89626db9ac0d17370518effb0c3d31bec857a3c154ff79420f2a6d8cf13252028e4802372bdaf0ee4bb8575e119aaf4a780bc6df8eb5bd1878bc2881eae022162940d63e73cdf44b7f4da085ea6a6197bac25b1af6df322c3ff31cddf13d82928cd5da0f767c58cfdedc73beaab667ce68df1e45e1cf079ccd5ac049688fb5d3b65f2773956b4a5b79fd70cc0b8233a739928b8a679fb8c3df1e97933f0129f460015c6a0d707c11dc88f282c53c432d98a45b7e2e98d2831bac97e212ac73c25d8afb34430d06c4a7803feb8c5f895cda2f3e52724aec7ed1b86481e6e6160c861c0b21d87c01a10638b599a508c15f4f9736fb2e96ae4c1157c405f099b397d734ee108c350607de7ce1ea5fc1e26d99944fd7054b8d8bdf7081d233b57209339adec84e8b7a33b4f9c9a1c79b4268563384d6f221e513c474023eb2b2cab6679a138296201124e6cd8493c49bf84b2c61465625060283c5f542f26ce46bba881c01987c72d78a45f9eb2be3d18332fa26106dec6cf5d9512dfc9d7717619c32fcc4063e69cbbc839605bb494b7bfb44924d79f74f3a3d0b1f5475335acfcebbd9bf373066fd065fcc0982cdbb2a42a2c9ab19c2a3cc16ef93b779f7e91d230d583da3280a1a240ae8896c1b061c82257a6ced1584b42864a411677ba35216e4fdb980a2b3773f2508253e059d0bb6caeaff36ae914ad9dfc80f8eef60db44eb82949a699f52f054e9259a97d0d006abe3e155dc981bfb9e3cbd06959bcb5972530aedfa5daa35c72dad2cb4e13ba10cfb934d79ba0f268cd5a3b59a234dea926381267abad28a78e39fc7326f67f619670d85f2a5dc0ea204964537fa1a82ad9a1af3643d3e079bb5f14e309ea333112cde5597f6b4e6b4b285dd5e36d4127bfd5d3c48dc5b4091a98c0e372761daa7f9db52bbfc824379ab18ef9b6c61a43b1ad1c147eb9aba8baba53edf95f1899116f4b51763933dfa7ca9fbc04f4db7177cd921961a73aaf2635161305fb786032c9d1e722fa7e87fca32f2fcd1d9d2e14ded025860e02e26d4701ce9af4b8ca96f88201f5a77565ebc9b65402f926bb826550da72ba32661d14ad4cb338d73e94601c2333c226d9debcb38460b922d91a6182462e25dc27cdd2749651ef7a688b0a57c38e6dc7bed2caf9313cbeec2bd181d6cca7a5c155e416e49bd5b829d81c95fb0bc2807e4e13ce98f60e6063f2a077799baf9adbb8b83eef5061968b316fc72203ff1c91d771c872403a3a7d6cef0f52ce1122969e07e544d79a09e2b45ffd4505d2def1fb594e73ec102ddc975bb7c7273cd216811fd3fdc8b94b78e058271f6c74a6f60afcd9e12224b4f7aa592af7128eeeed837e6a88dcd448248dd28eac58e8bf4c4d8ef00c97991fbea83c733dc873eeb2b7f84867b3d77cc1d642fc7e452939eeb4e7a49a476b97d066668a6b9871d61d723683f69216a723435634017b1734193ba194b42bee9569bcc26ea29cd4d602c562757e73e628db8a7fe942da9170bc1678d45a3edb835dba441314730af260184136ab4311f82b8adbd4fccfe14543bde6dd05eaa99a06d201663c84f0e195bce06d68060", 0x1000}, {&(0x7f0000001480)="220c5c5432d6f44bf7488a8490d272da0720e96c7de926904a24493c053f44b3d2623e6ee7f038b63e8333ee70c78a318fc6264e0b30b76803545b19ad28f8f73082406e184fdbc46da74276d7a61764282076d53305510b16a11cceb0c67f61a783e74767ddd5a28bbdc406c3a256fd463b6432a2e9cb866e64fe37f0db6ba3e35e1aefd8098265d7987322e79f1b083835f00ed0ed4d2997f3b8293968420e1d5a1ebd1d1b5b5b53cd6300b86f218ab10f", 0xb2}], 0x7, &(0x7f00000015c0)={0xb8, 0x10a, 0x5, "766f59c769455d597536dff7881954b818346e059500ec8d89463195d8aa2f523844de4b2c6250a2a70684be2078aae4c38b3adf02cbf6f7a13bb60d29429c91380c89b421d99604727cb746993e1c8bf25f7e583a30bf378f9971291f92f0a28879fa8bad9d21525a6414bcfab85d08f30102cbf0cf08e9430697f8adcdf14af3640cfbee76e277121498a5ece4bb00b46723fea81bfb68c50b66475b9d49903f"}, 0xb8}, {&(0x7f0000001680)={0x27, 0x0, 0x0, 0x7, 0x0, 0x0, "ce9bfd1a8cc1609209801a55a3bf39cea4e15e60d18dbcfa7293621674ffb69e2d218aaa2cb758404dfdf73505db7489e3e8a0cccc46ac0bf39241fb5a3144", 0xd}, 0x60, &(0x7f0000001940)=[{&(0x7f0000001700)="d5f40d9c60f221fb45cc9b45a0b5637d0457cb8535999ecc7a52802b7594abde7c21e8cf3faa47f1e5ea6e047e29ecfe899a1556f8c19e1f1a7c6a3935f5cf586b0085e8d3d8af9f4ba6e4659fd2de9e817d7f18ab077cec68dad6435000fe6ec280a8d8641e3cbcf5cdd1795be92727afe97d8aabaec01bbccd1d3d7fe404c90c788aea6084225fb7c6f0916ee29f7b6d44eded66892f5bfc4dd25d1102afd1df2d1c0319614e4a07be9eed8d6dee72dacb5fb60b6fb0900a98b99248853955ce7b0430935d62236897f217fb0cd5756f51e732c5d4639fcee9dd97bedf3ba58d4ca5cd035641008060bdaa4b649f1304b5a1f3ea8a", 0xf6}, {&(0x7f0000001800)="342382ad7e5005011dd39a38fd3b16ce78fd2e", 0x13}, {&(0x7f0000001840)="212dc6cf793f44513cea1ed61daa774dd79fecf7e78d6ecf8edb4b3fce550d886407b5892bde5c0565af0205c95fd1f650ff420937e0aad023f64ca0896d2b014ad40c77f4419b42f4fca41c1b45965bf8f33995b387b19d7cd9f5", 0x5b}, {&(0x7f00000018c0)="e5d9a99e15b8edb7af4a9f0d9775d7fd1a0aa0d293ad09c48ab08b11b46f58f38d0e47659eb0977315a6fbf6bc386c49b57cde98f9374c6bbfc4601a34dc6bce3a2241c182b695fea40eeb6c5a1803024968a7cfe2bf61b9d7607f99f4dcbf2941320746186e683d8f4bd905e0aa06b0a0f9b931", 0x74}], 0x4, &(0x7f0000001980)={0x110, 0x88, 0xfffffffffffffffa, "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"}, 0x110, 0x801}], 0x2, 0x20000000) 22:24:28 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x6488, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:28 executing program 1 (fault-call:0 fault-nth:16): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:28 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x88caffff00000000}, 0x30) 22:24:28 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600400a00000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:28 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x800e, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 683.454169][T31200] FAULT_INJECTION: forcing a failure. [ 683.454169][T31200] name failslab, interval 1, probability 0, space 0, times 0 [ 683.486130][T31200] CPU: 0 PID: 31200 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 683.494426][T31200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 22:24:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 683.504494][T31200] Call Trace: [ 683.507809][T31200] dump_stack+0x172/0x1f0 [ 683.512176][T31200] should_fail.cold+0xa/0x15 [ 683.516790][T31200] ? fault_create_debugfs_attr+0x180/0x180 [ 683.522635][T31200] ? ___might_sleep+0x163/0x280 [ 683.527501][T31200] __should_failslab+0x121/0x190 [ 683.532451][T31200] should_failslab+0x9/0x14 [ 683.536998][T31200] __kmalloc+0x2e0/0x770 [ 683.541253][T31200] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 683.547504][T31200] ? d_absolute_path+0x11b/0x170 [ 683.552453][T31200] ? __d_path+0x140/0x140 [ 683.556786][T31200] ? tomoyo_encode2.part.0+0xf5/0x400 [ 683.562160][T31200] tomoyo_encode2.part.0+0xf5/0x400 [ 683.567370][T31200] tomoyo_encode+0x2b/0x50 [ 683.571789][T31200] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 683.577423][T31200] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 683.583670][T31200] tomoyo_check_open_permission+0x2a8/0x3f0 [ 683.583687][T31200] ? tomoyo_path_number_perm+0x520/0x520 [ 683.583722][T31200] ? lock_downgrade+0x920/0x920 [ 683.583743][T31200] ? rwlock_bug.part.0+0x90/0x90 22:24:28 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 683.605028][T31200] ? lockref_get+0x16/0x60 [ 683.609455][T31200] tomoyo_file_open+0xa9/0xd0 [ 683.614148][T31200] security_file_open+0x71/0x300 [ 683.619095][T31200] do_dentry_open+0x373/0x1250 [ 683.623861][T31200] ? match_exception_partial+0x242/0x2d0 [ 683.623879][T31200] ? chown_common+0x5c0/0x5c0 [ 683.623895][T31200] ? inode_permission+0xb4/0x560 [ 683.623910][T31200] vfs_open+0xa0/0xd0 [ 683.623931][T31200] path_openat+0x10e9/0x4630 [ 683.648730][T31200] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 22:24:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:29 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x8035, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 683.654554][T31200] ? kasan_slab_alloc+0xf/0x20 [ 683.659322][T31200] ? kmem_cache_alloc+0x121/0x710 [ 683.664354][T31200] ? getname_flags+0xd6/0x5b0 [ 683.669033][T31200] ? getname+0x1a/0x20 [ 683.673105][T31200] ? do_sys_open+0x2c9/0x5d0 [ 683.677714][T31200] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 683.683104][T31200] ? __alloc_pages_nodemask+0x576/0x8f0 [ 683.688658][T31200] ? cache_grow_end+0xa4/0x190 [ 683.693426][T31200] ? __kasan_check_read+0x11/0x20 [ 683.698487][T31200] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 683.704221][T31200] do_filp_open+0x1a1/0x280 [ 683.708730][T31200] ? may_open_dev+0x100/0x100 [ 683.713418][T31200] ? __kasan_check_read+0x11/0x20 [ 683.713438][T31200] ? do_raw_spin_unlock+0x57/0x270 [ 683.713455][T31200] ? _raw_spin_unlock+0x2d/0x50 [ 683.713467][T31200] ? __alloc_fd+0x487/0x620 [ 683.713500][T31200] do_sys_open+0x3fe/0x5d0 [ 683.737496][T31200] ? filp_open+0x80/0x80 [ 683.741757][T31200] ? fput+0x1b/0x20 [ 683.745578][T31200] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 683.751656][T31200] __x64_sys_open+0x7e/0xc0 [ 683.756167][T31200] do_syscall_64+0xfd/0x6a0 [ 683.760685][T31200] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 683.766584][T31200] RIP: 0033:0x413711 [ 683.770483][T31200] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 683.790099][T31200] RSP: 002b:00007faa47624a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 683.790114][T31200] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413711 [ 683.790120][T31200] RDX: 00007faa47624b0a RSI: 0000000000000002 RDI: 00007faa47624b00 [ 683.790127][T31200] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 683.790133][T31200] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 683.790139][T31200] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 [ 683.821425][T31200] ERROR: Out of memory at tomoyo_realpath_from_path. 22:24:29 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) io_uring_register$IORING_UNREGISTER_BUFFERS(r0, 0x1, 0x0, 0x0) ioctl$PPPIOCSACTIVE(r0, 0x40107446, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x2, 0x4, 0x5, 0x10000}, {0x8, 0x5, 0x0, 0xff}, {0x7f, 0x3, 0x5, 0x9}, {0x3ff, 0x7ff, 0x5, 0x200}, {0x8000, 0x1, 0x3, 0x23ae}, {0x6, 0x8, 0x2, 0x3}]}) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000180)="d345a7babc2db515f7718000000053ff07") 22:24:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:29 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x8100, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:29 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600400c00000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:29 executing program 1 (fault-call:0 fault-nth:17): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:29 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x8906000000000000}, 0x30) [ 684.341988][T31244] FAULT_INJECTION: forcing a failure. [ 684.341988][T31244] name failslab, interval 1, probability 0, space 0, times 0 [ 684.368692][T31244] CPU: 0 PID: 31244 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 684.377008][T31244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 22:24:29 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x8847, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 684.390714][T31244] Call Trace: [ 684.394029][T31244] dump_stack+0x172/0x1f0 [ 684.398374][T31244] should_fail.cold+0xa/0x15 [ 684.402980][T31244] ? fault_create_debugfs_attr+0x180/0x180 [ 684.408804][T31244] ? ___might_sleep+0x163/0x280 [ 684.413667][T31244] __should_failslab+0x121/0x190 [ 684.418616][T31244] should_failslab+0x9/0x14 [ 684.423120][T31244] __kmalloc+0x2e0/0x770 [ 684.427378][T31244] ? mark_held_locks+0xf0/0xf0 [ 684.432150][T31244] ? kasan_slab_alloc+0xf/0x20 [ 684.436919][T31244] ? kmem_cache_alloc+0x121/0x710 22:24:29 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x8848, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 684.441950][T31244] ? getname_flags+0xd6/0x5b0 [ 684.446641][T31244] ? getname+0x1a/0x20 [ 684.450717][T31244] ? do_sys_open+0x2c9/0x5d0 [ 684.455329][T31244] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 684.461067][T31244] tomoyo_realpath_from_path+0xcd/0x7b0 [ 684.466632][T31244] ? tomoyo_path_number_perm+0x193/0x520 [ 684.472277][T31244] tomoyo_path_number_perm+0x1dd/0x520 [ 684.477762][T31244] ? tomoyo_path_number_perm+0x193/0x520 [ 684.483418][T31244] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 684.489242][T31244] ? __kasan_check_read+0x11/0x20 [ 684.494292][T31244] ? __kasan_check_read+0x11/0x20 [ 684.499350][T31244] ? __fget+0x384/0x560 [ 684.503531][T31244] ? ksys_dup3+0x3e0/0x3e0 [ 684.507972][T31244] ? do_sys_open+0x31d/0x5d0 [ 684.512591][T31244] tomoyo_file_ioctl+0x23/0x30 [ 684.517382][T31244] security_file_ioctl+0x77/0xc0 [ 684.522347][T31244] ksys_ioctl+0x57/0xd0 [ 684.526536][T31244] __x64_sys_ioctl+0x73/0xb0 [ 684.531153][T31244] do_syscall_64+0xfd/0x6a0 [ 684.535684][T31244] entry_SYSCALL_64_after_hwframe+0x49/0xbe 22:24:29 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x8864, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:29 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 684.541590][T31244] RIP: 0033:0x459697 [ 684.545504][T31244] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 684.545513][T31244] RSP: 002b:00007faa47624a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 684.545525][T31244] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 684.545531][T31244] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 684.545537][T31244] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 684.545543][T31244] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 684.545550][T31244] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 [ 684.563254][T31244] ERROR: Out of memory at tomoyo_realpath_from_path. [ 684.652186][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 684.658055][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:24:30 executing program 3: r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) close(r0) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000180)="d345a7babc2db515f7718000000053ff07") 22:24:30 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x8906, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c0000001904010200000000000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) 22:24:30 executing program 1 (fault-call:0 fault-nth:18): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:30 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600400d00000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:30 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0xe803000000000000}, 0x30) [ 685.207987][T31283] FAULT_INJECTION: forcing a failure. [ 685.207987][T31283] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 685.221249][T31283] CPU: 1 PID: 31283 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 685.229227][T31283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 685.239288][T31283] Call Trace: [ 685.242697][T31283] dump_stack+0x172/0x1f0 [ 685.247055][T31283] should_fail.cold+0xa/0x15 [ 685.251675][T31283] ? fault_create_debugfs_attr+0x180/0x180 [ 685.257512][T31283] ? lock_downgrade+0x920/0x920 [ 685.262374][T31283] should_fail_alloc_page+0x50/0x60 [ 685.267691][T31283] __alloc_pages_nodemask+0x1a1/0x8f0 [ 685.273080][T31283] ? __alloc_pages_slowpath+0x2520/0x2520 [ 685.278806][T31283] ? kernel_text_address+0x73/0xf0 [ 685.283934][T31283] ? unwind_get_return_address+0x61/0xa0 [ 685.289570][T31283] ? profile_setup.cold+0xbb/0xbb [ 685.294619][T31283] ? fault_create_debugfs_attr+0x180/0x180 [ 685.300498][T31283] cache_grow_begin+0x90/0xd20 [ 685.305283][T31283] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 685.311020][T31283] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 685.317287][T31283] __kmalloc+0x6b2/0x770 [ 685.321545][T31283] ? mark_held_locks+0xf0/0xf0 [ 685.326318][T31283] ? kasan_slab_alloc+0xf/0x20 [ 685.331101][T31283] ? getname_flags+0xd6/0x5b0 [ 685.335791][T31283] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 685.335806][T31283] tomoyo_realpath_from_path+0xcd/0x7b0 [ 685.335823][T31283] ? tomoyo_path_number_perm+0x193/0x520 [ 685.335841][T31283] tomoyo_path_number_perm+0x1dd/0x520 [ 685.335855][T31283] ? tomoyo_path_number_perm+0x193/0x520 [ 685.335878][T31283] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 685.347185][T31283] ? __kasan_check_read+0x11/0x20 [ 685.347208][T31283] ? __kasan_check_read+0x11/0x20 [ 685.347234][T31283] ? __fget+0x384/0x560 [ 685.383931][T31283] ? ksys_dup3+0x3e0/0x3e0 [ 685.388392][T31283] ? do_sys_open+0x31d/0x5d0 [ 685.393006][T31283] tomoyo_file_ioctl+0x23/0x30 [ 685.397779][T31283] security_file_ioctl+0x77/0xc0 [ 685.402729][T31283] ksys_ioctl+0x57/0xd0 22:24:30 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0xf000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:30 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0xf0ffff, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:30 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x1000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:30 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x2000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 685.406895][T31283] __x64_sys_ioctl+0x73/0xb0 [ 685.411502][T31283] do_syscall_64+0xfd/0x6a0 [ 685.416008][T31283] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 685.421901][T31283] RIP: 0033:0x459697 [ 685.425802][T31283] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 685.445418][T31283] RSP: 002b:00007faa47624a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 22:24:30 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x3000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 685.453839][T31283] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 685.461822][T31283] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 685.469804][T31283] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 685.478837][T31283] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 685.486817][T31283] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:31 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x3}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000140)={r1, 0xffff}, 0x8) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000180)="d345a7babc2db515f7718000000053ff07") getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000200)={r1, 0x1}, &(0x7f0000000240)=0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x110) getsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000040)=0x101, &(0x7f0000000080)=0x4) 22:24:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:31 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x4000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:31 executing program 1 (fault-call:0 fault-nth:19): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:31 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0xf401000000000000}, 0x30) 22:24:31 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600400e00000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) [ 686.157692][T31331] FAULT_INJECTION: forcing a failure. [ 686.157692][T31331] name failslab, interval 1, probability 0, space 0, times 0 [ 686.179315][T31331] CPU: 0 PID: 31331 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 686.187337][T31331] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 686.197406][T31331] Call Trace: [ 686.200725][T31331] dump_stack+0x172/0x1f0 22:24:31 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x5000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 686.205083][T31331] should_fail.cold+0xa/0x15 [ 686.209705][T31331] ? fault_create_debugfs_attr+0x180/0x180 [ 686.215535][T31331] ? ___might_sleep+0x163/0x280 [ 686.215554][T31331] __should_failslab+0x121/0x190 [ 686.215570][T31331] should_failslab+0x9/0x14 [ 686.215581][T31331] __kmalloc+0x2e0/0x770 [ 686.215598][T31331] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 686.215622][T31331] ? d_absolute_path+0x11b/0x170 [ 686.245288][T31331] ? __d_path+0x140/0x140 [ 686.249640][T31331] ? tomoyo_encode2.part.0+0xf5/0x400 22:24:31 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x6000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 686.255041][T31331] tomoyo_encode2.part.0+0xf5/0x400 [ 686.260260][T31331] tomoyo_encode+0x2b/0x50 [ 686.264681][T31331] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 686.270473][T31331] tomoyo_path_number_perm+0x1dd/0x520 [ 686.275950][T31331] ? tomoyo_path_number_perm+0x193/0x520 [ 686.281618][T31331] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 686.287435][T31331] ? __kasan_check_read+0x11/0x20 [ 686.292475][T31331] ? __kasan_check_read+0x11/0x20 [ 686.297514][T31331] ? __fget+0x384/0x560 [ 686.301679][T31331] ? ksys_dup3+0x3e0/0x3e0 22:24:31 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x7000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 686.306197][T31331] ? do_sys_open+0x31d/0x5d0 [ 686.310901][T31331] tomoyo_file_ioctl+0x23/0x30 [ 686.315676][T31331] security_file_ioctl+0x77/0xc0 [ 686.320713][T31331] ksys_ioctl+0x57/0xd0 [ 686.324906][T31331] __x64_sys_ioctl+0x73/0xb0 [ 686.329507][T31331] do_syscall_64+0xfd/0x6a0 [ 686.334026][T31331] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 686.340635][T31331] RIP: 0033:0x459697 22:24:31 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x8000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 686.344536][T31331] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 686.365637][T31331] RSP: 002b:00007faa47624a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 686.374083][T31331] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 686.385460][T31331] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 686.393434][T31331] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 22:24:31 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x8060000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 686.401415][T31331] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 686.409390][T31331] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 [ 686.422335][T31331] ERROR: Out of memory at tomoyo_realpath_from_path. 22:24:32 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000040)=""/31, &(0x7f0000000080)=0x1f) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f00000000c0)) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000180)="d345a7babc2db515f7718000000053ff07") 22:24:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c0000001909010200000000000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) 22:24:32 executing program 1 (fault-call:0 fault-nth:20): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:32 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0xffffffff00000000}, 0x30) 22:24:32 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0xb000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:32 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600401100000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) [ 687.143639][T31367] FAULT_INJECTION: forcing a failure. [ 687.143639][T31367] name failslab, interval 1, probability 0, space 0, times 0 [ 687.180825][T31367] CPU: 1 PID: 31367 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 687.188865][T31367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 687.198921][T31367] Call Trace: [ 687.202238][T31367] dump_stack+0x172/0x1f0 [ 687.206570][T31367] should_fail.cold+0xa/0x15 [ 687.211189][T31367] ? fault_create_debugfs_attr+0x180/0x180 [ 687.217031][T31367] ? page_to_nid.part.0+0x20/0x20 [ 687.222068][T31367] ? ___might_sleep+0x163/0x280 [ 687.226918][T31367] __should_failslab+0x121/0x190 [ 687.231866][T31367] should_failslab+0x9/0x14 [ 687.236384][T31367] kmem_cache_alloc_trace+0x2d3/0x790 [ 687.241751][T31367] ? lockdep_init_map+0x1be/0x6d0 [ 687.246760][T31367] ? loop_info64_to_compat+0x6d0/0x6d0 [ 687.252208][T31367] __kthread_create_on_node+0xf2/0x460 [ 687.257770][T31367] ? lock_acquire+0x190/0x410 [ 687.262433][T31367] ? __kthread_parkme+0x1c0/0x1c0 [ 687.267447][T31367] ? mutex_lock_io_nested+0x11d0/0x11d0 [ 687.272980][T31367] ? loop_info64_to_compat+0x6d0/0x6d0 [ 687.278429][T31367] kthread_create_on_node+0xbb/0xf0 [ 687.283612][T31367] ? __kthread_create_on_node+0x460/0x460 [ 687.289314][T31367] ? lockdep_init_map+0x1be/0x6d0 [ 687.294331][T31367] ? lockdep_init_map+0x1be/0x6d0 [ 687.299352][T31367] loop_set_fd+0x342/0x10c0 [ 687.303865][T31367] lo_ioctl+0x1a3/0x1460 [ 687.308089][T31367] ? trace_hardirqs_on+0x67/0x240 [ 687.313094][T31367] ? loop_set_fd+0x10c0/0x10c0 [ 687.317841][T31367] blkdev_ioctl+0xedb/0x1c1a [ 687.322411][T31367] ? blkpg_ioctl+0xa90/0xa90 [ 687.327062][T31367] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 687.332856][T31367] ? __kasan_check_read+0x11/0x20 [ 687.337959][T31367] ? __kasan_check_read+0x11/0x20 [ 687.342972][T31367] block_ioctl+0xee/0x130 [ 687.347285][T31367] ? blkdev_fallocate+0x410/0x410 [ 687.352295][T31367] do_vfs_ioctl+0xdb6/0x13e0 [ 687.356870][T31367] ? ioctl_preallocate+0x210/0x210 [ 687.361965][T31367] ? __fget+0x384/0x560 [ 687.366125][T31367] ? ksys_dup3+0x3e0/0x3e0 [ 687.370526][T31367] ? do_sys_open+0x31d/0x5d0 [ 687.375107][T31367] ? tomoyo_file_ioctl+0x23/0x30 [ 687.380030][T31367] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 687.386259][T31367] ? security_file_ioctl+0x8d/0xc0 [ 687.391357][T31367] ksys_ioctl+0xab/0xd0 [ 687.395516][T31367] __x64_sys_ioctl+0x73/0xb0 [ 687.400117][T31367] do_syscall_64+0xfd/0x6a0 [ 687.404605][T31367] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 687.410477][T31367] RIP: 0033:0x459697 [ 687.414376][T31367] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 687.433987][T31367] RSP: 002b:00007faa47624a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 22:24:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c000000190a010200000000000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) 22:24:32 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0xd000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 687.442390][T31367] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 687.450362][T31367] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 687.458324][T31367] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 687.466283][T31367] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 687.474275][T31367] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:32 executing program 1 (fault-call:0 fault-nth:21): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:32 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600402d00000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:32 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x28000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 687.667238][T31394] FAULT_INJECTION: forcing a failure. [ 687.667238][T31394] name failslab, interval 1, probability 0, space 0, times 0 [ 687.692181][T31394] CPU: 0 PID: 31394 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 687.700213][T31394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 687.710285][T31394] Call Trace: [ 687.713594][T31394] dump_stack+0x172/0x1f0 [ 687.717948][T31394] should_fail.cold+0xa/0x15 [ 687.722561][T31394] ? lock_downgrade+0x920/0x920 [ 687.727425][T31394] ? fault_create_debugfs_attr+0x180/0x180 [ 687.733264][T31394] ? page_to_nid.part.0+0x20/0x20 [ 687.738303][T31394] ? ___might_sleep+0x163/0x280 [ 687.743176][T31394] __should_failslab+0x121/0x190 [ 687.748120][T31394] should_failslab+0x9/0x14 [ 687.752623][T31394] kmem_cache_alloc+0x2aa/0x710 [ 687.757456][T31394] ? __schedule+0xfa5/0x1580 [ 687.762024][T31394] ? __kasan_check_read+0x11/0x20 [ 687.767061][T31394] __kernfs_new_node+0xf0/0x6c0 [ 687.771898][T31394] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 687.777356][T31394] ? trace_hardirqs_on+0x67/0x240 [ 687.782367][T31394] ? _raw_spin_unlock_irq+0x5e/0x90 [ 687.787551][T31394] ? __schedule+0xfa5/0x1580 [ 687.792127][T31394] ? __sched_text_start+0x8/0x8 [ 687.796966][T31394] ? account_entity_enqueue+0x244/0x390 [ 687.802529][T31394] kernfs_new_node+0x96/0x120 [ 687.807195][T31394] kernfs_create_dir_ns+0x52/0x160 [ 687.813060][T31394] internal_create_group+0x7f4/0xc30 [ 687.818332][T31394] ? bd_set_size+0x3f/0xb0 [ 687.822739][T31394] ? remove_files.isra.0+0x190/0x190 [ 687.828050][T31394] ? __down_timeout+0x2d0/0x2d0 [ 687.832891][T31394] ? __kasan_check_write+0x14/0x20 [ 687.837996][T31394] ? up_write+0x9d/0x280 [ 687.842250][T31394] sysfs_create_group+0x20/0x30 [ 687.847116][T31394] loop_set_fd+0xb3b/0x10c0 [ 687.851607][T31394] lo_ioctl+0x1a3/0x1460 [ 687.855831][T31394] ? trace_hardirqs_on+0x67/0x240 [ 687.860839][T31394] ? loop_set_fd+0x10c0/0x10c0 [ 687.865587][T31394] blkdev_ioctl+0xedb/0x1c1a [ 687.870172][T31394] ? blkpg_ioctl+0xa90/0xa90 [ 687.874746][T31394] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 687.880550][T31394] ? __kasan_check_read+0x11/0x20 [ 687.886437][T31394] ? __kasan_check_read+0x11/0x20 [ 687.891450][T31394] block_ioctl+0xee/0x130 [ 687.895762][T31394] ? blkdev_fallocate+0x410/0x410 [ 687.900793][T31394] do_vfs_ioctl+0xdb6/0x13e0 [ 687.905390][T31394] ? ioctl_preallocate+0x210/0x210 [ 687.910593][T31394] ? __fget+0x384/0x560 [ 687.915027][T31394] ? ksys_dup3+0x3e0/0x3e0 [ 687.919445][T31394] ? do_sys_open+0x31d/0x5d0 [ 687.924037][T31394] ? tomoyo_file_ioctl+0x23/0x30 [ 687.929006][T31394] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 687.935258][T31394] ? security_file_ioctl+0x8d/0xc0 [ 687.940568][T31394] ksys_ioctl+0xab/0xd0 [ 687.944750][T31394] __x64_sys_ioctl+0x73/0xb0 [ 687.949337][T31394] do_syscall_64+0xfd/0x6a0 [ 687.953843][T31394] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 687.959732][T31394] RIP: 0033:0x459697 [ 687.963624][T31394] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 687.983226][T31394] RSP: 002b:00007faa47624a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 687.991634][T31394] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 687.999615][T31394] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 688.007601][T31394] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 688.015572][T31394] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 688.023525][T31394] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:33 executing program 3: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000180)="d345a7babc2db515f7718000000053ff07") r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x480002, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000001040)={@dev, 0x0}, &(0x7f0000001080)=0x14) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x3) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000010c0)={'vcan0\x00', r1}) 22:24:33 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0xffffffffa0010000}, 0x30) 22:24:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:33 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x3f000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:33 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600403200000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:33 executing program 1 (fault-call:0 fault-nth:22): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 688.396602][T31417] FAULT_INJECTION: forcing a failure. [ 688.396602][T31417] name failslab, interval 1, probability 0, space 0, times 0 [ 688.409378][T31417] CPU: 1 PID: 31417 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 688.417369][T31417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 688.427433][T31417] Call Trace: [ 688.430765][T31417] dump_stack+0x172/0x1f0 [ 688.435116][T31417] should_fail.cold+0xa/0x15 [ 688.439721][T31417] ? fault_create_debugfs_attr+0x180/0x180 [ 688.445531][T31417] ? stack_trace_save+0xac/0xe0 [ 688.450394][T31417] __should_failslab+0x121/0x190 [ 688.455357][T31417] should_failslab+0x9/0x14 [ 688.459843][T31417] kmem_cache_alloc+0x47/0x710 [ 688.464596][T31417] ? save_stack+0x5c/0x90 [ 688.468921][T31417] ? save_stack+0x23/0x90 [ 688.473232][T31417] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 688.479029][T31417] ? kasan_slab_alloc+0xf/0x20 [ 688.483809][T31417] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 688.490131][T31417] idr_get_free+0x48e/0x8c0 [ 688.494626][T31417] idr_alloc_u32+0x19e/0x330 [ 688.499204][T31417] ? __fprop_inc_percpu_max+0x230/0x230 [ 688.504769][T31417] ? fault_create_debugfs_attr+0x180/0x180 [ 688.510577][T31417] ? mark_held_locks+0xf0/0xf0 [ 688.515335][T31417] ? page_to_nid.part.0+0x20/0x20 [ 688.520357][T31417] idr_alloc_cyclic+0x132/0x270 [ 688.525210][T31417] ? idr_alloc+0x150/0x150 [ 688.529613][T31417] __kernfs_new_node+0x172/0x6c0 [ 688.534553][T31417] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 688.539995][T31417] ? trace_hardirqs_on+0x67/0x240 [ 688.545008][T31417] ? _raw_spin_unlock_irq+0x5e/0x90 [ 688.550276][T31417] ? __schedule+0xfa5/0x1580 [ 688.554861][T31417] ? __sched_text_start+0x8/0x8 [ 688.559716][T31417] ? account_entity_enqueue+0x244/0x390 [ 688.565244][T31417] kernfs_new_node+0x96/0x120 [ 688.569921][T31417] kernfs_create_dir_ns+0x52/0x160 [ 688.575016][T31417] internal_create_group+0x7f4/0xc30 [ 688.580282][T31417] ? bd_set_size+0x3f/0xb0 [ 688.584679][T31417] ? remove_files.isra.0+0x190/0x190 [ 688.589946][T31417] ? __down_timeout+0x2d0/0x2d0 [ 688.594799][T31417] ? __kasan_check_write+0x14/0x20 [ 688.599892][T31417] ? up_write+0x9d/0x280 [ 688.604117][T31417] sysfs_create_group+0x20/0x30 [ 688.608950][T31417] loop_set_fd+0xb3b/0x10c0 [ 688.613437][T31417] lo_ioctl+0x1a3/0x1460 [ 688.617662][T31417] ? trace_hardirqs_on+0x67/0x240 [ 688.622668][T31417] ? loop_set_fd+0x10c0/0x10c0 [ 688.627429][T31417] blkdev_ioctl+0xedb/0x1c1a [ 688.632015][T31417] ? blkpg_ioctl+0xa90/0xa90 [ 688.636596][T31417] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 688.642384][T31417] ? __kasan_check_read+0x11/0x20 [ 688.647433][T31417] ? __kasan_check_read+0x11/0x20 [ 688.652503][T31417] block_ioctl+0xee/0x130 [ 688.656913][T31417] ? blkdev_fallocate+0x410/0x410 [ 688.661931][T31417] do_vfs_ioctl+0xdb6/0x13e0 [ 688.666521][T31417] ? ioctl_preallocate+0x210/0x210 [ 688.671626][T31417] ? __fget+0x384/0x560 [ 688.675872][T31417] ? ksys_dup3+0x3e0/0x3e0 [ 688.680271][T31417] ? do_sys_open+0x31d/0x5d0 [ 688.684850][T31417] ? tomoyo_file_ioctl+0x23/0x30 [ 688.689812][T31417] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 688.696060][T31417] ? security_file_ioctl+0x8d/0xc0 [ 688.701159][T31417] ksys_ioctl+0xab/0xd0 [ 688.705317][T31417] __x64_sys_ioctl+0x73/0xb0 [ 688.709922][T31417] do_syscall_64+0xfd/0x6a0 [ 688.714410][T31417] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 688.720288][T31417] RIP: 0033:0x459697 [ 688.724189][T31417] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:24:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:34 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x40000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 688.743966][T31417] RSP: 002b:00007faa47624a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 688.752372][T31417] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 688.760442][T31417] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 688.768495][T31417] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 688.776451][T31417] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 688.784425][T31417] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:34 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x43050000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:34 executing program 1 (fault-call:0 fault-nth:23): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 688.996012][T31445] FAULT_INJECTION: forcing a failure. [ 688.996012][T31445] name failslab, interval 1, probability 0, space 0, times 0 [ 689.008748][T31445] CPU: 1 PID: 31445 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 689.016743][T31445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 689.026817][T31445] Call Trace: [ 689.030132][T31445] dump_stack+0x172/0x1f0 [ 689.034499][T31445] should_fail.cold+0xa/0x15 [ 689.039112][T31445] ? fault_create_debugfs_attr+0x180/0x180 [ 689.044919][T31445] ? stack_trace_save+0xac/0xe0 [ 689.049788][T31445] __should_failslab+0x121/0x190 [ 689.054866][T31445] should_failslab+0x9/0x14 [ 689.059382][T31445] kmem_cache_alloc+0x47/0x710 [ 689.064129][T31445] ? save_stack+0x5c/0x90 [ 689.068435][T31445] ? save_stack+0x23/0x90 [ 689.072748][T31445] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 689.078549][T31445] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 689.084878][T31445] idr_get_free+0x48e/0x8c0 [ 689.089368][T31445] idr_alloc_u32+0x19e/0x330 [ 689.093939][T31445] ? __fprop_inc_percpu_max+0x230/0x230 [ 689.099555][T31445] ? fault_create_debugfs_attr+0x180/0x180 [ 689.105370][T31445] ? mark_held_locks+0xf0/0xf0 [ 689.110118][T31445] ? page_to_nid.part.0+0x20/0x20 [ 689.115255][T31445] idr_alloc_cyclic+0x132/0x270 [ 689.120113][T31445] ? idr_alloc+0x150/0x150 [ 689.124521][T31445] __kernfs_new_node+0x172/0x6c0 [ 689.129468][T31445] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 689.135058][T31445] ? lock_downgrade+0x920/0x920 [ 689.139982][T31445] ? update_curr+0x2e8/0x8d0 [ 689.144572][T31445] ? __enqueue_entity+0x142/0x390 [ 689.149702][T31445] ? account_entity_enqueue+0x244/0x390 [ 689.155255][T31445] kernfs_new_node+0x96/0x120 [ 689.159963][T31445] kernfs_create_dir_ns+0x52/0x160 [ 689.165061][T31445] internal_create_group+0x7f4/0xc30 [ 689.170331][T31445] ? bd_set_size+0x3f/0xb0 [ 689.174733][T31445] ? remove_files.isra.0+0x190/0x190 [ 689.180004][T31445] ? __down_timeout+0x2d0/0x2d0 [ 689.184843][T31445] ? __kasan_check_write+0x14/0x20 [ 689.189942][T31445] ? up_write+0x9d/0x280 [ 689.194183][T31445] sysfs_create_group+0x20/0x30 [ 689.199029][T31445] loop_set_fd+0xb3b/0x10c0 [ 689.203518][T31445] lo_ioctl+0x1a3/0x1460 [ 689.207752][T31445] ? trace_hardirqs_on+0x67/0x240 [ 689.212775][T31445] ? loop_set_fd+0x10c0/0x10c0 [ 689.217548][T31445] blkdev_ioctl+0xedb/0x1c1a [ 689.222128][T31445] ? blkpg_ioctl+0xa90/0xa90 [ 689.226721][T31445] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 689.232515][T31445] ? __kasan_check_read+0x11/0x20 [ 689.237531][T31445] ? __kasan_check_read+0x11/0x20 [ 689.242566][T31445] block_ioctl+0xee/0x130 22:24:34 executing program 3: r0 = request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='-\x00', 0xfffffffffffffffb) r1 = socket$inet(0x2, 0x1, 0x8000) setsockopt(r1, 0x200, 0x3f, &(0x7f00000001c0)="a2e2226489cc7218bfb0d8c91f2c25d6452fa4f2b004f8d8545aab71ef5926ce4361a5cd9b032c5a055fe32bbe1d56ef6d585960f83c49149c75904e1155d322bb47c2743c8de8c2ef733d4009453f7c7ae8b47fccad5a3fdb6aa1650e2116a231b730d00028eb6bcda1334e5463aada2888b004dd2f4f01f7ac4357994d8b2f51b927ab2a5b508bcb72c435690f65960a5554ddeed42f65e6f97deb74fe6dc48e6124730ca5b874b8464bba75e08cfc", 0xb0) keyctl$describe(0x6, r0, &(0x7f00000000c0)=""/108, 0x6c) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000002c0), &(0x7f0000000300)=0x4) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x600001, 0x0) ioctl$RTC_IRQP_READ(r2, 0x8008700b, &(0x7f0000000280)) ioctl$EVIOCGSW(r2, 0x8040451b, &(0x7f0000000340)=""/146) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000180)="d345a7babc2db515f7718000000053ff07") 22:24:34 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600403800000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:34 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x2}}, 0x30) 22:24:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c0000001911010200000000000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) [ 689.246894][T31445] ? blkdev_fallocate+0x410/0x410 [ 689.251904][T31445] do_vfs_ioctl+0xdb6/0x13e0 [ 689.256502][T31445] ? ioctl_preallocate+0x210/0x210 [ 689.261628][T31445] ? __fget+0x384/0x560 [ 689.265800][T31445] ? ksys_dup3+0x3e0/0x3e0 [ 689.270229][T31445] ? do_sys_open+0x31d/0x5d0 [ 689.274950][T31445] ? tomoyo_file_ioctl+0x23/0x30 [ 689.279927][T31445] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 689.286177][T31445] ? security_file_ioctl+0x8d/0xc0 [ 689.291296][T31445] ksys_ioctl+0xab/0xd0 22:24:34 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x60000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 689.295466][T31445] __x64_sys_ioctl+0x73/0xb0 [ 689.300087][T31445] do_syscall_64+0xfd/0x6a0 [ 689.304695][T31445] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 689.310593][T31445] RIP: 0033:0x459697 [ 689.314490][T31445] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 689.334115][T31445] RSP: 002b:00007faa47624a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 689.342542][T31445] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 689.350784][T31445] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 689.358833][T31445] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 689.366808][T31445] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 689.374770][T31445] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:34 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x800e0000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:34 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600403900000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:34 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x80350000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:34 executing program 1 (fault-call:0 fault-nth:24): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:35 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x4}}, 0x30) [ 689.713248][T31591] FAULT_INJECTION: forcing a failure. [ 689.713248][T31591] name failslab, interval 1, probability 0, space 0, times 0 [ 689.736818][T31591] CPU: 1 PID: 31591 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 689.744878][T31591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 689.755908][T31591] Call Trace: [ 689.759297][T31591] dump_stack+0x172/0x1f0 [ 689.763631][T31591] should_fail.cold+0xa/0x15 [ 689.768221][T31591] ? fault_create_debugfs_attr+0x180/0x180 [ 689.774058][T31591] ? page_to_nid.part.0+0x20/0x20 [ 689.779073][T31591] ? ___might_sleep+0x163/0x280 [ 689.783914][T31591] __should_failslab+0x121/0x190 [ 689.788854][T31591] should_failslab+0x9/0x14 [ 689.793346][T31591] kmem_cache_alloc+0x2aa/0x710 [ 689.798180][T31591] ? __mutex_lock+0x3da/0x1340 [ 689.802935][T31591] ? __kasan_check_read+0x11/0x20 [ 689.807945][T31591] __kernfs_new_node+0xf0/0x6c0 [ 689.812792][T31591] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 689.818276][T31591] ? wait_for_completion+0x440/0x440 [ 689.823623][T31591] ? __kasan_check_write+0x14/0x20 [ 689.828741][T31591] ? mutex_unlock+0xd/0x10 [ 689.833145][T31591] ? kernfs_activate+0x192/0x1f0 [ 689.838086][T31591] kernfs_new_node+0x96/0x120 [ 689.842746][T31591] __kernfs_create_file+0x51/0x33b [ 689.847852][T31591] sysfs_add_file_mode_ns+0x222/0x560 [ 689.853230][T31591] internal_create_group+0x359/0xc30 [ 689.858503][T31591] ? bd_set_size+0x3f/0xb0 [ 689.862908][T31591] ? remove_files.isra.0+0x190/0x190 [ 689.868181][T31591] ? __down_timeout+0x2d0/0x2d0 [ 689.873103][T31591] ? __kasan_check_write+0x14/0x20 [ 689.878202][T31591] ? up_write+0x9d/0x280 [ 689.882431][T31591] sysfs_create_group+0x20/0x30 [ 689.887290][T31591] loop_set_fd+0xb3b/0x10c0 [ 689.891779][T31591] lo_ioctl+0x1a3/0x1460 [ 689.896034][T31591] ? trace_hardirqs_on+0x67/0x240 [ 689.901060][T31591] ? loop_set_fd+0x10c0/0x10c0 [ 689.905809][T31591] blkdev_ioctl+0xedb/0x1c1a [ 689.910376][T31591] ? blkpg_ioctl+0xa90/0xa90 [ 689.914977][T31591] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 689.920783][T31591] ? __kasan_check_read+0x11/0x20 [ 689.925791][T31591] ? __kasan_check_read+0x11/0x20 [ 689.930799][T31591] block_ioctl+0xee/0x130 [ 689.935152][T31591] ? blkdev_fallocate+0x410/0x410 [ 689.940171][T31591] do_vfs_ioctl+0xdb6/0x13e0 [ 689.944746][T31591] ? ioctl_preallocate+0x210/0x210 [ 689.949836][T31591] ? __fget+0x384/0x560 [ 689.953973][T31591] ? ksys_dup3+0x3e0/0x3e0 [ 689.958389][T31591] ? do_sys_open+0x31d/0x5d0 [ 689.962962][T31591] ? tomoyo_file_ioctl+0x23/0x30 [ 689.967886][T31591] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 689.974109][T31591] ? security_file_ioctl+0x8d/0xc0 [ 689.979200][T31591] ksys_ioctl+0xab/0xd0 [ 689.983352][T31591] __x64_sys_ioctl+0x73/0xb0 [ 689.987944][T31591] do_syscall_64+0xfd/0x6a0 [ 689.992434][T31591] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 689.998303][T31591] RIP: 0033:0x459697 [ 690.002370][T31591] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 690.022054][T31591] RSP: 002b:00007faa47624a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 690.030481][T31591] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 690.038448][T31591] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 690.046420][T31591] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 690.054524][T31591] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 690.062508][T31591] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:35 executing program 3: 22:24:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:35 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600404200000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:35 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x81000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:35 executing program 1 (fault-call:0 fault-nth:25): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:35 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5}}, 0x30) 22:24:35 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x86ddffff, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 690.345609][T31613] FAULT_INJECTION: forcing a failure. [ 690.345609][T31613] name failslab, interval 1, probability 0, space 0, times 0 [ 690.364592][T31613] CPU: 1 PID: 31613 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 690.373138][T31613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 690.386864][T31613] Call Trace: [ 690.390176][T31613] dump_stack+0x172/0x1f0 22:24:35 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x88470000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 690.394523][T31613] should_fail.cold+0xa/0x15 [ 690.399124][T31613] ? fault_create_debugfs_attr+0x180/0x180 [ 690.404949][T31613] ? page_to_nid.part.0+0x20/0x20 [ 690.409993][T31613] ? ___might_sleep+0x163/0x280 [ 690.414851][T31613] __should_failslab+0x121/0x190 [ 690.419795][T31613] should_failslab+0x9/0x14 [ 690.424312][T31613] kmem_cache_alloc+0x2aa/0x710 [ 690.429169][T31613] ? __mutex_lock+0x3da/0x1340 [ 690.434035][T31613] ? __kasan_check_read+0x11/0x20 [ 690.439070][T31613] __kernfs_new_node+0xf0/0x6c0 22:24:35 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x88480000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 690.443942][T31613] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 690.449422][T31613] ? wait_for_completion+0x440/0x440 [ 690.454718][T31613] ? __kasan_check_write+0x14/0x20 [ 690.459852][T31613] ? mutex_unlock+0xd/0x10 [ 690.464286][T31613] ? kernfs_activate+0x192/0x1f0 [ 690.469761][T31613] kernfs_new_node+0x96/0x120 [ 690.474962][T31613] __kernfs_create_file+0x51/0x33b [ 690.480096][T31613] sysfs_add_file_mode_ns+0x222/0x560 [ 690.485485][T31613] internal_create_group+0x359/0xc30 [ 690.490794][T31613] ? bd_set_size+0x3f/0xb0 22:24:35 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x88640000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:35 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x88a8ffff, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 690.495220][T31613] ? remove_files.isra.0+0x190/0x190 [ 690.500519][T31613] ? __down_timeout+0x2d0/0x2d0 [ 690.505383][T31613] ? __kasan_check_write+0x14/0x20 [ 690.510505][T31613] ? up_write+0x9d/0x280 [ 690.514771][T31613] sysfs_create_group+0x20/0x30 [ 690.519769][T31613] loop_set_fd+0xb3b/0x10c0 [ 690.524282][T31613] lo_ioctl+0x1a3/0x1460 [ 690.528539][T31613] ? trace_hardirqs_on+0x67/0x240 [ 690.533571][T31613] ? loop_set_fd+0x10c0/0x10c0 [ 690.538442][T31613] blkdev_ioctl+0xedb/0x1c1a [ 690.543043][T31613] ? blkpg_ioctl+0xa90/0xa90 [ 690.547653][T31613] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 690.553467][T31613] ? __kasan_check_read+0x11/0x20 [ 690.558521][T31613] ? __kasan_check_read+0x11/0x20 [ 690.563649][T31613] block_ioctl+0xee/0x130 [ 690.567987][T31613] ? blkdev_fallocate+0x410/0x410 [ 690.573014][T31613] do_vfs_ioctl+0xdb6/0x13e0 [ 690.577607][T31613] ? ioctl_preallocate+0x210/0x210 [ 690.582718][T31613] ? __fget+0x384/0x560 [ 690.586884][T31613] ? ksys_dup3+0x3e0/0x3e0 [ 690.591313][T31613] ? do_sys_open+0x31d/0x5d0 [ 690.595886][T31613] ? tomoyo_file_ioctl+0x23/0x30 [ 690.600809][T31613] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 690.607032][T31613] ? security_file_ioctl+0x8d/0xc0 [ 690.612123][T31613] ksys_ioctl+0xab/0xd0 [ 690.616261][T31613] __x64_sys_ioctl+0x73/0xb0 [ 690.620833][T31613] do_syscall_64+0xfd/0x6a0 [ 690.625331][T31613] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 690.631207][T31613] RIP: 0033:0x459697 [ 690.635094][T31613] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 690.654689][T31613] RSP: 002b:00007faa47624a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 690.663120][T31613] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 690.671247][T31613] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 690.679204][T31613] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 690.687169][T31613] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 690.695123][T31613] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:36 executing program 3: clone(0x7fffd, 0x0, 0x0, 0x0, &(0x7f0000000180)="e645a7ba0053ff07") 22:24:36 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x88caffff, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:36 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="15030000060040f401000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:36 executing program 1 (fault-call:0 fault-nth:26): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:36 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x8}}, 0x30) 22:24:36 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x89060000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:36 executing program 3: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000040)="d345a7babc2db515f7718000000053ff07") arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) 22:24:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 690.989077][T31655] FAULT_INJECTION: forcing a failure. [ 690.989077][T31655] name failslab, interval 1, probability 0, space 0, times 0 [ 691.025999][T31655] CPU: 1 PID: 31655 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 22:24:36 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x8dffffff, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:36 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0xa0010000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 691.034033][T31655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 691.044183][T31655] Call Trace: [ 691.047507][T31655] dump_stack+0x172/0x1f0 [ 691.052042][T31655] should_fail.cold+0xa/0x15 [ 691.056762][T31655] ? fault_create_debugfs_attr+0x180/0x180 [ 691.062676][T31655] ? page_to_nid.part.0+0x20/0x20 [ 691.067753][T31655] ? ___might_sleep+0x163/0x280 [ 691.072619][T31655] __should_failslab+0x121/0x190 [ 691.077572][T31655] should_failslab+0x9/0x14 [ 691.082701][T31655] kmem_cache_alloc_trace+0x2d3/0x790 22:24:36 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0xf5ffffff, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 691.088877][T31655] kobject_uevent_env+0x387/0x1023 [ 691.094091][T31655] ? __kasan_check_write+0x14/0x20 [ 691.099296][T31655] ? up_write+0x9d/0x280 [ 691.103564][T31655] kobject_uevent+0x20/0x26 [ 691.108152][T31655] loop_set_fd+0xbcc/0x10c0 [ 691.112665][T31655] lo_ioctl+0x1a3/0x1460 [ 691.116986][T31655] ? trace_hardirqs_on+0x67/0x240 [ 691.122081][T31655] ? loop_set_fd+0x10c0/0x10c0 [ 691.127313][T31655] blkdev_ioctl+0xedb/0x1c1a [ 691.131922][T31655] ? blkpg_ioctl+0xa90/0xa90 22:24:36 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0xffffa888, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 691.136648][T31655] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 691.142553][T31655] ? __kasan_check_read+0x11/0x20 [ 691.147585][T31655] ? __kasan_check_read+0x11/0x20 [ 691.152626][T31655] block_ioctl+0xee/0x130 [ 691.156960][T31655] ? blkdev_fallocate+0x410/0x410 [ 691.162457][T31655] do_vfs_ioctl+0xdb6/0x13e0 [ 691.167099][T31655] ? ioctl_preallocate+0x210/0x210 [ 691.172218][T31655] ? __fget+0x384/0x560 [ 691.176430][T31655] ? ksys_dup3+0x3e0/0x3e0 [ 691.180884][T31655] ? do_sys_open+0x31d/0x5d0 22:24:36 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0xffffca88, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 691.185476][T31655] ? tomoyo_file_ioctl+0x23/0x30 [ 691.190458][T31655] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 691.196713][T31655] ? security_file_ioctl+0x8d/0xc0 [ 691.201843][T31655] ksys_ioctl+0xab/0xd0 [ 691.206040][T31655] __x64_sys_ioctl+0x73/0xb0 [ 691.210647][T31655] do_syscall_64+0xfd/0x6a0 [ 691.215187][T31655] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 691.221171][T31655] RIP: 0033:0x459697 [ 691.225070][T31655] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 691.244672][T31655] RSP: 002b:00007faa47624a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 691.253120][T31655] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 691.261098][T31655] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 691.269060][T31655] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 691.277216][T31655] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 691.285199][T31655] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:36 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="15030000060040e803000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:36 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0xffffdd86, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:36 executing program 1 (fault-call:0 fault-nth:27): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:36 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0xa}}, 0x30) [ 691.491241][T31691] FAULT_INJECTION: forcing a failure. [ 691.491241][T31691] name failslab, interval 1, probability 0, space 0, times 0 [ 691.504456][T31691] CPU: 0 PID: 31691 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 691.512558][T31691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 691.522630][T31691] Call Trace: [ 691.525930][T31691] dump_stack+0x172/0x1f0 [ 691.530319][T31691] should_fail.cold+0xa/0x15 [ 691.534914][T31691] ? fault_create_debugfs_attr+0x180/0x180 [ 691.540924][T31691] ? page_to_nid.part.0+0x20/0x20 [ 691.545935][T31691] ? ___might_sleep+0x163/0x280 [ 691.550795][T31691] __should_failslab+0x121/0x190 [ 691.556031][T31691] should_failslab+0x9/0x14 [ 691.560527][T31691] kmem_cache_alloc+0x2aa/0x710 [ 691.565451][T31691] ? __mutex_lock+0x3da/0x1340 [ 691.570202][T31691] ? __kasan_check_read+0x11/0x20 [ 691.575243][T31691] __kernfs_new_node+0xf0/0x6c0 [ 691.580079][T31691] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 691.585520][T31691] ? wait_for_completion+0x440/0x440 [ 691.590788][T31691] ? __kasan_check_write+0x14/0x20 [ 691.595886][T31691] ? mutex_unlock+0xd/0x10 [ 691.600303][T31691] ? kernfs_activate+0x192/0x1f0 [ 691.605222][T31691] kernfs_new_node+0x96/0x120 [ 691.609893][T31691] __kernfs_create_file+0x51/0x33b [ 691.615341][T31691] sysfs_add_file_mode_ns+0x222/0x560 [ 691.620697][T31691] internal_create_group+0x359/0xc30 [ 691.625965][T31691] ? bd_set_size+0x3f/0xb0 [ 691.630390][T31691] ? remove_files.isra.0+0x190/0x190 [ 691.635685][T31691] ? __down_timeout+0x2d0/0x2d0 [ 691.640518][T31691] ? __kasan_check_write+0x14/0x20 [ 691.645609][T31691] ? up_write+0x9d/0x280 [ 691.649853][T31691] sysfs_create_group+0x20/0x30 [ 691.654805][T31691] loop_set_fd+0xb3b/0x10c0 [ 691.659291][T31691] lo_ioctl+0x1a3/0x1460 [ 691.663535][T31691] ? trace_hardirqs_on+0x67/0x240 [ 691.668561][T31691] ? loop_set_fd+0x10c0/0x10c0 [ 691.673403][T31691] blkdev_ioctl+0xedb/0x1c1a [ 691.678010][T31691] ? blkpg_ioctl+0xa90/0xa90 [ 691.682599][T31691] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 691.688413][T31691] ? __kasan_check_read+0x11/0x20 [ 691.693450][T31691] ? __kasan_check_read+0x11/0x20 [ 691.698484][T31691] block_ioctl+0xee/0x130 [ 691.702915][T31691] ? blkdev_fallocate+0x410/0x410 [ 691.707938][T31691] do_vfs_ioctl+0xdb6/0x13e0 [ 691.712534][T31691] ? ioctl_preallocate+0x210/0x210 [ 691.717632][T31691] ? __fget+0x384/0x560 [ 691.721793][T31691] ? ksys_dup3+0x3e0/0x3e0 [ 691.726199][T31691] ? do_sys_open+0x31d/0x5d0 [ 691.730784][T31691] ? tomoyo_file_ioctl+0x23/0x30 [ 691.735710][T31691] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 691.741936][T31691] ? security_file_ioctl+0x8d/0xc0 [ 691.747028][T31691] ksys_ioctl+0xab/0xd0 [ 691.751173][T31691] __x64_sys_ioctl+0x73/0xb0 [ 691.755749][T31691] do_syscall_64+0xfd/0x6a0 [ 691.760235][T31691] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 691.766110][T31691] RIP: 0033:0x459697 [ 691.770002][T31691] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 691.789608][T31691] RSP: 002b:00007faa47624a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 691.798030][T31691] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 691.806034][T31691] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 691.814006][T31691] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 691.822004][T31691] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 691.831078][T31691] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:37 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0xfffff000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:37 executing program 1 (fault-call:0 fault-nth:28): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:37 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600400005000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:37 executing program 3: clone(0x442041fc, 0x0, 0x0, 0x0, &(0x7f0000000080)="d345a7babc2db515f7718000000053ff07") 22:24:37 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0xe}}, 0x30) 22:24:37 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0xffffff8d, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:37 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0xfffffff5, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 692.251988][T31718] FAULT_INJECTION: forcing a failure. [ 692.251988][T31718] name failslab, interval 1, probability 0, space 0, times 0 [ 692.278502][T31718] CPU: 1 PID: 31718 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 692.286636][T31718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 692.296705][T31718] Call Trace: 22:24:37 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x1a0ffffffff, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 692.300019][T31718] dump_stack+0x172/0x1f0 [ 692.304376][T31718] should_fail.cold+0xa/0x15 [ 692.308992][T31718] ? fault_create_debugfs_attr+0x180/0x180 [ 692.314816][T31718] ? page_to_nid.part.0+0x20/0x20 [ 692.319853][T31718] ? ___might_sleep+0x163/0x280 [ 692.326408][T31718] __should_failslab+0x121/0x190 [ 692.332922][T31718] should_failslab+0x9/0x14 [ 692.337433][T31718] __kmalloc+0x2e0/0x770 [ 692.341714][T31718] ? kasan_kmalloc+0x9/0x10 [ 692.346234][T31718] ? kobject_get_path+0xc4/0x1b0 22:24:37 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x1000000000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 692.351190][T31718] kobject_get_path+0xc4/0x1b0 [ 692.355976][T31718] kobject_uevent_env+0x3ab/0x1023 [ 692.361109][T31718] ? __kasan_check_write+0x14/0x20 [ 692.367306][T31718] ? up_write+0x9d/0x280 [ 692.372179][T31718] kobject_uevent+0x20/0x26 [ 692.376694][T31718] loop_set_fd+0xbcc/0x10c0 [ 692.381302][T31718] lo_ioctl+0x1a3/0x1460 [ 692.385551][T31718] ? trace_hardirqs_on+0x67/0x240 [ 692.390584][T31718] ? loop_set_fd+0x10c0/0x10c0 [ 692.395368][T31718] blkdev_ioctl+0xedb/0x1c1a 22:24:37 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0xf0ffffffffffff, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:37 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x100000000000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 692.399965][T31718] ? blkpg_ioctl+0xa90/0xa90 [ 692.404581][T31718] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 692.410401][T31718] ? __kasan_check_read+0x11/0x20 [ 692.415435][T31718] ? __kasan_check_read+0x11/0x20 [ 692.420471][T31718] block_ioctl+0xee/0x130 [ 692.424821][T31718] ? blkdev_fallocate+0x410/0x410 [ 692.429868][T31718] do_vfs_ioctl+0xdb6/0x13e0 [ 692.434558][T31718] ? ioctl_preallocate+0x210/0x210 [ 692.439854][T31718] ? __fget+0x384/0x560 [ 692.444095][T31718] ? ksys_dup3+0x3e0/0x3e0 [ 692.448510][T31718] ? do_sys_open+0x31d/0x5d0 22:24:37 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x200000000000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 692.453117][T31718] ? tomoyo_file_ioctl+0x23/0x30 [ 692.458067][T31718] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 692.465291][T31718] ? security_file_ioctl+0x8d/0xc0 [ 692.470419][T31718] ksys_ioctl+0xab/0xd0 [ 692.475354][T31718] __x64_sys_ioctl+0x73/0xb0 [ 692.480871][T31718] do_syscall_64+0xfd/0x6a0 [ 692.485384][T31718] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 692.491365][T31718] RIP: 0033:0x459697 [ 692.495265][T31718] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 692.514977][T31718] RSP: 002b:00007faa47624a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 692.523403][T31718] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 692.531376][T31718] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 692.539805][T31718] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 692.547765][T31718] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 692.557213][T31718] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 [ 692.589369][T31737] IPVS: ftp: loaded support on port[0] = 21 [ 692.672847][T31746] IPVS: ftp: loaded support on port[0] = 21 22:24:38 executing program 1 (fault-call:0 fault-nth:29): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:38 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x300000000000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:38 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x11}}, 0x30) 22:24:38 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="15030000060040000a000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:38 executing program 3: syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x20400, &(0x7f0000000240)=[{&(0x7f0000000280)="600084e002000a00900cda40ff1af5c97f13", 0x12, 0x400}], 0x0, 0x0) clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000180)="d345a7babc2db515f7718000000053ff07") r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000040)={0x6, 0x80000001, 0x0, {0x77359400}, 0x5, 0x4}) 22:24:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 692.853050][T31764] FAULT_INJECTION: forcing a failure. [ 692.853050][T31764] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 692.866310][T31764] CPU: 1 PID: 31764 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 692.874318][T31764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 692.884568][T31764] Call Trace: [ 692.887884][T31764] dump_stack+0x172/0x1f0 [ 692.892334][T31764] should_fail.cold+0xa/0x15 [ 692.897033][T31764] ? rwlock_bug.part.0+0x90/0x90 22:24:38 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x400000000000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 692.902282][T31764] ? fault_create_debugfs_attr+0x180/0x180 [ 692.908110][T31764] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 692.914374][T31764] ? debug_smp_processor_id+0x3c/0x214 [ 692.919853][T31764] should_fail_alloc_page+0x50/0x60 [ 692.925061][T31764] __alloc_pages_nodemask+0x1a1/0x8f0 [ 692.930714][T31764] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 692.936972][T31764] ? __alloc_pages_slowpath+0x2520/0x2520 [ 692.942712][T31764] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 692.948479][T31764] ? __kasan_check_read+0x11/0x20 22:24:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 692.953529][T31764] ? fault_create_debugfs_attr+0x180/0x180 [ 692.959345][T31764] cache_grow_begin+0x90/0xd20 [ 692.964120][T31764] ? kobject_uevent_env+0x387/0x1023 [ 692.969405][T31764] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 692.975630][T31764] kmem_cache_alloc_trace+0x6b3/0x790 [ 692.981073][T31764] kobject_uevent_env+0x387/0x1023 [ 692.986179][T31764] ? __kasan_check_write+0x14/0x20 [ 692.991298][T31764] ? up_write+0x9d/0x280 [ 692.995551][T31764] kobject_uevent+0x20/0x26 [ 693.000243][T31764] loop_set_fd+0xbcc/0x10c0 [ 693.004756][T31764] lo_ioctl+0x1a3/0x1460 [ 693.009025][T31764] ? trace_hardirqs_on+0x67/0x240 [ 693.014061][T31764] ? loop_set_fd+0x10c0/0x10c0 [ 693.018832][T31764] blkdev_ioctl+0xedb/0x1c1a [ 693.023420][T31764] ? blkpg_ioctl+0xa90/0xa90 [ 693.028023][T31764] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 693.033827][T31764] ? __kasan_check_read+0x11/0x20 [ 693.038835][T31764] ? __kasan_check_read+0x11/0x20 [ 693.044322][T31764] block_ioctl+0xee/0x130 [ 693.048639][T31764] ? blkdev_fallocate+0x410/0x410 [ 693.053661][T31764] do_vfs_ioctl+0xdb6/0x13e0 [ 693.058235][T31764] ? ioctl_preallocate+0x210/0x210 [ 693.063323][T31764] ? __fget+0x384/0x560 [ 693.067477][T31764] ? ksys_dup3+0x3e0/0x3e0 [ 693.071921][T31764] ? do_sys_open+0x31d/0x5d0 [ 693.076510][T31764] ? tomoyo_file_ioctl+0x23/0x30 [ 693.081442][T31764] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 693.087683][T31764] ? security_file_ioctl+0x8d/0xc0 [ 693.092792][T31764] ksys_ioctl+0xab/0xd0 [ 693.096940][T31764] __x64_sys_ioctl+0x73/0xb0 [ 693.101703][T31764] do_syscall_64+0xfd/0x6a0 [ 693.106217][T31764] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 693.112112][T31764] RIP: 0033:0x459697 [ 693.116170][T31764] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 693.135852][T31764] RSP: 002b:00007faa47624a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 693.144769][T31764] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 22:24:38 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000040)={0x0, 0x0, [], @raw_data=[0x10001, 0x4, 0x8, 0x8, 0xffffffffffffffff, 0x1, 0x80000001, 0x7, 0x5, 0x1, 0x7fff, 0xffffffffffffffe1, 0x8, 0xffffffffffff2635, 0x4, 0x9, 0x6, 0x1ff, 0x8, 0x1000, 0x3, 0x91, 0x0, 0x4, 0x5, 0x8, 0xffffffffffffdf50, 0x7, 0x2, 0xfff, 0x4, 0x6]}) clone(0x4100000, 0x0, 0x0, 0x0, &(0x7f0000000380)="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") [ 693.152729][T31764] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 693.160689][T31764] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 693.168747][T31764] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 693.176713][T31764] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:38 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x500000000000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:38 executing program 1 (fault-call:0 fault-nth:30): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:38 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="15030000060040000c000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:38 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x18}}, 0x30) 22:24:38 executing program 3: clone(0x20886100, 0x0, 0x0, 0x0, &(0x7f0000000180)="d345a7babc2db515f7718000000053ff07") r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x200001, 0x0) connect$llc(r0, &(0x7f0000000080)={0x1a, 0x30b, 0x3fc7, 0x8000, 0x40, 0xb24, @broadcast}, 0x10) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000040)={0x80000001, 0x5}, 0x2) 22:24:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:38 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x600000000000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:38 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x700000000000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 693.487162][T31904] FAULT_INJECTION: forcing a failure. [ 693.487162][T31904] name failslab, interval 1, probability 0, space 0, times 0 [ 693.506961][T31904] CPU: 1 PID: 31904 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 693.515005][T31904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 693.525257][T31904] Call Trace: [ 693.528574][T31904] dump_stack+0x172/0x1f0 [ 693.532919][T31904] should_fail.cold+0xa/0x15 22:24:38 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x800000000000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 693.537540][T31904] ? fault_create_debugfs_attr+0x180/0x180 [ 693.543530][T31904] ? page_to_nid.part.0+0x20/0x20 [ 693.548564][T31904] ? ___might_sleep+0x163/0x280 [ 693.553425][T31904] __should_failslab+0x121/0x190 [ 693.558367][T31904] should_failslab+0x9/0x14 [ 693.563010][T31904] __kmalloc+0x2e0/0x770 [ 693.567345][T31904] ? kasan_kmalloc+0x9/0x10 [ 693.571856][T31904] ? kobject_get_path+0xc4/0x1b0 [ 693.576802][T31904] kobject_get_path+0xc4/0x1b0 [ 693.581573][T31904] kobject_uevent_env+0x3ab/0x1023 22:24:38 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x806000000000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 693.586691][T31904] ? __kasan_check_write+0x14/0x20 [ 693.591818][T31904] ? up_write+0x9d/0x280 [ 693.596078][T31904] kobject_uevent+0x20/0x26 [ 693.600582][T31904] loop_set_fd+0xbcc/0x10c0 [ 693.605095][T31904] lo_ioctl+0x1a3/0x1460 [ 693.609346][T31904] ? trace_hardirqs_on+0x67/0x240 [ 693.614392][T31904] ? loop_set_fd+0x10c0/0x10c0 [ 693.619183][T31904] blkdev_ioctl+0xedb/0x1c1a [ 693.623877][T31904] ? blkpg_ioctl+0xa90/0xa90 [ 693.628494][T31904] ? tomoyo_execute_permission+0x4a0/0x4a0 22:24:39 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0xb00000000000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:39 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0xd00000000000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 693.634306][T31904] ? __kasan_check_read+0x11/0x20 [ 693.639343][T31904] ? __kasan_check_read+0x11/0x20 [ 693.644388][T31904] block_ioctl+0xee/0x130 [ 693.648726][T31904] ? blkdev_fallocate+0x410/0x410 [ 693.653770][T31904] do_vfs_ioctl+0xdb6/0x13e0 [ 693.658389][T31904] ? ioctl_preallocate+0x210/0x210 [ 693.663529][T31904] ? __fget+0x384/0x560 [ 693.667689][T31904] ? ksys_dup3+0x3e0/0x3e0 [ 693.672114][T31904] ? do_sys_open+0x31d/0x5d0 [ 693.676706][T31904] ? tomoyo_file_ioctl+0x23/0x30 [ 693.681652][T31904] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 22:24:39 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x2800000000000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 693.687912][T31904] ? security_file_ioctl+0x8d/0xc0 [ 693.693157][T31904] ksys_ioctl+0xab/0xd0 [ 693.697323][T31904] __x64_sys_ioctl+0x73/0xb0 [ 693.701930][T31904] do_syscall_64+0xfd/0x6a0 [ 693.706463][T31904] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 693.712563][T31904] RIP: 0033:0x459697 [ 693.716461][T31904] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 693.736072][T31904] RSP: 002b:00007faa47624a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 693.744513][T31904] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 693.752501][T31904] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 693.760680][T31904] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 693.769184][T31904] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 693.777964][T31904] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:39 executing program 1 (fault-call:0 fault-nth:31): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:39 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="15030000060040000d000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:39 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x3f00000000000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:39 executing program 3: clone(0x1010100, 0x0, 0x0, 0x0, &(0x7f00000000c0)="d345a7babc2db515f7718000000834dd5b09c95c2da597cd5bd4a0e79e022ce89e86dd19f30d5daf121fedf80b88a3438432248225557ef9273a96d965f53b92b924000c6278a2a8337ed4e56b4601759b0726a9c77a3951100589dc776023464eae5f0ad3f599e5d9f9a4b3") 22:24:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:39 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x26}}, 0x30) 22:24:39 executing program 3: clone(0x40004000, 0x0, 0x0, 0x0, &(0x7f0000000180)="d345a7babc2db515f7718000000053ff07") r0 = getgid() mount$9p_virtio(&(0x7f0000000100)='nodevproc%\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x200000, &(0x7f0000000200)={'trans=virtio,', {[{@noextend='noextend'}, {@access_any='access=any'}, {@noextend='noextend'}, {@nodevmap='nodevmap'}, {@dfltgid={'dfltgid', 0x3d, r0}}, {@cache_none='cache=none'}, {@aname={'aname'}}, {@version_L='version=9p2000.L'}]}}) r1 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000000040)={{0x7, 0xfffffffffffffff9, 0xff, 0x5, 0x0, 0x3a0}, 0x8, 0xfff, 0x0, 0x56c2, 0x9, "544bc73297c355b0d78f852dc515665edf9128e53f3b1cbe34f8a1ce15541055f8af52fad16aa518b9c04a3f23e72c6944867cf45b3b3f59bcf876147f52328291760f12a05401b2e515a7e96ab9c9d03b6f55b9c30464c47d5e05f507cf49d4989132adf9df4785cd48a679bc9274ae09490739aa4b6a23ce9d26c0ef039002"}) 22:24:39 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x4000000000000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 694.071980][T32044] FAULT_INJECTION: forcing a failure. [ 694.071980][T32044] name failslab, interval 1, probability 0, space 0, times 0 [ 694.091797][T32044] CPU: 1 PID: 32044 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 694.099809][T32044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 694.109853][T32044] Call Trace: [ 694.113205][T32044] dump_stack+0x172/0x1f0 [ 694.117633][T32044] should_fail.cold+0xa/0x15 [ 694.122234][T32044] ? fault_create_debugfs_attr+0x180/0x180 [ 694.128030][T32044] ? page_to_nid.part.0+0x20/0x20 [ 694.133044][T32044] ? ___might_sleep+0x163/0x280 [ 694.137896][T32044] __should_failslab+0x121/0x190 [ 694.142827][T32044] should_failslab+0x9/0x14 [ 694.147309][T32044] kmem_cache_alloc_node+0x268/0x740 [ 694.152582][T32044] ? netlink_has_listeners+0x23b/0x3f0 [ 694.158023][T32044] ? __kasan_check_read+0x11/0x20 [ 694.163039][T32044] __alloc_skb+0xd5/0x5e0 [ 694.167360][T32044] ? netdev_alloc_frag+0x1b0/0x1b0 [ 694.172456][T32044] ? netlink_has_listeners+0x6e/0x3f0 [ 694.177926][T32044] alloc_uevent_skb+0x83/0x1e2 [ 694.182726][T32044] kobject_uevent_env+0xaa3/0x1023 [ 694.187856][T32044] kobject_uevent+0x20/0x26 [ 694.192388][T32044] loop_set_fd+0xbcc/0x10c0 [ 694.196912][T32044] lo_ioctl+0x1a3/0x1460 [ 694.201382][T32044] ? trace_hardirqs_on+0x67/0x240 [ 694.206409][T32044] ? loop_set_fd+0x10c0/0x10c0 [ 694.211341][T32044] blkdev_ioctl+0xedb/0x1c1a [ 694.215952][T32044] ? blkpg_ioctl+0xa90/0xa90 [ 694.220553][T32044] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 694.226535][T32044] ? __kasan_check_read+0x11/0x20 [ 694.231578][T32044] ? __kasan_check_read+0x11/0x20 [ 694.236724][T32044] block_ioctl+0xee/0x130 [ 694.241036][T32044] ? blkdev_fallocate+0x410/0x410 [ 694.246213][T32044] do_vfs_ioctl+0xdb6/0x13e0 [ 694.251064][T32044] ? ioctl_preallocate+0x210/0x210 [ 694.256256][T32044] ? __fget+0x384/0x560 [ 694.260407][T32044] ? ksys_dup3+0x3e0/0x3e0 [ 694.265131][T32044] ? do_sys_open+0x31d/0x5d0 [ 694.269743][T32044] ? tomoyo_file_ioctl+0x23/0x30 [ 694.274683][T32044] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 694.281183][T32044] ? security_file_ioctl+0x8d/0xc0 [ 694.286292][T32044] ksys_ioctl+0xab/0xd0 [ 694.290543][T32044] __x64_sys_ioctl+0x73/0xb0 [ 694.295146][T32044] do_syscall_64+0xfd/0x6a0 [ 694.299634][T32044] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 694.305640][T32044] RIP: 0033:0x459697 [ 694.309533][T32044] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 694.337809][T32044] RSP: 002b:00007faa47624a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 694.346225][T32044] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 694.354196][T32044] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 694.362190][T32044] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 694.371233][T32044] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 694.379278][T32044] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:39 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x4305000000000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:39 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x60}}, 0x30) [ 694.470131][T32057] IPVS: ftp: loaded support on port[0] = 21 22:24:39 executing program 1 (fault-call:0 fault-nth:32): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:39 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="15030000060040000e000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:40 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x6000000000000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:40 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x800e000000000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 694.689270][T32075] FAULT_INJECTION: forcing a failure. [ 694.689270][T32075] name failslab, interval 1, probability 0, space 0, times 0 [ 694.709529][T32075] CPU: 1 PID: 32075 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 694.717572][T32075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 694.727718][T32075] Call Trace: [ 694.731032][T32075] dump_stack+0x172/0x1f0 22:24:40 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x8035000000000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 694.735385][T32075] should_fail.cold+0xa/0x15 [ 694.739997][T32075] ? fault_create_debugfs_attr+0x180/0x180 [ 694.745834][T32075] ? page_to_nid.part.0+0x20/0x20 [ 694.750958][T32075] ? ___might_sleep+0x163/0x280 [ 694.755853][T32075] __should_failslab+0x121/0x190 [ 694.760795][T32075] should_failslab+0x9/0x14 [ 694.765421][T32075] kmem_cache_alloc_node_trace+0x274/0x750 [ 694.771239][T32075] ? kasan_unpoison_shadow+0x35/0x50 [ 694.776545][T32075] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 694.782379][T32075] __kmalloc_node_track_caller+0x3d/0x70 [ 694.788136][T32075] __kmalloc_reserve.isra.0+0x40/0xf0 [ 694.793535][T32075] __alloc_skb+0x10b/0x5e0 [ 694.798070][T32075] ? netdev_alloc_frag+0x1b0/0x1b0 [ 694.803189][T32075] ? netlink_has_listeners+0x6e/0x3f0 [ 694.808556][T32075] alloc_uevent_skb+0x83/0x1e2 [ 694.813510][T32075] kobject_uevent_env+0xaa3/0x1023 [ 694.818635][T32075] kobject_uevent+0x20/0x26 [ 694.829332][T32075] loop_set_fd+0xbcc/0x10c0 [ 694.834147][T32075] lo_ioctl+0x1a3/0x1460 [ 694.838478][T32075] ? trace_hardirqs_on+0x67/0x240 [ 694.843530][T32075] ? loop_set_fd+0x10c0/0x10c0 [ 694.848477][T32075] blkdev_ioctl+0xedb/0x1c1a [ 694.853072][T32075] ? blkpg_ioctl+0xa90/0xa90 [ 694.857853][T32075] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 694.863737][T32075] ? __kasan_check_read+0x11/0x20 [ 694.868748][T32075] ? __kasan_check_read+0x11/0x20 [ 694.874127][T32075] block_ioctl+0xee/0x130 [ 694.878723][T32075] ? blkdev_fallocate+0x410/0x410 [ 694.883745][T32075] do_vfs_ioctl+0xdb6/0x13e0 [ 694.888459][T32075] ? ioctl_preallocate+0x210/0x210 [ 694.893567][T32075] ? __fget+0x384/0x560 [ 694.897754][T32075] ? ksys_dup3+0x3e0/0x3e0 [ 694.902251][T32075] ? do_sys_open+0x31d/0x5d0 [ 694.906857][T32075] ? tomoyo_file_ioctl+0x23/0x30 [ 694.911816][T32075] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 694.918066][T32075] ? security_file_ioctl+0x8d/0xc0 [ 694.923201][T32075] ksys_ioctl+0xab/0xd0 [ 694.927372][T32075] __x64_sys_ioctl+0x73/0xb0 [ 694.931952][T32075] do_syscall_64+0xfd/0x6a0 [ 694.936445][T32075] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 694.942333][T32075] RIP: 0033:0x459697 [ 694.946219][T32075] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 694.965915][T32075] RSP: 002b:00007faa47624a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 694.974311][T32075] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 694.982276][T32075] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 694.990227][T32075] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 694.998273][T32075] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 695.006232][T32075] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 [ 695.022026][T32057] IPVS: ftp: loaded support on port[0] = 21 22:24:40 executing program 3: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x6000000000000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:40 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x8100000000000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:40 executing program 1 (fault-call:0 fault-nth:33): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:40 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600400011000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:40 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x1a0}}, 0x30) 22:24:40 executing program 3 (fault-call:8 fault-nth:0): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000200)="150300000600400000000200850cf7c41975e697080000026b2a2fcddad8897c6f11876d886b17b07783af113b860f84f789cca7a7659866a63deae307d02f74610000000000000000000000963c8b7fc0", 0x51, 0x0, 0x0, 0x0) recvfrom$inet6(r2, &(0x7f0000000180)=""/71, 0x47, 0x0, 0x0, 0x0) 22:24:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:40 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x86ddffff00000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 695.354195][T32210] FAULT_INJECTION: forcing a failure. [ 695.354195][T32210] name failslab, interval 1, probability 0, space 0, times 0 [ 695.386060][T32210] CPU: 1 PID: 32210 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 695.394134][T32210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 695.404200][T32210] Call Trace: [ 695.407521][T32210] dump_stack+0x172/0x1f0 [ 695.411865][T32210] should_fail.cold+0xa/0x15 [ 695.416466][T32210] ? fault_create_debugfs_attr+0x180/0x180 [ 695.422383][T32210] ? page_to_nid.part.0+0x20/0x20 [ 695.428091][T32210] ? ___might_sleep+0x163/0x280 [ 695.433065][T32210] __should_failslab+0x121/0x190 [ 695.439052][T32210] should_failslab+0x9/0x14 [ 695.443554][T32210] kmem_cache_alloc_node+0x268/0x740 [ 695.448836][T32210] ? netlink_has_listeners+0x23b/0x3f0 [ 695.454319][T32210] ? __kasan_check_read+0x11/0x20 [ 695.459347][T32210] __alloc_skb+0xd5/0x5e0 [ 695.463679][T32210] ? netdev_alloc_frag+0x1b0/0x1b0 [ 695.468836][T32210] ? netlink_has_listeners+0x6e/0x3f0 [ 695.475072][T32210] alloc_uevent_skb+0x83/0x1e2 [ 695.479845][T32210] kobject_uevent_env+0xaa3/0x1023 [ 695.485137][T32210] kobject_uevent+0x20/0x26 [ 695.489638][T32210] loop_set_fd+0xbcc/0x10c0 [ 695.494161][T32210] lo_ioctl+0x1a3/0x1460 [ 695.498402][T32210] ? trace_hardirqs_on+0x67/0x240 [ 695.503430][T32210] ? loop_set_fd+0x10c0/0x10c0 [ 695.508444][T32210] blkdev_ioctl+0xedb/0x1c1a [ 695.513116][T32210] ? blkpg_ioctl+0xa90/0xa90 [ 695.517722][T32210] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 695.523535][T32210] ? __kasan_check_read+0x11/0x20 [ 695.528581][T32210] ? __kasan_check_read+0x11/0x20 [ 695.533609][T32210] block_ioctl+0xee/0x130 [ 695.538036][T32210] ? blkdev_fallocate+0x410/0x410 [ 695.543335][T32210] do_vfs_ioctl+0xdb6/0x13e0 [ 695.548108][T32210] ? ioctl_preallocate+0x210/0x210 [ 695.553221][T32210] ? __fget+0x384/0x560 [ 695.557378][T32210] ? ksys_dup3+0x3e0/0x3e0 [ 695.561793][T32210] ? do_sys_open+0x31d/0x5d0 [ 695.566546][T32210] ? tomoyo_file_ioctl+0x23/0x30 [ 695.571500][T32210] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 695.577748][T32210] ? security_file_ioctl+0x8d/0xc0 [ 695.582911][T32210] ksys_ioctl+0xab/0xd0 [ 695.587076][T32210] __x64_sys_ioctl+0x73/0xb0 [ 695.592113][T32210] do_syscall_64+0xfd/0x6a0 [ 695.596714][T32210] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 695.602704][T32210] RIP: 0033:0x459697 [ 695.606599][T32210] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 695.626296][T32210] RSP: 002b:00007faa47624a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 695.634712][T32210] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000459697 [ 695.642681][T32210] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 695.650653][T32210] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 695.658972][T32210] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 695.666954][T32210] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:41 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="15030000060040002d000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:41 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x1f4}}, 0x30) 22:24:41 executing program 1 (fault-call:0 fault-nth:34): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 695.852168][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 695.858020][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:24:41 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x8847000000000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 695.930758][T32236] FAULT_INJECTION: forcing a failure. [ 695.930758][T32236] name failslab, interval 1, probability 0, space 0, times 0 [ 695.948135][T32236] CPU: 0 PID: 32236 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 695.956143][T32236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 695.966297][T32236] Call Trace: [ 695.970048][T32236] dump_stack+0x172/0x1f0 [ 695.974408][T32236] should_fail.cold+0xa/0x15 [ 695.979025][T32236] ? __kasan_check_read+0x11/0x20 [ 695.984106][T32236] ? fault_create_debugfs_attr+0x180/0x180 [ 695.990456][T32236] ? page_to_nid.part.0+0x20/0x20 [ 695.995679][T32236] ? ___might_sleep+0x163/0x280 [ 696.000548][T32236] __should_failslab+0x121/0x190 [ 696.005483][T32236] should_failslab+0x9/0x14 [ 696.009986][T32236] kmem_cache_alloc+0x2aa/0x710 [ 696.014854][T32236] ? __fget+0x384/0x560 [ 696.019029][T32236] getname_flags+0xd6/0x5b0 [ 696.023636][T32236] do_mkdirat+0xa0/0x2a0 22:24:41 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x8848000000000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:41 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x8864000000000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 696.029860][T32236] ? __ia32_sys_mknod+0xb0/0xb0 [ 696.034731][T32236] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 696.040812][T32236] ? trace_hardirqs_off_caller+0x65/0x230 [ 696.046564][T32236] __x64_sys_mkdir+0x5c/0x80 [ 696.051343][T32236] do_syscall_64+0xfd/0x6a0 [ 696.055864][T32236] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 696.061762][T32236] RIP: 0033:0x458c47 22:24:41 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x88a8ffff00000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 696.065737][T32236] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 696.085356][T32236] RSP: 002b:00007faa47624a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 696.093888][T32236] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c47 [ 696.101964][T32236] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 696.110685][T32236] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 696.118845][T32236] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 696.126821][T32236] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:41 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x88caffff00000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 696.642292][T32232] FAULT_INJECTION: forcing a failure. [ 696.642292][T32232] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 696.655774][T32232] CPU: 0 PID: 32232 Comm: syz-executor.3 Not tainted 5.3.0-rc1+ #84 [ 696.663752][T32232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 696.673797][T32232] Call Trace: [ 696.677091][T32232] dump_stack+0x172/0x1f0 [ 696.681405][T32232] should_fail.cold+0xa/0x15 [ 696.685974][T32232] ? fault_create_debugfs_attr+0x180/0x180 [ 696.691768][T32232] ? __bpf_address_lookup+0x310/0x310 [ 696.697153][T32232] should_fail_alloc_page+0x50/0x60 [ 696.702375][T32232] __alloc_pages_nodemask+0x1a1/0x8f0 [ 696.707746][T32232] ? __unlock_page_memcg+0x53/0x100 [ 696.712939][T32232] ? __alloc_pages_slowpath+0x2520/0x2520 [ 696.718656][T32232] ? task_css.constprop.0+0x120/0x120 [ 696.724018][T32232] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 696.730245][T32232] alloc_pages_current+0x107/0x210 [ 696.735342][T32232] __get_free_pages+0xc/0x40 [ 696.739935][T32232] __tlb_remove_page_size+0x288/0x4a0 [ 696.745374][T32232] unmap_page_range+0xed0/0x2170 [ 696.750298][T32232] ? vm_normal_page_pmd+0x420/0x420 [ 696.755485][T32232] ? __kasan_slab_free+0x102/0x150 [ 696.760577][T32232] ? kasan_slab_free+0xe/0x10 [ 696.765242][T32232] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 696.771578][T32232] ? uprobe_munmap+0xad/0x320 [ 696.776259][T32232] unmap_single_vma+0x19d/0x300 [ 696.781113][T32232] unmap_vmas+0x135/0x280 [ 696.785429][T32232] ? zap_vma_ptes+0x110/0x110 [ 696.790094][T32232] ? __kasan_check_write+0x14/0x20 [ 696.795293][T32232] ? __kasan_check_write+0x14/0x20 [ 696.800409][T32232] exit_mmap+0x2ba/0x530 [ 696.804634][T32232] ? __ia32_sys_munmap+0x80/0x80 [ 696.809558][T32232] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 696.815802][T32232] ? __khugepaged_exit+0xcf/0x410 [ 696.821370][T32232] mmput+0x179/0x4d0 [ 696.826300][T32232] do_exit+0x84e/0x2eb0 [ 696.830684][T32232] ? task_work_run+0x118/0x1c0 [ 696.835437][T32232] ? __kasan_check_read+0x11/0x20 [ 696.840729][T32232] ? mm_update_next_owner+0x640/0x640 [ 696.846677][T32232] ? __kasan_check_write+0x14/0x20 [ 696.852366][T32232] ? lock_downgrade+0x920/0x920 [ 696.857221][T32232] ? rwlock_bug.part.0+0x90/0x90 [ 696.862262][T32232] ? get_signal+0x20e/0x2500 [ 696.866846][T32232] do_group_exit+0x135/0x360 [ 696.871425][T32232] get_signal+0x47c/0x2500 [ 696.875943][T32232] ? fput+0x1b/0x20 [ 696.879757][T32232] ? __sys_recvfrom+0x28b/0x350 [ 696.884594][T32232] do_signal+0x87/0x1700 [ 696.888818][T32232] ? setup_sigcontext+0x7d0/0x7d0 [ 696.894278][T32232] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 696.900541][T32232] ? fput_many+0x12c/0x1a0 [ 696.904946][T32232] ? ksys_write+0x1cf/0x290 [ 696.909437][T32232] ? __ia32_sys_read+0xb0/0xb0 [ 696.914201][T32232] ? trace_hardirqs_on+0x67/0x240 [ 696.919245][T32232] exit_to_usermode_loop+0x286/0x380 [ 696.924623][T32232] do_syscall_64+0x5a9/0x6a0 [ 696.929292][T32232] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 696.935172][T32232] RIP: 0033:0x459829 [ 696.939053][T32232] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 696.958648][T32232] RSP: 002b:00007fd4c49fac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002d [ 696.967148][T32232] RAX: fffffffffffffe00 RBX: 00007fd4c49fac90 RCX: 0000000000459829 [ 696.975140][T32232] RDX: 0000000000000047 RSI: 0000000020000180 RDI: 0000000000000004 [ 696.983103][T32232] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 22:24:42 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000200)="150300000600400000000200850cf7c41975e697080000026b2a2fcddad8897c6f11876d886b17b07783af113b860f84f789cca7a7659866a63deae307d02f74610000000000000000000000963c8b7fc0", 0x51, 0x0, 0x0, 0x0) recvfrom$inet6(r2, &(0x7f0000000180)=""/71, 0x47, 0x0, 0x0, 0x0) 22:24:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:42 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600400032000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:42 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x8906000000000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:42 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x3e8}}, 0x30) 22:24:42 executing program 1 (fault-call:0 fault-nth:35): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 696.991062][T32232] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd4c49fb6d4 [ 696.999017][T32232] R13: 00000000004c6cce R14: 00000000004dbf78 R15: 0000000000000006 22:24:42 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x8dffffff00000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 697.094891][T32272] FAULT_INJECTION: forcing a failure. [ 697.094891][T32272] name failslab, interval 1, probability 0, space 0, times 0 [ 697.126586][T32272] CPU: 0 PID: 32272 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 697.134616][T32272] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 697.144671][T32272] Call Trace: [ 697.148061][T32272] dump_stack+0x172/0x1f0 [ 697.152404][T32272] should_fail.cold+0xa/0x15 [ 697.157012][T32272] ? lock_downgrade+0x920/0x920 [ 697.161901][T32272] ? fault_create_debugfs_attr+0x180/0x180 [ 697.167729][T32272] ? ___might_sleep+0x163/0x280 [ 697.172597][T32272] __should_failslab+0x121/0x190 [ 697.177543][T32272] should_failslab+0x9/0x14 [ 697.182046][T32272] __kmalloc+0x2e0/0x770 [ 697.186296][T32272] ? __getblk_gfp+0x5c/0xa10 22:24:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 697.190903][T32272] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 697.196622][T32272] ? ext4_find_extent+0x76e/0x9d0 [ 697.201653][T32272] ext4_find_extent+0x76e/0x9d0 [ 697.206595][T32272] ? ___might_sleep+0x163/0x280 [ 697.211539][T32272] ext4_ext_map_blocks+0x1dc/0x5040 [ 697.216741][T32272] ? __kasan_check_read+0x11/0x20 [ 697.221780][T32272] ? ext4_ext_release+0x10/0x10 [ 697.226642][T32272] ? __kasan_check_write+0x14/0x20 [ 697.231771][T32272] ? down_read+0x10a/0x3f0 [ 697.236198][T32272] ? down_read_killable+0x460/0x460 22:24:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:42 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0xf5ffffff00000000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 697.241407][T32272] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 697.247648][T32272] ? ext4_es_lookup_extent+0x3fd/0xbf0 [ 697.253214][T32272] ext4_map_blocks+0xdc5/0x17f0 [ 697.258086][T32272] ? ext4_issue_zeroout+0x190/0x190 [ 697.263298][T32272] ? ext4_set_acl+0x4f0/0x4f0 [ 697.267998][T32272] ? __kasan_check_write+0x14/0x20 [ 697.273118][T32272] ext4_getblk+0xc4/0x570 [ 697.277447][T32272] ? ext4_iomap_begin+0x1000/0x1000 [ 697.282656][T32272] ext4_bread+0x93/0x270 [ 697.286899][T32272] ? ext4_getblk+0x570/0x570 [ 697.291511][T32272] ext4_append+0x155/0x370 [ 697.295941][T32272] ext4_mkdir+0x632/0xe20 [ 697.300284][T32272] ? ext4_init_dot_dotdot+0x520/0x520 [ 697.305668][T32272] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 697.311919][T32272] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 697.318168][T32272] ? security_inode_permission+0xcb/0x100 [ 697.323913][T32272] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 697.330162][T32272] ? security_inode_mkdir+0xe4/0x120 [ 697.335463][T32272] vfs_mkdir+0x42e/0x670 [ 697.339811][T32272] do_mkdirat+0x234/0x2a0 22:24:42 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0xffffffffa0010000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 697.344151][T32272] ? __ia32_sys_mknod+0xb0/0xb0 [ 697.349181][T32272] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 697.355258][T32272] ? trace_hardirqs_off_caller+0x65/0x230 [ 697.361012][T32272] __x64_sys_mkdir+0x5c/0x80 [ 697.365629][T32272] do_syscall_64+0xfd/0x6a0 [ 697.370145][T32272] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 697.376039][T32272] RIP: 0033:0x458c47 22:24:42 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0xfffffffffffff000, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 697.379965][T32272] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 697.399616][T32272] RSP: 002b:00007faa47624a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 697.408144][T32272] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c47 [ 697.416132][T32272] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 697.424214][T32272] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 697.432372][T32272] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 697.440652][T32272] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:43 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000200)="150300000600400000000200850cf7c41975e697080000026b2a2fcddad8897c6f11876d886b17b07783af113b860f84f789cca7a7659866a63deae307d02f74610000000000000000000000963c8b7fc0", 0x51, 0x0, 0x0, 0x0) recvfrom$inet6(r2, &(0x7f0000000180)=""/71, 0x200001c7, 0x0, 0x0, 0x0) 22:24:43 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x2, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:43 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600400038000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:43 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x500}}, 0x30) 22:24:43 executing program 1 (fault-call:0 fault-nth:36): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 698.026535][T32313] FAULT_INJECTION: forcing a failure. [ 698.026535][T32313] name failslab, interval 1, probability 0, space 0, times 0 22:24:43 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x3, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 698.067360][T32313] CPU: 1 PID: 32313 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 698.075579][T32313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 698.085640][T32313] Call Trace: [ 698.088953][T32313] dump_stack+0x172/0x1f0 [ 698.093315][T32313] should_fail.cold+0xa/0x15 [ 698.097962][T32313] ? fault_create_debugfs_attr+0x180/0x180 [ 698.103786][T32313] ? __kernel_text_address+0xd/0x40 [ 698.109028][T32313] ? unwind_get_return_address+0x61/0xa0 22:24:43 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x4, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:43 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x5, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 698.114672][T32313] ? profile_setup.cold+0xbb/0xbb [ 698.119704][T32313] ? ___might_sleep+0x163/0x280 [ 698.124567][T32313] __should_failslab+0x121/0x190 [ 698.129532][T32313] should_failslab+0x9/0x14 [ 698.134128][T32313] __kmalloc+0x2e0/0x770 [ 698.138381][T32313] ? mark_held_locks+0xf0/0xf0 [ 698.143155][T32313] ? stack_trace_save+0xac/0xe0 [ 698.148016][T32313] ? stack_trace_consume_entry+0x190/0x190 [ 698.153833][T32313] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 698.159647][T32313] tomoyo_realpath_from_path+0xcd/0x7b0 22:24:43 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x7, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 698.165214][T32313] ? tomoyo_path_number_perm+0x193/0x520 [ 698.170872][T32313] tomoyo_path_number_perm+0x1dd/0x520 [ 698.176351][T32313] ? tomoyo_path_number_perm+0x193/0x520 [ 698.181998][T32313] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 698.187820][T32313] ? __kasan_check_write+0x14/0x20 [ 698.192973][T32313] ? quarantine_put+0x11c/0x1c0 [ 698.197831][T32313] ? trace_hardirqs_on+0x67/0x240 [ 698.203046][T32313] ? putname+0xef/0x130 [ 698.207220][T32313] ? kmem_cache_free+0x1a7/0x320 [ 698.212345][T32313] tomoyo_path_mkdir+0xaa/0xf0 22:24:43 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0xb, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 698.217120][T32313] ? tomoyo_file_ioctl+0x30/0x30 [ 698.222231][T32313] ? kern_path_mountpoint+0x40/0x40 [ 698.227441][T32313] ? strncpy_from_user+0x2b4/0x400 [ 698.232562][T32313] security_path_mkdir+0x113/0x170 [ 698.237707][T32313] do_mkdirat+0x160/0x2a0 [ 698.242053][T32313] ? __ia32_sys_mknod+0xb0/0xb0 [ 698.246917][T32313] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 698.253007][T32313] ? trace_hardirqs_off_caller+0x65/0x230 [ 698.258738][T32313] __x64_sys_mkdir+0x5c/0x80 [ 698.263345][T32313] do_syscall_64+0xfd/0x6a0 22:24:43 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x5f, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 698.267867][T32313] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 698.273773][T32313] RIP: 0033:0x458c47 [ 698.277673][T32313] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 698.297300][T32313] RSP: 002b:00007faa47624a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 698.305817][T32313] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c47 [ 698.313991][T32313] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 698.322003][T32313] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 698.330085][T32313] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 698.338109][T32313] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 [ 698.355343][T32313] ERROR: Out of memory at tomoyo_realpath_from_path. 22:24:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:44 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "03290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:44 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x543}}, 0x30) 22:24:44 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1, 0x1, 0x100, 0x6, @remote}, 0x14) r2 = dup(r0) ioctl$BINDER_THREAD_EXIT(r2, 0x40046208, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$VT_RELDISP(r2, 0x5605) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f00000000c0)={0x98, 0x5, 0x0, 0x5, 0x87, 0x6}) sendto$inet6(r2, &(0x7f0000000200)="150300000600400000000200850cf7c41975e697080000026b2a2fcddad8897c6f11876d886b17b07783af113b860f84f789cca7a7659866a63deae307d02f74610000000000000000000000963c8b7fc0", 0x51, 0x0, 0x0, 0x0) recvfrom$inet6(r2, &(0x7f0000000180)=""/71, 0x47, 0x0, 0x0, 0x0) 22:24:44 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600400039000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:44 executing program 1 (fault-call:0 fault-nth:37): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 699.026128][T32450] FAULT_INJECTION: forcing a failure. [ 699.026128][T32450] name failslab, interval 1, probability 0, space 0, times 0 [ 699.039003][T32450] CPU: 1 PID: 32450 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 699.047005][T32450] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 699.057065][T32450] Call Trace: [ 699.060368][T32450] dump_stack+0x172/0x1f0 [ 699.064740][T32450] should_fail.cold+0xa/0x15 [ 699.069366][T32450] ? fault_create_debugfs_attr+0x180/0x180 22:24:44 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "05290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 699.075188][T32450] ? __es_tree_search.isra.0+0x1bf/0x230 [ 699.080825][T32450] ? save_stack+0x5c/0x90 [ 699.085175][T32450] __should_failslab+0x121/0x190 [ 699.090117][T32450] should_failslab+0x9/0x14 [ 699.094711][T32450] kmem_cache_alloc+0x47/0x710 [ 699.099471][T32450] ? __es_shrink+0xad0/0xad0 [ 699.104119][T32450] ? do_raw_write_lock+0x124/0x290 [ 699.109237][T32450] __es_insert_extent+0x2cc/0xf20 [ 699.114270][T32450] ext4_es_insert_extent+0x2d0/0xa70 [ 699.119555][T32450] ? ext4_es_scan_clu+0x50/0x50 [ 699.124400][T32450] ? __es_find_extent_range+0x361/0x490 [ 699.129944][T32450] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 699.136183][T32450] ? ext4_es_find_extent_range+0x131/0x660 [ 699.141984][T32450] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 699.147532][T32450] ? ext4_rereserve_cluster+0x240/0x240 [ 699.153070][T32450] ? ext4_find_extent+0x76e/0x9d0 [ 699.158175][T32450] ? ext4_find_extent+0x6a6/0x9d0 [ 699.163198][T32450] ext4_ext_map_blocks+0x20c4/0x5040 [ 699.168479][T32450] ? ext4_ext_release+0x10/0x10 [ 699.173335][T32450] ? __kasan_check_write+0x14/0x20 [ 699.178458][T32450] ? down_read+0x10a/0x3f0 [ 699.182877][T32450] ? down_read_killable+0x460/0x460 [ 699.188260][T32450] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 699.194499][T32450] ? ext4_es_lookup_extent+0x3fd/0xbf0 [ 699.199962][T32450] ext4_map_blocks+0xdc5/0x17f0 [ 699.204831][T32450] ? ext4_issue_zeroout+0x190/0x190 [ 699.210040][T32450] ? ext4_set_acl+0x4f0/0x4f0 [ 699.214724][T32450] ? __kasan_check_write+0x14/0x20 [ 699.219834][T32450] ext4_getblk+0xc4/0x570 [ 699.224161][T32450] ? ext4_iomap_begin+0x1000/0x1000 [ 699.229375][T32450] ext4_bread+0x93/0x270 [ 699.233617][T32450] ? ext4_getblk+0x570/0x570 [ 699.238207][T32450] ext4_append+0x155/0x370 [ 699.242621][T32450] ext4_mkdir+0x632/0xe20 [ 699.246951][T32450] ? ext4_init_dot_dotdot+0x520/0x520 [ 699.252319][T32450] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 699.258559][T32450] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 699.264887][T32450] ? security_inode_permission+0xcb/0x100 [ 699.270603][T32450] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 699.276845][T32450] ? security_inode_mkdir+0xe4/0x120 [ 699.282138][T32450] vfs_mkdir+0x42e/0x670 [ 699.286391][T32450] do_mkdirat+0x234/0x2a0 [ 699.290717][T32450] ? __ia32_sys_mknod+0xb0/0xb0 [ 699.295574][T32450] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 699.301642][T32450] ? trace_hardirqs_off_caller+0x65/0x230 [ 699.307365][T32450] __x64_sys_mkdir+0x5c/0x80 [ 699.311961][T32450] do_syscall_64+0xfd/0x6a0 [ 699.316461][T32450] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 699.322347][T32450] RIP: 0033:0x458c47 [ 699.326245][T32450] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 699.345851][T32450] RSP: 002b:00007faa47624a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 699.354276][T32450] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c47 [ 699.362349][T32450] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 22:24:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 699.370333][T32450] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 699.378310][T32450] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 699.386286][T32450] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:44 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "06290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:44 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "07290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:44 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="15030000060040003f000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:44 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x608}}, 0x30) 22:24:45 executing program 1 (fault-call:0 fault-nth:38): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 699.697186][T32484] FAULT_INJECTION: forcing a failure. [ 699.697186][T32484] name failslab, interval 1, probability 0, space 0, times 0 [ 699.710943][T32484] CPU: 1 PID: 32484 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 699.718942][T32484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 699.729009][T32484] Call Trace: [ 699.732327][T32484] dump_stack+0x172/0x1f0 [ 699.736712][T32484] should_fail.cold+0xa/0x15 [ 699.741326][T32484] ? fault_create_debugfs_attr+0x180/0x180 [ 699.747151][T32484] ? __kernel_text_address+0xd/0x40 [ 699.752540][T32484] ? unwind_get_return_address+0x61/0xa0 [ 699.758191][T32484] ? profile_setup.cold+0xbb/0xbb [ 699.763238][T32484] ? ___might_sleep+0x163/0x280 [ 699.768131][T32484] __should_failslab+0x121/0x190 [ 699.773087][T32484] should_failslab+0x9/0x14 [ 699.777601][T32484] __kmalloc+0x2e0/0x770 [ 699.781844][T32484] ? mark_held_locks+0xf0/0xf0 [ 699.786606][T32484] ? stack_trace_save+0xac/0xe0 [ 699.786618][T32484] ? stack_trace_consume_entry+0x190/0x190 [ 699.786631][T32484] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 699.786644][T32484] tomoyo_realpath_from_path+0xcd/0x7b0 [ 699.786660][T32484] ? tomoyo_path_number_perm+0x193/0x520 [ 699.786677][T32484] tomoyo_path_number_perm+0x1dd/0x520 [ 699.786691][T32484] ? tomoyo_path_number_perm+0x193/0x520 [ 699.786707][T32484] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 699.786730][T32484] ? __kasan_check_write+0x14/0x20 [ 699.837941][T32484] ? quarantine_put+0x11c/0x1c0 [ 699.843110][T32484] ? trace_hardirqs_on+0x67/0x240 [ 699.848309][T32484] ? putname+0xef/0x130 [ 699.852621][T32484] ? kmem_cache_free+0x1a7/0x320 [ 699.857865][T32484] tomoyo_path_mkdir+0xaa/0xf0 [ 699.862830][T32484] ? tomoyo_file_ioctl+0x30/0x30 [ 699.868567][T32484] ? kern_path_mountpoint+0x40/0x40 [ 699.873771][T32484] ? strncpy_from_user+0x2b4/0x400 [ 699.878888][T32484] security_path_mkdir+0x113/0x170 [ 699.884021][T32484] do_mkdirat+0x160/0x2a0 [ 699.888333][T32484] ? __ia32_sys_mknod+0xb0/0xb0 [ 699.893357][T32484] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 699.899446][T32484] ? trace_hardirqs_off_caller+0x65/0x230 [ 699.905170][T32484] __x64_sys_mkdir+0x5c/0x80 [ 699.909746][T32484] do_syscall_64+0xfd/0x6a0 [ 699.914256][T32484] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 699.925393][T32484] RIP: 0033:0x458c47 [ 699.931104][T32484] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 699.951049][T32484] RSP: 002b:00007faa47624a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 699.959467][T32484] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c47 [ 699.967537][T32484] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 699.975524][T32484] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 699.983569][T32484] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 699.991958][T32484] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 [ 700.000698][T32484] ERROR: Out of memory at tomoyo_realpath_from_path. 22:24:45 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) socket$alg(0x26, 0x5, 0x0) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000200)="150300000600400000000200850cf7c41975e697080000026b2a2fcddad8897c6f11876d886b17b07783af113b860f84f789cca7a7659866a63deae307d02f74610000000000000000000000963c8b7fc0", 0x51, 0x0, 0x0, 0x0) recvfrom$inet6(r2, &(0x7f0000000180)=""/71, 0x47, 0x0, 0x0, 0x0) 22:24:45 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "0b290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:45 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600400040000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:45 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x689}}, 0x30) 22:24:45 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "020b0f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:45 executing program 1 (fault-call:0 fault-nth:39): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 700.300381][T32616] FAULT_INJECTION: forcing a failure. [ 700.300381][T32616] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 700.313634][T32616] CPU: 1 PID: 32616 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 700.321698][T32616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 700.331763][T32616] Call Trace: [ 700.335079][T32616] dump_stack+0x172/0x1f0 [ 700.339422][T32616] should_fail.cold+0xa/0x15 [ 700.344021][T32616] ? fault_create_debugfs_attr+0x180/0x180 [ 700.350355][T32616] ? is_bpf_text_address+0xac/0x170 [ 700.355937][T32616] ? __kasan_check_read+0x11/0x20 [ 700.360972][T32616] should_fail_alloc_page+0x50/0x60 [ 700.366954][T32616] __alloc_pages_nodemask+0x1a1/0x8f0 [ 700.372332][T32616] ? __bpf_address_lookup+0x310/0x310 [ 700.377716][T32616] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 700.391024][T32616] ? __alloc_pages_slowpath+0x2520/0x2520 [ 700.396910][T32616] ? fault_create_debugfs_attr+0x180/0x180 [ 700.402816][T32616] ? __kernel_text_address+0xd/0x40 [ 700.408039][T32616] cache_grow_begin+0x90/0xd20 [ 700.412786][T32616] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 700.424399][T32616] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 700.430661][T32616] __kmalloc+0x6b2/0x770 [ 700.434896][T32616] ? mark_held_locks+0xf0/0xf0 [ 700.439646][T32616] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 700.445376][T32616] tomoyo_realpath_from_path+0xcd/0x7b0 [ 700.450934][T32616] ? tomoyo_path_number_perm+0x193/0x520 [ 700.456553][T32616] tomoyo_path_number_perm+0x1dd/0x520 [ 700.462026][T32616] ? tomoyo_path_number_perm+0x193/0x520 [ 700.467651][T32616] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 700.473469][T32616] ? __kasan_check_write+0x14/0x20 [ 700.478592][T32616] ? quarantine_put+0x11c/0x1c0 [ 700.484256][T32616] ? trace_hardirqs_on+0x67/0x240 [ 700.489309][T32616] ? putname+0xef/0x130 [ 700.493449][T32616] ? kmem_cache_free+0x1a7/0x320 [ 700.498372][T32616] tomoyo_path_mkdir+0xaa/0xf0 [ 700.503135][T32616] ? tomoyo_file_ioctl+0x30/0x30 [ 700.508087][T32616] ? kern_path_mountpoint+0x40/0x40 [ 700.513280][T32616] ? strncpy_from_user+0x2b4/0x400 [ 700.518377][T32616] security_path_mkdir+0x113/0x170 [ 700.523485][T32616] do_mkdirat+0x160/0x2a0 [ 700.527814][T32616] ? __ia32_sys_mknod+0xb0/0xb0 [ 700.532643][T32616] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 700.538688][T32616] ? trace_hardirqs_off_caller+0x65/0x230 [ 700.544404][T32616] __x64_sys_mkdir+0x5c/0x80 [ 700.549002][T32616] do_syscall_64+0xfd/0x6a0 [ 700.553506][T32616] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 700.559375][T32616] RIP: 0033:0x458c47 [ 700.563262][T32616] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 700.582870][T32616] RSP: 002b:00007faa47624a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 700.591280][T32616] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c47 22:24:46 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290b", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 700.599258][T32616] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 700.607357][T32616] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 700.615324][T32616] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 700.623288][T32616] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:46 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x3, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:46 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$SG_NEXT_CMD_LEN(r2, 0x2283, &(0x7f0000000080)=0x31) perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCX25SCUDMATCHLEN(r2, 0x89e7, &(0x7f00000000c0)={0x7e}) sendto$inet6(r2, &(0x7f0000000200)="150300000600400000000200850cf7c41975e697080000026b2a2fcddad8897c6f11876d886b17b07783af113b860f84f789cca7a7659866a63deae307d02f74610000000000000000000000963c8b7fc0", 0x51, 0x0, 0x0, 0x0) recvfrom$inet6(r2, &(0x7f0000000180)=""/71, 0x47, 0x0, 0x0, 0x0) 22:24:46 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600400042000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:46 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x7, 0x3a, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:46 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x806}}, 0x30) 22:24:46 executing program 1 (fault-call:0 fault-nth:40): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:46 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x2, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c0000001900010200090000000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) [ 700.951990][T32652] FAULT_INJECTION: forcing a failure. [ 700.951990][T32652] name failslab, interval 1, probability 0, space 0, times 0 [ 700.966219][T32652] CPU: 0 PID: 32652 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 700.975294][T32652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 700.985395][T32652] Call Trace: 22:24:46 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x4, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 700.992280][T32652] dump_stack+0x172/0x1f0 [ 701.031915][T32652] should_fail.cold+0xa/0x15 [ 701.036568][T32652] ? fault_create_debugfs_attr+0x180/0x180 22:24:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 701.044086][T32652] ? lock_downgrade+0x920/0x920 [ 701.071760][T32652] ? ___might_sleep+0x163/0x280 [ 701.076733][T32652] __should_failslab+0x121/0x190 [ 701.082062][T32652] should_failslab+0x9/0x14 22:24:46 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x6, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 701.086596][T32652] kmem_cache_alloc+0x2aa/0x710 22:24:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 701.119331][T32652] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 701.157750][T32652] ? __mark_inode_dirty+0x3d1/0x1390 [ 701.173359][T32652] ext4_mb_new_blocks+0x5b9/0x3870 [ 701.178605][T32652] ? quarantine_put+0x11c/0x1c0 [ 701.183524][T32652] ? ext4_find_extent+0x76e/0x9d0 22:24:46 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x11, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 701.197220][T32652] ext4_ext_map_blocks+0x2b34/0x5040 [ 701.225633][T32652] ? ext4_ext_release+0x10/0x10 [ 701.230779][T32652] ? lock_acquire+0x190/0x410 [ 701.249964][T32652] ? ext4_map_blocks+0x4b1/0x17f0 [ 701.256523][T32652] ? ext4_es_lookup_extent+0x3fd/0xbf0 [ 701.262109][T32652] ext4_map_blocks+0x529/0x17f0 [ 701.267557][T32652] ? ext4_issue_zeroout+0x190/0x190 [ 701.274791][T32652] ? ext4_set_acl+0x4f0/0x4f0 [ 701.281020][T32652] ? __kasan_check_write+0x14/0x20 [ 701.292158][T32652] ext4_getblk+0xc4/0x570 [ 701.301281][T32652] ? ext4_iomap_begin+0x1000/0x1000 [ 701.313135][T32652] ext4_bread+0x93/0x270 [ 701.320997][T32652] ? ext4_getblk+0x570/0x570 [ 701.326461][T32652] ext4_append+0x155/0x370 [ 701.331691][T32652] ext4_mkdir+0x632/0xe20 [ 701.343678][T32652] ? ext4_init_dot_dotdot+0x520/0x520 [ 701.350200][T32652] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 701.367861][T32652] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 701.379014][T32652] ? security_inode_permission+0xcb/0x100 [ 701.393605][T32652] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 701.416029][T32652] ? security_inode_mkdir+0xe4/0x120 [ 701.425568][T32652] vfs_mkdir+0x42e/0x670 [ 701.440403][T32652] do_mkdirat+0x234/0x2a0 [ 701.446902][T32652] ? __ia32_sys_mknod+0xb0/0xb0 [ 701.454424][T32652] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 701.462244][T32652] ? trace_hardirqs_off_caller+0x65/0x230 [ 701.469470][T32652] __x64_sys_mkdir+0x5c/0x80 [ 701.475061][T32652] do_syscall_64+0xfd/0x6a0 [ 701.480035][T32652] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 701.487860][T32652] RIP: 0033:0x458c47 [ 701.492430][T32652] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 701.523479][T32652] RSP: 002b:00007faa47624a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 701.532981][T32652] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c47 [ 701.541202][T32652] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 701.549209][T32652] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 701.557441][T32652] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 701.565685][T32652] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:47 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) openat$vhci(0xffffffffffffff9c, 0xffffffffffffffff, 0x20000) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$RTC_AIE_OFF(r2, 0x7002) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) sendto$inet6(r2, &(0x7f0000000200)="150300000600400000000200850cf7c41975e697080000026b2a2fcddad8897c6f11876d886b17b07783af113b860f84f789cca7a7659866a63deae307d02f74610000000000000000000000963c8b7fc0", 0x51, 0x0, 0x0, 0x0) recvfrom$inet6(r2, &(0x7f0000000180)=""/71, 0x47, 0x0, 0x0, 0x0) chmod(&(0x7f0000000280)='./file0\x00', 0x9cb5648acf0ffec7) signalfd(r2, &(0x7f0000000100)={0x5c00000000}, 0x8) 22:24:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c00000019000102000c0000000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) 22:24:47 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0xa00}}, 0x30) 22:24:47 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x21, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:47 executing program 1 (fault-call:0 fault-nth:41): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:47 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="1503000006004003e8000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) [ 701.729728][ T318] dccp_invalid_packet: P.Data Offset(0) too small [ 701.761030][ T320] FAULT_INJECTION: forcing a failure. 22:24:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 701.761030][ T320] name failslab, interval 1, probability 0, space 0, times 0 [ 701.782163][ T318] dccp_invalid_packet: P.Data Offset(0) too small [ 701.842949][ T320] CPU: 0 PID: 320 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 701.867251][ T320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 701.888277][ T320] Call Trace: [ 701.893263][ T320] dump_stack+0x172/0x1f0 [ 701.899288][ T320] should_fail.cold+0xa/0x15 [ 701.905012][ T320] ? fault_create_debugfs_attr+0x180/0x180 [ 701.914856][ T320] ? __kasan_check_write+0x14/0x20 [ 701.928942][ T320] ? ___might_sleep+0x163/0x280 22:24:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:47 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x29, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 701.942096][ T320] __should_failslab+0x121/0x190 [ 701.949512][ T320] should_failslab+0x9/0x14 [ 701.954718][ T320] __kmalloc+0x2e0/0x770 [ 701.959033][ T320] ? quarantine_put+0x11c/0x1c0 [ 701.964370][ T320] ? ext4_find_extent+0x76e/0x9d0 [ 701.972056][ T320] ext4_find_extent+0x76e/0x9d0 22:24:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 701.990529][ T320] ? ext4_ext_map_blocks+0x910/0x5040 [ 701.997213][ T320] ext4_ext_map_blocks+0x1dc/0x5040 [ 702.005431][ T320] ? ext4_map_blocks+0xda6/0x17f0 [ 702.010663][ T320] ? mark_held_locks+0xf0/0xf0 [ 702.017906][ T320] ? ext4_ext_release+0x10/0x10 [ 702.026099][ T320] ? lock_acquire+0x190/0x410 [ 702.032672][ T320] ? ext4_map_blocks+0x4b1/0x17f0 [ 702.038439][ T320] ? __kasan_check_write+0x14/0x20 [ 702.044977][ T320] ? down_write+0xdf/0x150 [ 702.062631][ T320] ? __down_timeout+0x2d0/0x2d0 [ 702.068739][ T320] ? ext4_es_lookup_extent+0x3fd/0xbf0 [ 702.074238][ T320] ext4_map_blocks+0x529/0x17f0 [ 702.079145][ T320] ? ext4_issue_zeroout+0x190/0x190 [ 702.084364][ T320] ? ext4_set_acl+0x4f0/0x4f0 [ 702.089069][ T320] ? __kasan_check_write+0x14/0x20 22:24:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 702.094196][ T320] ext4_getblk+0xc4/0x570 [ 702.098543][ T320] ? ext4_iomap_begin+0x1000/0x1000 [ 702.103770][ T320] ext4_bread+0x93/0x270 [ 702.108041][ T320] ? ext4_getblk+0x570/0x570 [ 702.112659][ T320] ext4_append+0x155/0x370 [ 702.117106][ T320] ext4_mkdir+0x632/0xe20 [ 702.121452][ T320] ? ext4_init_dot_dotdot+0x520/0x520 [ 702.126970][ T320] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 702.133232][ T320] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 702.139573][ T320] ? security_inode_permission+0xcb/0x100 [ 702.145304][ T320] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 702.145317][ T320] ? security_inode_mkdir+0xe4/0x120 [ 702.145336][ T320] vfs_mkdir+0x42e/0x670 [ 702.145360][ T320] do_mkdirat+0x234/0x2a0 [ 702.165437][ T320] ? __ia32_sys_mknod+0xb0/0xb0 [ 702.170304][ T320] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 702.176415][ T320] ? trace_hardirqs_off_caller+0x65/0x230 [ 702.182165][ T320] __x64_sys_mkdir+0x5c/0x80 [ 702.186770][ T320] do_syscall_64+0xfd/0x6a0 [ 702.191274][ T320] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 702.197147][ T320] RIP: 0033:0x458c47 [ 702.201024][ T320] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 702.220975][ T320] RSP: 002b:00007faa47624a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 702.229630][ T320] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c47 [ 702.237600][ T320] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 702.245666][ T320] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 702.253636][ T320] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 702.261716][ T320] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:47 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) setsockopt$packet_buf(r0, 0x107, 0x1f, &(0x7f0000000080)="42e9ec4a62650fd6f9c0bb89811f90a2790cc5c73435bd91", 0x18) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000200)="150300000600400000000200850cf7c41975e697080000026b2a2fcddad8897c6f11876d886b17b07783af113b860f84f789cca7a7659866a63deae307d02f74610000000000000000000000963c8b7fc0", 0x51, 0x0, 0x0, 0x0) recvfrom$inet6(r2, &(0x7f0000000180)=""/71, 0x47, 0x0, 0x0, 0x0) 22:24:47 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x2b, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:47 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0xe00}}, 0x30) 22:24:47 executing program 1 (fault-call:0 fault-nth:42): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:47 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="1503000006004001f4000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) [ 702.473489][ T462] FAULT_INJECTION: forcing a failure. [ 702.473489][ T462] name failslab, interval 1, probability 0, space 0, times 0 [ 702.519120][ T462] CPU: 0 PID: 462 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 702.527327][ T462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 702.537389][ T462] Call Trace: [ 702.540707][ T462] dump_stack+0x172/0x1f0 [ 702.545070][ T462] should_fail.cold+0xa/0x15 [ 702.549677][ T462] ? fault_create_debugfs_attr+0x180/0x180 [ 702.555499][ T462] ? __kasan_check_write+0x14/0x20 [ 702.560621][ T462] ? ___might_sleep+0x163/0x280 [ 702.565495][ T462] __should_failslab+0x121/0x190 [ 702.570453][ T462] ? ratelimit_state_init+0xb0/0xb0 [ 702.575667][ T462] should_failslab+0x9/0x14 [ 702.580279][ T462] kmem_cache_alloc+0x2aa/0x710 [ 702.585151][ T462] ? __kasan_check_read+0x11/0x20 [ 702.590189][ T462] ? ratelimit_state_init+0xb0/0xb0 [ 702.595392][ T462] ext4_alloc_inode+0x1f/0x640 [ 702.600142][ T462] ? ratelimit_state_init+0xb0/0xb0 [ 702.605323][ T462] alloc_inode+0x68/0x1e0 [ 702.609636][ T462] new_inode_pseudo+0x19/0xf0 [ 702.614312][ T462] new_inode+0x1f/0x40 [ 702.618362][ T462] __ext4_new_inode+0x3d5/0x4e50 [ 702.623310][ T462] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 702.629536][ T462] ? __dquot_initialize+0x525/0xd80 [ 702.634737][ T462] ? ext4_free_inode+0x1490/0x1490 [ 702.639857][ T462] ? dqget+0x10d0/0x10d0 [ 702.644117][ T462] ? quarantine_put+0x11c/0x1c0 [ 702.648962][ T462] ext4_mkdir+0x3df/0xe20 [ 702.653304][ T462] ? ext4_init_dot_dotdot+0x520/0x520 [ 702.658778][ T462] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 702.665020][ T462] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 702.671254][ T462] ? security_inode_permission+0xcb/0x100 [ 702.676985][ T462] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 702.683494][ T462] ? security_inode_mkdir+0xe4/0x120 [ 702.688766][ T462] vfs_mkdir+0x42e/0x670 [ 702.693063][ T462] do_mkdirat+0x234/0x2a0 [ 702.697400][ T462] ? __ia32_sys_mknod+0xb0/0xb0 [ 702.702262][ T462] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 702.708414][ T462] ? trace_hardirqs_off_caller+0x65/0x230 [ 702.714144][ T462] __x64_sys_mkdir+0x5c/0x80 [ 702.718724][ T462] do_syscall_64+0xfd/0x6a0 [ 702.723218][ T462] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 702.729100][ T462] RIP: 0033:0x458c47 [ 702.733003][ T462] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 702.752594][ T462] RSP: 002b:00007faa47624a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 702.761002][ T462] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c47 22:24:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:48 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x2c, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 702.768970][ T462] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 702.777025][ T462] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 702.785255][ T462] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 702.793215][ T462] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:48 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000200)="150300000600400000000200850cf7c41975e697080000026b2a2fcddad8897c6f11876d886b17b07783af113b860f84f789cca7a7659866a63deae307d02f74610000000000000000000000963c8b7fc0", 0x51, 0x0, 0x0, 0x0) recvfrom$inet6(r2, &(0x7f0000000180)=""/71, 0x47, 0x0, 0x0, 0x0) 22:24:48 executing program 1 (fault-call:0 fault-nth:43): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:48 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x2f, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:48 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x1100}}, 0x30) 22:24:48 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600400000004000850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 703.037194][ T650] FAULT_INJECTION: forcing a failure. [ 703.037194][ T650] name failslab, interval 1, probability 0, space 0, times 0 [ 703.049966][ T650] CPU: 0 PID: 650 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 703.057783][ T650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 703.067846][ T650] Call Trace: [ 703.071150][ T650] dump_stack+0x172/0x1f0 [ 703.075494][ T650] should_fail.cold+0xa/0x15 [ 703.080094][ T650] ? fault_create_debugfs_attr+0x180/0x180 22:24:48 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x33, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 703.085908][ T650] ? __es_tree_search.isra.0+0x1bf/0x230 [ 703.091548][ T650] ? save_stack+0x5c/0x90 [ 703.095892][ T650] __should_failslab+0x121/0x190 [ 703.100848][ T650] should_failslab+0x9/0x14 [ 703.105359][ T650] kmem_cache_alloc+0x47/0x710 [ 703.110128][ T650] ? __es_shrink+0xad0/0xad0 [ 703.114729][ T650] ? do_raw_write_lock+0x124/0x290 [ 703.119845][ T650] __es_insert_extent+0x2cc/0xf20 [ 703.124875][ T650] ext4_es_insert_extent+0x2d0/0xa70 [ 703.130171][ T650] ? ext4_es_scan_clu+0x50/0x50 [ 703.135034][ T650] ? __es_find_extent_range+0x361/0x490 [ 703.140776][ T650] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 703.147042][ T650] ? ext4_es_find_extent_range+0x131/0x660 [ 703.152885][ T650] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 703.158475][ T650] ? ext4_rereserve_cluster+0x240/0x240 [ 703.164042][ T650] ? ext4_find_extent+0x76e/0x9d0 [ 703.169085][ T650] ? ext4_find_extent+0x6a6/0x9d0 [ 703.174147][ T650] ext4_ext_map_blocks+0x20c4/0x5040 [ 703.179715][ T650] ? ext4_ext_release+0x10/0x10 22:24:48 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3b, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 703.184679][ T650] ? __kasan_check_write+0x14/0x20 [ 703.189990][ T650] ? down_read+0x10a/0x3f0 [ 703.194426][ T650] ? down_read_killable+0x460/0x460 [ 703.199637][ T650] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 703.205893][ T650] ? ext4_es_lookup_extent+0x3fd/0xbf0 [ 703.211368][ T650] ext4_map_blocks+0xdc5/0x17f0 [ 703.216231][ T650] ? ext4_issue_zeroout+0x190/0x190 [ 703.221472][ T650] ? ext4_set_acl+0x4f0/0x4f0 [ 703.226170][ T650] ? __kasan_check_write+0x14/0x20 [ 703.231295][ T650] ext4_getblk+0xc4/0x570 22:24:48 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3c, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 703.235639][ T650] ? ext4_iomap_begin+0x1000/0x1000 [ 703.240849][ T650] ext4_bread+0x93/0x270 [ 703.245101][ T650] ? ext4_getblk+0x570/0x570 [ 703.249700][ T650] ext4_append+0x155/0x370 [ 703.254154][ T650] ext4_mkdir+0x632/0xe20 [ 703.258498][ T650] ? ext4_init_dot_dotdot+0x520/0x520 [ 703.263879][ T650] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 703.270309][ T650] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 703.276732][ T650] ? security_inode_permission+0xcb/0x100 22:24:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 703.282459][ T650] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 703.288706][ T650] ? security_inode_mkdir+0xe4/0x120 [ 703.294013][ T650] vfs_mkdir+0x42e/0x670 [ 703.298264][ T650] do_mkdirat+0x234/0x2a0 [ 703.302597][ T650] ? __ia32_sys_mknod+0xb0/0xb0 [ 703.307539][ T650] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 703.313610][ T650] ? trace_hardirqs_off_caller+0x65/0x230 [ 703.319338][ T650] __x64_sys_mkdir+0x5c/0x80 [ 703.323940][ T650] do_syscall_64+0xfd/0x6a0 [ 703.328453][ T650] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 703.334344][ T650] RIP: 0033:0x458c47 [ 703.338240][ T650] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 703.357853][ T650] RSP: 002b:00007faa47624a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 703.366389][ T650] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c47 [ 703.374463][ T650] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 703.383366][ T650] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 703.391542][ T650] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 703.399524][ T650] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:48 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") setsockopt$inet_int(r3, 0x0, 0x22, &(0x7f0000000080)=0x6, 0x4) sendto$inet6(r2, &(0x7f0000000200)="150300000600400000000200850cf7c41975e697080000026b2a2fcddad8897c6f11876d886b17b07783af113b860f84f789cca7a7659866a63deae307d02f74610000000000000000000000963c8b7fc0", 0x51, 0x0, 0x0, 0x0) recvfrom$inet6(r2, &(0x7f0000000180)=""/71, 0x47, 0x0, 0x0, 0x0) 22:24:48 executing program 1 (fault-call:0 fault-nth:44): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:48 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x87, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:48 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x1800}}, 0x30) 22:24:49 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="15030000060040000003e800850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:49 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0xffffff84, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 703.647672][ T831] FAULT_INJECTION: forcing a failure. [ 703.647672][ T831] name failslab, interval 1, probability 0, space 0, times 0 [ 703.676373][ T831] CPU: 1 PID: 831 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 703.684336][ T831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 703.694403][ T831] Call Trace: [ 703.697711][ T831] dump_stack+0x172/0x1f0 [ 703.702052][ T831] should_fail.cold+0xa/0x15 [ 703.706655][ T831] ? fault_create_debugfs_attr+0x180/0x180 [ 703.712470][ T831] ? __kasan_check_write+0x14/0x20 [ 703.717596][ T831] ? ___might_sleep+0x163/0x280 [ 703.722451][ T831] __should_failslab+0x121/0x190 [ 703.727398][ T831] should_failslab+0x9/0x14 [ 703.731916][ T831] __kmalloc+0x2e0/0x770 [ 703.736515][ T831] ? quarantine_put+0x11c/0x1c0 [ 703.741388][ T831] ? ext4_find_extent+0x76e/0x9d0 22:24:49 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0xffffff88, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 703.746421][ T831] ext4_find_extent+0x76e/0x9d0 [ 703.751282][ T831] ? ext4_ext_map_blocks+0x910/0x5040 [ 703.756754][ T831] ext4_ext_map_blocks+0x1dc/0x5040 [ 703.761965][ T831] ? ext4_map_blocks+0xda6/0x17f0 [ 703.766999][ T831] ? mark_held_locks+0xf0/0xf0 [ 703.771787][ T831] ? ext4_ext_release+0x10/0x10 [ 703.776659][ T831] ? lock_acquire+0x190/0x410 [ 703.781347][ T831] ? ext4_map_blocks+0x4b1/0x17f0 [ 703.786387][ T831] ? __kasan_check_write+0x14/0x20 [ 703.791509][ T831] ? down_write+0xdf/0x150 22:24:49 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0xffffff89, 0x0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:49 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x2, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 703.795930][ T831] ? __down_timeout+0x2d0/0x2d0 [ 703.800790][ T831] ? ext4_es_lookup_extent+0x3fd/0xbf0 [ 703.806258][ T831] ext4_map_blocks+0x529/0x17f0 [ 703.811122][ T831] ? ext4_issue_zeroout+0x190/0x190 [ 703.816325][ T831] ? ext4_set_acl+0x4f0/0x4f0 [ 703.821011][ T831] ? __kasan_check_write+0x14/0x20 [ 703.826137][ T831] ext4_getblk+0xc4/0x570 [ 703.830482][ T831] ? ext4_iomap_begin+0x1000/0x1000 [ 703.835794][ T831] ext4_bread+0x93/0x270 [ 703.840051][ T831] ? ext4_getblk+0x570/0x570 22:24:49 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x3, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 703.844656][ T831] ext4_append+0x155/0x370 [ 703.849086][ T831] ext4_mkdir+0x632/0xe20 [ 703.853437][ T831] ? ext4_init_dot_dotdot+0x520/0x520 [ 703.858805][ T831] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 703.865150][ T831] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 703.871399][ T831] ? security_inode_permission+0xcb/0x100 [ 703.877132][ T831] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 703.883381][ T831] ? security_inode_mkdir+0xe4/0x120 [ 703.888674][ T831] vfs_mkdir+0x42e/0x670 [ 703.892926][ T831] do_mkdirat+0x234/0x2a0 22:24:49 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x4, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 703.897262][ T831] ? __ia32_sys_mknod+0xb0/0xb0 [ 703.902124][ T831] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 703.908204][ T831] ? trace_hardirqs_off_caller+0x65/0x230 [ 703.913925][ T831] __x64_sys_mkdir+0x5c/0x80 [ 703.918533][ T831] do_syscall_64+0xfd/0x6a0 [ 703.923044][ T831] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 703.928950][ T831] RIP: 0033:0x458c47 [ 703.932848][ T831] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 703.952458][ T831] RSP: 002b:00007faa47624a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 703.960881][ T831] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c47 [ 703.968852][ T831] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 703.976919][ T831] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 703.984916][ T831] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 22:24:49 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000200)="150300000600400000000200850cf7c41975e697080000026b2a2fcddad8897c6f11876d886b17b07783af113b860f84f789cca7a7659866a63deae307d02f74610000000000000000000000963c8b7fc0", 0x51, 0x0, 0x0, 0x0) recvfrom$inet6(r2, &(0x7f0000000180)=""/71, 0x47, 0xfffffffffffffffd, 0x0, 0x0) [ 703.993267][ T831] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:49 executing program 1 (fault-call:0 fault-nth:45): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:49 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x5, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 704.139016][ T869] FAULT_INJECTION: forcing a failure. [ 704.139016][ T869] name failslab, interval 1, probability 0, space 0, times 0 [ 704.165115][ T869] CPU: 0 PID: 869 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 704.172971][ T869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 704.183052][ T869] Call Trace: [ 704.183080][ T869] dump_stack+0x172/0x1f0 [ 704.183101][ T869] should_fail.cold+0xa/0x15 [ 704.183126][ T869] ? fault_create_debugfs_attr+0x180/0x180 [ 704.201639][ T869] ? lock_downgrade+0x920/0x920 [ 704.201657][ T869] ? ___might_sleep+0x163/0x280 [ 704.201684][ T869] __should_failslab+0x121/0x190 [ 704.216333][ T869] should_failslab+0x9/0x14 [ 704.220845][ T869] kmem_cache_alloc+0x2aa/0x710 [ 704.225706][ T869] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 704.231959][ T869] ? __mark_inode_dirty+0x3d1/0x1390 [ 704.237265][ T869] ext4_mb_new_blocks+0x5b9/0x3870 [ 704.242389][ T869] ? quarantine_put+0x11c/0x1c0 [ 704.247246][ T869] ? ext4_find_extent+0x76e/0x9d0 [ 704.252287][ T869] ext4_ext_map_blocks+0x2b34/0x5040 [ 704.257582][ T869] ? ext4_ext_release+0x10/0x10 [ 704.262449][ T869] ? lock_acquire+0x190/0x410 [ 704.267174][ T869] ? ext4_map_blocks+0x4b1/0x17f0 [ 704.272225][ T869] ? ext4_es_lookup_extent+0x3fd/0xbf0 [ 704.277714][ T869] ext4_map_blocks+0x529/0x17f0 [ 704.282593][ T869] ? ext4_issue_zeroout+0x190/0x190 22:24:49 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x2600}}, 0x30) [ 704.287812][ T869] ? ext4_set_acl+0x4f0/0x4f0 [ 704.292884][ T869] ? __kasan_check_write+0x14/0x20 [ 704.298030][ T869] ext4_getblk+0xc4/0x570 [ 704.302365][ T869] ? ext4_iomap_begin+0x1000/0x1000 [ 704.307548][ T869] ext4_bread+0x93/0x270 [ 704.311774][ T869] ? ext4_getblk+0x570/0x570 [ 704.316385][ T869] ext4_append+0x155/0x370 [ 704.320830][ T869] ext4_mkdir+0x632/0xe20 [ 704.332499][ T869] ? ext4_init_dot_dotdot+0x520/0x520 [ 704.337863][ T869] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 704.344225][ T869] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 704.350450][ T869] ? security_inode_permission+0xcb/0x100 [ 704.356182][ T869] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 704.362438][ T869] ? security_inode_mkdir+0xe4/0x120 [ 704.367785][ T869] vfs_mkdir+0x42e/0x670 [ 704.372023][ T869] do_mkdirat+0x234/0x2a0 [ 704.376341][ T869] ? __ia32_sys_mknod+0xb0/0xb0 [ 704.381179][ T869] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 704.387240][ T869] ? trace_hardirqs_off_caller+0x65/0x230 [ 704.392953][ T869] __x64_sys_mkdir+0x5c/0x80 [ 704.397548][ T869] do_syscall_64+0xfd/0x6a0 [ 704.402041][ T869] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 704.407956][ T869] RIP: 0033:0x458c47 [ 704.411836][ T869] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 704.431430][ T869] RSP: 002b:00007faa47624a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 22:24:49 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="15030000060040000001f400850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:49 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x6, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 704.439937][ T869] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c47 [ 704.447900][ T869] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 704.455895][ T869] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 704.463890][ T869] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 704.471850][ T869] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:49 executing program 1 (fault-call:0 fault-nth:46): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:49 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x7, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:50 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000200)="150300000600400000000200850cf7c41975e697080000026b2a2fcddad8897c6f11876d886b17b07783af113b860f84f789cca7a7659866a63deae307d02f74610000000000000000000000963c8b7fc0", 0x51, 0x4000, 0x0, 0x0) recvfrom$inet6(r2, &(0x7f0000000080)=""/71, 0x114, 0xfffffffffffffffc, 0x0, 0x0) ioctl$SIOCX25SCUDMATCHLEN(r2, 0x89e7, &(0x7f0000000100)={0x73}) 22:24:50 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x3580}}, 0x30) [ 704.703019][ T997] FAULT_INJECTION: forcing a failure. [ 704.703019][ T997] name failslab, interval 1, probability 0, space 0, times 0 [ 704.715764][ T997] CPU: 1 PID: 997 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 704.723584][ T997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 704.733648][ T997] Call Trace: [ 704.736956][ T997] dump_stack+0x172/0x1f0 [ 704.741307][ T997] should_fail.cold+0xa/0x15 [ 704.745915][ T997] ? fault_create_debugfs_attr+0x180/0x180 [ 704.751731][ T997] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 704.757453][ T997] ? __es_tree_search.isra.0+0x1bf/0x230 [ 704.763146][ T997] __should_failslab+0x121/0x190 [ 704.768106][ T997] should_failslab+0x9/0x14 [ 704.772634][ T997] kmem_cache_alloc+0x47/0x710 [ 704.777416][ T997] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 704.783142][ T997] ? ext4_es_can_be_merged+0x1a3/0x2a0 [ 704.788602][ T997] ? __es_shrink+0xad0/0xad0 [ 704.793197][ T997] ? do_raw_write_lock+0x124/0x290 [ 704.798336][ T997] __es_insert_extent+0x2cc/0xf20 [ 704.803399][ T997] ext4_es_insert_extent+0x2d0/0xa70 [ 704.808700][ T997] ? ext4_es_scan_clu+0x50/0x50 [ 704.813558][ T997] ? ext4_es_lookup_extent+0x3fd/0xbf0 [ 704.813577][ T997] ext4_map_blocks+0x7eb/0x17f0 [ 704.813596][ T997] ? ext4_issue_zeroout+0x190/0x190 [ 704.813611][ T997] ? ext4_set_acl+0x4f0/0x4f0 [ 704.813630][ T997] ? __kasan_check_write+0x14/0x20 [ 704.813645][ T997] ext4_getblk+0xc4/0x570 [ 704.813658][ T997] ? ext4_iomap_begin+0x1000/0x1000 [ 704.813674][ T997] ext4_bread+0x93/0x270 [ 704.813685][ T997] ? ext4_getblk+0x570/0x570 [ 704.813706][ T997] ext4_append+0x155/0x370 [ 704.813723][ T997] ext4_mkdir+0x632/0xe20 [ 704.813744][ T997] ? ext4_init_dot_dotdot+0x520/0x520 [ 704.813763][ T997] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 704.813776][ T997] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 704.813793][ T997] ? security_inode_permission+0xcb/0x100 [ 704.813808][ T997] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 704.813821][ T997] ? security_inode_mkdir+0xe4/0x120 22:24:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c0000001900010200000002000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) 22:24:50 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x8, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 704.813839][ T997] vfs_mkdir+0x42e/0x670 [ 704.813861][ T997] do_mkdirat+0x234/0x2a0 [ 704.824178][ T997] ? __ia32_sys_mknod+0xb0/0xb0 [ 704.824195][ T997] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 704.824210][ T997] ? trace_hardirqs_off_caller+0x65/0x230 [ 704.824228][ T997] __x64_sys_mkdir+0x5c/0x80 [ 704.824245][ T997] do_syscall_64+0xfd/0x6a0 [ 704.824260][ T997] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 704.824272][ T997] RIP: 0033:0x458c47 [ 704.824296][ T997] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 704.965167][ T997] RSP: 002b:00007faa47624a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 704.973937][ T997] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c47 [ 704.981951][ T997] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 704.989933][ T997] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 22:24:50 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0xb, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 704.998069][ T997] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 705.006048][ T997] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:50 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0xd, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:50 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600400002000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:50 executing program 1 (fault-call:0 fault-nth:47): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:50 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x28, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 705.200631][ T1136] FAULT_INJECTION: forcing a failure. [ 705.200631][ T1136] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 705.213888][ T1136] CPU: 0 PID: 1136 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 705.221784][ T1136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 705.231852][ T1136] Call Trace: [ 705.235170][ T1136] dump_stack+0x172/0x1f0 [ 705.239517][ T1136] should_fail.cold+0xa/0x15 [ 705.244126][ T1136] ? fault_create_debugfs_attr+0x180/0x180 [ 705.249945][ T1136] ? stack_trace_save+0xac/0xe0 [ 705.254813][ T1136] ? stack_trace_consume_entry+0x190/0x190 [ 705.260632][ T1136] should_fail_alloc_page+0x50/0x60 [ 705.265840][ T1136] __alloc_pages_nodemask+0x1a1/0x8f0 [ 705.271223][ T1136] ? __alloc_pages_slowpath+0x2520/0x2520 [ 705.276958][ T1136] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 705.282613][ T1136] ? __kasan_check_read+0x11/0x20 [ 705.287645][ T1136] ? fault_create_debugfs_attr+0x180/0x180 [ 705.293461][ T1136] cache_grow_begin+0x90/0xd20 [ 705.298233][ T1136] ? getname_flags+0xd6/0x5b0 [ 705.302920][ T1136] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 705.309175][ T1136] kmem_cache_alloc+0x64e/0x710 [ 705.314043][ T1136] getname_flags+0xd6/0x5b0 [ 705.318558][ T1136] user_path_at_empty+0x2f/0x50 [ 705.323444][ T1136] do_mount+0x150/0x1c30 [ 705.327699][ T1136] ? kasan_kmalloc+0x9/0x10 [ 705.332213][ T1136] ? copy_mount_string+0x40/0x40 [ 705.337173][ T1136] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 705.343432][ T1136] ? copy_mount_options+0x2e8/0x3f0 22:24:50 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x60, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 705.348725][ T1136] ksys_mount+0xdb/0x150 [ 705.353006][ T1136] __x64_sys_mount+0xbe/0x150 [ 705.357713][ T1136] do_syscall_64+0xfd/0x6a0 [ 705.362252][ T1136] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 705.362262][ T1136] RIP: 0033:0x45c27a [ 705.362277][ T1136] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 705.362284][ T1136] RSP: 002b:00007faa47624a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 22:24:50 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$KVM_GET_DEVICE_ATTR(r2, 0x4018aee2, &(0x7f00000000c0)={0x0, 0x6, 0x7, &(0x7f0000000080)=0x2}) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000200)="150300000600400000000200850cf7c41975e697080000026b2a2fcddad8897c6f11876d886b17b07783af113b860f84f789cca7a7659866a63deae307d02f74610000000000000000000000963c8b7fc0", 0x51, 0x0, 0x0, 0x0) recvfrom$inet6(r2, &(0x7f0000000180)=""/71, 0x47, 0x0, 0x0, 0x0) 22:24:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:50 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0xf0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:50 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x4000}}, 0x30) [ 705.362296][ T1136] RAX: ffffffffffffffda RBX: 00007faa47624b40 RCX: 000000000045c27a [ 705.362302][ T1136] RDX: 00007faa47624ae0 RSI: 0000000020000100 RDI: 00007faa47624b00 [ 705.362310][ T1136] RBP: 0000000000000001 R08: 00007faa47624b40 R09: 00007faa47624ae0 [ 705.362327][ T1136] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 705.372133][ T1136] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:50 executing program 1 (fault-call:0 fault-nth:48): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:50 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x1a0, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c0000001900010200000006000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) 22:24:51 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600400004000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) [ 705.644951][ T1172] FAULT_INJECTION: forcing a failure. [ 705.644951][ T1172] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 705.658294][ T1172] CPU: 0 PID: 1172 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 705.666189][ T1172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 705.676339][ T1172] Call Trace: [ 705.679645][ T1172] dump_stack+0x172/0x1f0 [ 705.684017][ T1172] should_fail.cold+0xa/0x15 [ 705.688630][ T1172] ? __kmalloc+0x163/0x770 [ 705.693070][ T1172] ? fault_create_debugfs_attr+0x180/0x180 [ 705.698892][ T1172] ? do_mount+0x1d4/0x1c30 [ 705.703311][ T1172] ? ksys_mount+0xdb/0x150 [ 705.707732][ T1172] ? __x64_sys_mount+0xbe/0x150 [ 705.712772][ T1172] ? do_syscall_64+0xfd/0x6a0 [ 705.717457][ T1172] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 705.723538][ T1172] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 705.729530][ T1172] ? bpf_prog_kallsyms_find+0x50/0x2c0 [ 705.735013][ T1172] should_fail_alloc_page+0x50/0x60 [ 705.740220][ T1172] __alloc_pages_nodemask+0x1a1/0x8f0 22:24:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:51 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x300, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 705.745640][ T1172] ? kernel_text_address+0x73/0xf0 [ 705.750766][ T1172] ? __alloc_pages_slowpath+0x2520/0x2520 [ 705.756500][ T1172] ? unwind_get_return_address+0x61/0xa0 [ 705.762135][ T1172] ? profile_setup.cold+0xbb/0xbb [ 705.767174][ T1172] ? should_fail+0x1de/0x852 [ 705.771771][ T1172] ? fault_create_debugfs_attr+0x180/0x180 [ 705.777595][ T1172] cache_grow_begin+0x90/0xd20 [ 705.782384][ T1172] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 705.788116][ T1172] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 22:24:51 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x500, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 705.794374][ T1172] __kmalloc+0x6b2/0x770 [ 705.798625][ T1172] ? kasan_kmalloc+0x9/0x10 [ 705.803131][ T1172] ? __kmalloc+0x351/0x770 [ 705.807555][ T1172] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 705.813278][ T1172] tomoyo_realpath_from_path+0xcd/0x7b0 [ 705.818842][ T1172] tomoyo_mount_acl+0x149/0x840 [ 705.823706][ T1172] ? __kasan_check_read+0x11/0x20 [ 705.828760][ T1172] ? __kasan_check_write+0x14/0x20 [ 705.833881][ T1172] ? lock_downgrade+0x920/0x920 [ 705.838742][ T1172] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 705.844300][ T1172] ? debug_check_no_obj_freed+0xc0/0x43f [ 705.849940][ T1172] ? trace_hardirqs_off+0x62/0x240 [ 705.855071][ T1172] ? lock_acquire+0x190/0x410 [ 705.855091][ T1172] ? tomoyo_mount_permission+0x10a/0x410 [ 705.855118][ T1172] tomoyo_mount_permission+0x16a/0x410 [ 705.870874][ T1172] ? tomoyo_mount_permission+0x10a/0x410 [ 705.876513][ T1172] ? tomoyo_mount_acl+0x840/0x840 [ 705.881550][ T1172] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 705.887835][ T1172] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 705.894082][ T1172] ? strncpy_from_user+0x2b4/0x400 [ 705.899208][ T1172] tomoyo_sb_mount+0x35/0x40 [ 705.903805][ T1172] security_sb_mount+0x87/0xd0 [ 705.908590][ T1172] do_mount+0x1d4/0x1c30 [ 705.912850][ T1172] ? __this_cpu_preempt_check+0x3a/0x210 [ 705.918483][ T1172] ? retint_kernel+0x2b/0x2b [ 705.923083][ T1172] ? copy_mount_string+0x40/0x40 [ 705.928042][ T1172] ? copy_mount_options+0x219/0x3f0 [ 705.933255][ T1172] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 705.939597][ T1172] ? copy_mount_options+0x2e8/0x3f0 [ 705.944804][ T1172] ksys_mount+0xdb/0x150 [ 705.949050][ T1172] __x64_sys_mount+0xbe/0x150 [ 705.953732][ T1172] do_syscall_64+0xfd/0x6a0 [ 705.958245][ T1172] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 705.964144][ T1172] RIP: 0033:0x45c27a [ 705.968045][ T1172] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 705.987660][ T1172] RSP: 002b:00007faa47624a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 705.987674][ T1172] RAX: ffffffffffffffda RBX: 00007faa47624b40 RCX: 000000000045c27a [ 705.987681][ T1172] RDX: 00007faa47624ae0 RSI: 0000000020000100 RDI: 00007faa47624b00 [ 705.987687][ T1172] RBP: 0000000000000001 R08: 00007faa47624b40 R09: 00007faa47624ae0 [ 705.987694][ T1172] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 705.987701][ T1172] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:51 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'teql0\x00', r1}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @remote}, 0x14) r3 = dup(r0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000280)=0x3) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r3, &(0x7f0000000200)="150300000600400000000200850cf7c41975e697080000026b2a2fcddad8897c6f11876d886b17b07783af113b860f84f789cca7a7659866a63deae307d02f74610000000000000000000000963c8b7fc0", 0x51, 0x0, 0x0, 0x0) recvfrom$inet6(r3, &(0x7f0000000180)=""/71, 0x47, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000140)={0x0, r4, 0x7, 0x5, 0x3f, 0xb50}) 22:24:51 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x543, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:51 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x4305}}, 0x30) 22:24:51 executing program 1 (fault-call:0 fault-nth:49): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:51 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x600, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:51 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600400005000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 706.244705][ T1314] FAULT_INJECTION: forcing a failure. [ 706.244705][ T1314] name failslab, interval 1, probability 0, space 0, times 0 22:24:51 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x608, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 706.304962][ T1314] CPU: 0 PID: 1314 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 706.313090][ T1314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 706.323163][ T1314] Call Trace: [ 706.326477][ T1314] dump_stack+0x172/0x1f0 [ 706.330830][ T1314] should_fail.cold+0xa/0x15 [ 706.335446][ T1314] ? fault_create_debugfs_attr+0x180/0x180 [ 706.341262][ T1314] ? ___might_sleep+0x163/0x280 [ 706.346120][ T1314] __should_failslab+0x121/0x190 22:24:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 706.351059][ T1314] should_failslab+0x9/0x14 [ 706.355561][ T1314] __kmalloc+0x2e0/0x770 [ 706.359815][ T1314] ? save_stack+0x5c/0x90 [ 706.365658][ T1314] ? save_stack+0x23/0x90 [ 706.370009][ T1314] ? tomoyo_encode2.part.0+0xf5/0x400 [ 706.375394][ T1314] tomoyo_encode2.part.0+0xf5/0x400 [ 706.380603][ T1314] ? do_syscall_64+0xfd/0x6a0 [ 706.393806][ T1314] tomoyo_encode+0x2b/0x50 [ 706.398234][ T1314] tomoyo_mount_acl+0xe0/0x840 22:24:51 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x689, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 706.403021][ T1314] ? __kasan_check_read+0x11/0x20 [ 706.408057][ T1314] ? __kasan_check_write+0x14/0x20 [ 706.413178][ T1314] ? lock_downgrade+0x920/0x920 [ 706.418047][ T1314] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 706.423617][ T1314] ? debug_check_no_obj_freed+0xc0/0x43f [ 706.429290][ T1314] ? trace_hardirqs_off+0x62/0x240 [ 706.434437][ T1314] ? lock_acquire+0x190/0x410 [ 706.439135][ T1314] ? tomoyo_mount_permission+0x10a/0x410 [ 706.444787][ T1314] tomoyo_mount_permission+0x16a/0x410 22:24:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c000000190001020000000e000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) [ 706.450263][ T1314] ? tomoyo_mount_permission+0x10a/0x410 [ 706.455906][ T1314] ? tomoyo_mount_acl+0x840/0x840 [ 706.460936][ T1314] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 706.467208][ T1314] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 706.473460][ T1314] ? strncpy_from_user+0x2b4/0x400 [ 706.478580][ T1314] tomoyo_sb_mount+0x35/0x40 [ 706.483184][ T1314] security_sb_mount+0x87/0xd0 [ 706.487960][ T1314] do_mount+0x1d4/0x1c30 [ 706.492214][ T1314] ? retint_kernel+0x2b/0x2b [ 706.496810][ T1314] ? copy_mount_string+0x40/0x40 [ 706.501759][ T1314] ? __sanitizer_cov_trace_const_cmp4+0x20/0x20 [ 706.508015][ T1314] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 706.514269][ T1314] ? copy_mount_options+0x2e8/0x3f0 [ 706.519478][ T1314] ksys_mount+0xdb/0x150 [ 706.523732][ T1314] __x64_sys_mount+0xbe/0x150 [ 706.528417][ T1314] do_syscall_64+0xfd/0x6a0 [ 706.532928][ T1314] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 706.538826][ T1314] RIP: 0033:0x45c27a [ 706.542724][ T1314] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 706.562345][ T1314] RSP: 002b:00007faa47624a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 706.562360][ T1314] RAX: ffffffffffffffda RBX: 00007faa47624b40 RCX: 000000000045c27a [ 706.562367][ T1314] RDX: 00007faa47624ae0 RSI: 0000000020000100 RDI: 00007faa47624b00 [ 706.562373][ T1314] RBP: 0000000000000001 R08: 00007faa47624b40 R09: 00007faa47624ae0 [ 706.562379][ T1314] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 706.562386][ T1314] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 [ 706.562712][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 706.572356][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 706.579009][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 706.586950][ C1] protocol 88fb is buggy, dev hsr_slave_1 22:24:52 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f00000000c0)=0x1fe, 0xfffffdba) bind(r0, &(0x7f0000000180)=@vsock={0x28, 0x0, 0x0, @host}, 0x80) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) write$P9_ROPEN(r2, &(0x7f0000000000)={0xfffffffffffffebd, 0x71, 0xfffffffffffffffd, {{0x6, 0x3, 0x8}, 0x10d}}, 0xfffffffffffffe82) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000200)="150300000600400000000200850cf7c41975e697080000026b2a2fcddad8897c6f11876d886b17b07783af113b860f84f789cca7a7659866a63deae307d02f74610000000000000000000000963c8b7fc0", 0x51, 0x0, 0x0, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r2, 0x401870cc, &(0x7f0000000080)={0x1c5e, 0x3f, 0xffffffff, 0xffe}) 22:24:52 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x700, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c000000190001020000000f000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) 22:24:52 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x4788}}, 0x30) 22:24:52 executing program 1 (fault-call:0 fault-nth:50): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:52 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="15030000060040000a000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:52 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x806, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 706.829129][ T1459] FAULT_INJECTION: forcing a failure. [ 706.829129][ T1459] name failslab, interval 1, probability 0, space 0, times 0 [ 706.884648][ T1459] CPU: 0 PID: 1459 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 706.892601][ T1459] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 706.902670][ T1459] Call Trace: [ 706.905989][ T1459] dump_stack+0x172/0x1f0 [ 706.910352][ T1459] should_fail.cold+0xa/0x15 [ 706.914970][ T1459] ? fault_create_debugfs_attr+0x180/0x180 [ 706.920813][ T1459] ? page_to_nid.part.0+0x20/0x20 [ 706.925876][ T1459] ? ___might_sleep+0x163/0x280 [ 706.930770][ T1459] __should_failslab+0x121/0x190 [ 706.935713][ T1459] should_failslab+0x9/0x14 [ 706.940224][ T1459] kmem_cache_alloc_trace+0x2d3/0x790 [ 706.945606][ T1459] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 706.951860][ T1459] ? _copy_from_user+0x12c/0x1a0 [ 706.956811][ T1459] copy_mount_options+0x5c/0x3f0 [ 706.961757][ T1459] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 706.968027][ T1459] ksys_mount+0xa7/0x150 [ 706.972283][ T1459] __x64_sys_mount+0xbe/0x150 [ 706.976975][ T1459] do_syscall_64+0xfd/0x6a0 [ 706.981491][ T1459] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 706.987405][ T1459] RIP: 0033:0x45c27a [ 706.991316][ T1459] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 707.010925][ T1459] RSP: 002b:00007faa47624a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 707.019342][ T1459] RAX: ffffffffffffffda RBX: 00007faa47624b40 RCX: 000000000045c27a [ 707.027320][ T1459] RDX: 00007faa47624ae0 RSI: 0000000020000100 RDI: 00007faa47624b00 22:24:52 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0xb00, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:52 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0xd00, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:52 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0xe80, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 707.035298][ T1459] RBP: 0000000000000001 R08: 00007faa47624b40 R09: 00007faa47624ae0 [ 707.043276][ T1459] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 707.051281][ T1459] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:52 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x1, 0x400) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000000c0)=0x7f, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @remote}, 0x14) r3 = dup(r0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r3, &(0x7f0000000200)="150300000600400000000200850cf7c41975e697080000026b2a2fcddad8897c6f11876d886b17b07783af113b860f84f789cca7a7659866a63deae307d02f74610000000000000000000000963c8b7fc0", 0x51, 0x0, 0x0, 0x0) recvfrom$inet6(r3, &(0x7f0000000180)=""/71, 0x47, 0x0, 0x0, 0x0) 22:24:52 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x2800, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:52 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x4888}}, 0x30) 22:24:52 executing program 1 (fault-call:0 fault-nth:51): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:52 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="15030000060040000c000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) [ 707.309868][ T1495] FAULT_INJECTION: forcing a failure. [ 707.309868][ T1495] name failslab, interval 1, probability 0, space 0, times 0 22:24:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:52 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x3580, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 707.375787][ T1495] CPU: 0 PID: 1495 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 707.383736][ T1495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 707.393798][ T1495] Call Trace: [ 707.397117][ T1495] dump_stack+0x172/0x1f0 [ 707.401474][ T1495] should_fail.cold+0xa/0x15 [ 707.406085][ T1495] ? fault_create_debugfs_attr+0x180/0x180 [ 707.411914][ T1495] ? page_to_nid.part.0+0x20/0x20 [ 707.416987][ T1495] ? ___might_sleep+0x163/0x280 [ 707.421863][ T1495] __should_failslab+0x121/0x190 [ 707.426812][ T1495] should_failslab+0x9/0x14 [ 707.431319][ T1495] kmem_cache_alloc_trace+0x2d3/0x790 [ 707.436708][ T1495] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 707.442959][ T1495] ? _copy_from_user+0x12c/0x1a0 [ 707.447918][ T1495] copy_mount_options+0x5c/0x3f0 [ 707.452862][ T1495] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 707.459110][ T1495] ksys_mount+0xa7/0x150 [ 707.463365][ T1495] __x64_sys_mount+0xbe/0x150 [ 707.468064][ T1495] do_syscall_64+0xfd/0x6a0 22:24:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 707.473334][ T1495] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 707.480247][ T1495] RIP: 0033:0x45c27a [ 707.484148][ T1495] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 707.503850][ T1495] RSP: 002b:00007faa47624a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 707.512275][ T1495] RAX: ffffffffffffffda RBX: 00007faa47624b40 RCX: 000000000045c27a 22:24:52 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x3f00, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 707.512284][ T1495] RDX: 00007faa47624ae0 RSI: 0000000020000100 RDI: 00007faa47624b00 [ 707.512290][ T1495] RBP: 0000000000000001 R08: 00007faa47624b40 R09: 00007faa47624ae0 [ 707.512296][ T1495] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 707.512303][ T1495] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:53 executing program 1 (fault-call:0 fault-nth:52): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 707.727834][ T1540] FAULT_INJECTION: forcing a failure. [ 707.727834][ T1540] name failslab, interval 1, probability 0, space 0, times 0 [ 707.741565][ T1540] CPU: 0 PID: 1540 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 707.749493][ T1540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 707.759582][ T1540] Call Trace: [ 707.762896][ T1540] dump_stack+0x172/0x1f0 [ 707.767249][ T1540] should_fail.cold+0xa/0x15 [ 707.771859][ T1540] ? __kasan_check_read+0x11/0x20 [ 707.777162][ T1540] ? fault_create_debugfs_attr+0x180/0x180 [ 707.783038][ T1540] ? page_to_nid.part.0+0x20/0x20 [ 707.788083][ T1540] ? ___might_sleep+0x163/0x280 [ 707.792954][ T1540] __should_failslab+0x121/0x190 [ 707.797908][ T1540] should_failslab+0x9/0x14 [ 707.802428][ T1540] kmem_cache_alloc_trace+0x2d3/0x790 [ 707.807802][ T1540] ? lockdep_init_map+0x1be/0x6d0 [ 707.812940][ T1540] legacy_init_fs_context+0x48/0xe0 [ 707.818140][ T1540] ? generic_parse_monolithic+0x200/0x200 [ 707.823843][ T1540] alloc_fs_context+0x3d1/0x6c0 [ 707.828679][ T1540] fs_context_for_mount+0x25/0x30 [ 707.833708][ T1540] do_mount+0x132d/0x1c30 [ 707.838045][ T1540] ? copy_mount_string+0x40/0x40 [ 707.842968][ T1540] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 707.849205][ T1540] ? _copy_from_user+0x12c/0x1a0 [ 707.854142][ T1540] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 707.860393][ T1540] ? copy_mount_options+0x2e8/0x3f0 [ 707.865579][ T1540] ksys_mount+0xdb/0x150 [ 707.869808][ T1540] __x64_sys_mount+0xbe/0x150 [ 707.874549][ T1540] do_syscall_64+0xfd/0x6a0 [ 707.879040][ T1540] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 707.886257][ T1540] RIP: 0033:0x45c27a [ 707.890510][ T1540] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 707.910114][ T1540] RSP: 002b:00007faa47624a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 707.918511][ T1540] RAX: ffffffffffffffda RBX: 00007faa47624b40 RCX: 000000000045c27a [ 707.926467][ T1540] RDX: 00007faa47624ae0 RSI: 0000000020000100 RDI: 00007faa47624b00 [ 707.934436][ T1540] RBP: 0000000000000001 R08: 00007faa47624b40 R09: 00007faa47624ae0 [ 707.942404][ T1540] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 707.950359][ T1540] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:53 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r2, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x121000}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)={0x44, r4, 0x100, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x30, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3f}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2f}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x19}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x41}, 0x50) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000200)="150300000600400000000200850cf7c41975e697080000026b2a2fcddad8897c6f11876d886b17b07783af113b860f84f789cca7a7659866a63deae307d02f74610000000000000000000000963c8b7fc0", 0x51, 0x0, 0x0, 0x0) recvfrom$inet6(r2, &(0x7f0000000180)=""/71, 0x47, 0x0, 0x0, 0x0) 22:24:53 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x4000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:53 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="15030000060040000d000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c0000001900010200000060000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) 22:24:53 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5865}}, 0x30) 22:24:53 executing program 1 (fault-call:0 fault-nth:53): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c0000001900010200005865000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) 22:24:53 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x4305, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 708.325789][ T1652] FAULT_INJECTION: forcing a failure. [ 708.325789][ T1652] name failslab, interval 1, probability 0, space 0, times 0 [ 708.372159][ T1652] CPU: 1 PID: 1652 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 708.380102][ T1652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 708.390344][ T1652] Call Trace: [ 708.393656][ T1652] dump_stack+0x172/0x1f0 [ 708.398004][ T1652] should_fail.cold+0xa/0x15 [ 708.402700][ T1652] ? fault_create_debugfs_attr+0x180/0x180 [ 708.408542][ T1652] ? ___might_sleep+0x163/0x280 [ 708.413408][ T1652] __should_failslab+0x121/0x190 [ 708.418348][ T1652] should_failslab+0x9/0x14 [ 708.422850][ T1652] __kmalloc+0x2e0/0x770 [ 708.427140][ T1652] ? save_stack+0x5c/0x90 [ 708.431475][ T1652] ? save_stack+0x23/0x90 [ 708.435822][ T1652] ? tomoyo_encode2.part.0+0xf5/0x400 [ 708.441200][ T1652] tomoyo_encode2.part.0+0xf5/0x400 [ 708.446426][ T1652] ? do_syscall_64+0xfd/0x6a0 [ 708.451116][ T1652] tomoyo_encode+0x2b/0x50 [ 708.455545][ T1652] tomoyo_mount_acl+0xe0/0x840 [ 708.460317][ T1652] ? __kasan_check_read+0x11/0x20 [ 708.465352][ T1652] ? __kasan_check_write+0x14/0x20 [ 708.470484][ T1652] ? lock_downgrade+0x920/0x920 [ 708.475352][ T1652] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 708.475371][ T1652] ? debug_check_no_obj_freed+0xc0/0x43f [ 708.475393][ T1652] ? trace_hardirqs_off+0x62/0x240 [ 708.486576][ T1652] ? lock_acquire+0x190/0x410 [ 708.486601][ T1652] ? tomoyo_mount_permission+0x10a/0x410 [ 708.502028][ T1652] tomoyo_mount_permission+0x16a/0x410 [ 708.507513][ T1652] ? tomoyo_mount_permission+0x10a/0x410 [ 708.513164][ T1652] ? tomoyo_mount_acl+0x840/0x840 [ 708.518206][ T1652] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 708.524463][ T1652] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 708.530714][ T1652] ? strncpy_from_user+0x2b4/0x400 [ 708.535842][ T1652] tomoyo_sb_mount+0x35/0x40 [ 708.540456][ T1652] security_sb_mount+0x87/0xd0 [ 708.545240][ T1652] do_mount+0x1d4/0x1c30 [ 708.549488][ T1652] ? kasan_kmalloc+0x9/0x10 [ 708.554000][ T1652] ? copy_mount_string+0x40/0x40 [ 708.558965][ T1652] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 708.565213][ T1652] ? copy_mount_options+0x2e8/0x3f0 [ 708.570423][ T1652] ksys_mount+0xdb/0x150 [ 708.574665][ T1652] __x64_sys_mount+0xbe/0x150 [ 708.574684][ T1652] do_syscall_64+0xfd/0x6a0 [ 708.574702][ T1652] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 708.574720][ T1652] RIP: 0033:0x45c27a [ 708.593743][ T1652] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 708.613411][ T1652] RSP: 002b:00007faa47624a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 22:24:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c0000001900010200000081000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) 22:24:53 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x4788, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 708.622023][ T1652] RAX: ffffffffffffffda RBX: 00007faa47624b40 RCX: 000000000045c27a [ 708.630003][ T1652] RDX: 00007faa47624ae0 RSI: 0000000020000100 RDI: 00007faa47624b00 [ 708.638173][ T1652] RBP: 0000000000000001 R08: 00007faa47624b40 R09: 00007faa47624ae0 [ 708.646153][ T1652] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 708.654133][ T1652] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:54 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@dev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000003c0)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'b\xbf~?\x1a\xb3\x9c*,\x00\x00\x00u\x00\x00\x04', r1}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @remote}, 0x14) r3 = dup(r0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r3, &(0x7f0000000200)="150300000600400000000200850cf7c41975e697080000026b2a2fcddad8897c6f11876d886b17b07783af113b860f84f789cca7a7659866a63deae307d02f74610000000000000000000000963c8b7fc0", 0x51, 0x0, 0x0, 0x0) recvfrom$inet6(r3, &(0x7f0000000180)=""/71, 0x47, 0x0, 0x0, 0x0) 22:24:54 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x4888, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:54 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x6000}}, 0x30) 22:24:54 executing program 1 (fault-call:0 fault-nth:54): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:54 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="15030000060040000e000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:54 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x6000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 709.330727][ T1811] FAULT_INJECTION: forcing a failure. [ 709.330727][ T1811] name failslab, interval 1, probability 0, space 0, times 0 [ 709.373020][ T1811] CPU: 0 PID: 1811 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 709.381017][ T1811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 709.391180][ T1811] Call Trace: [ 709.394499][ T1811] dump_stack+0x172/0x1f0 [ 709.398858][ T1811] should_fail.cold+0xa/0x15 [ 709.403493][ T1811] ? fault_create_debugfs_attr+0x180/0x180 [ 709.409308][ T1811] ? nd_jump_link+0x1d0/0x1d0 [ 709.413990][ T1811] ? ___might_sleep+0x163/0x280 [ 709.414017][ T1811] __should_failslab+0x121/0x190 [ 709.414040][ T1811] should_failslab+0x9/0x14 [ 709.428303][ T1811] __kmalloc+0x2e0/0x770 [ 709.432563][ T1811] ? kmem_cache_alloc+0x314/0x710 [ 709.432581][ T1811] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 709.432597][ T1811] tomoyo_realpath_from_path+0xcd/0x7b0 [ 709.432616][ T1811] tomoyo_mount_acl+0x2cc/0x840 [ 709.432629][ T1811] ? __kasan_check_read+0x11/0x20 [ 709.432648][ T1811] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 709.432674][ T1811] ? debug_check_no_obj_freed+0xc0/0x43f 22:24:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 709.469975][ T1811] ? trace_hardirqs_off+0x62/0x240 [ 709.476238][ T1811] ? lock_acquire+0x190/0x410 [ 709.480929][ T1811] ? tomoyo_mount_permission+0x10a/0x410 [ 709.486569][ T1811] tomoyo_mount_permission+0x16a/0x410 [ 709.492043][ T1811] ? tomoyo_mount_permission+0x10a/0x410 [ 709.497698][ T1811] ? tomoyo_mount_acl+0x840/0x840 [ 709.502752][ T1811] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 709.509032][ T1811] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 709.515288][ T1811] ? strncpy_from_user+0x2b4/0x400 22:24:54 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x6488, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 709.520422][ T1811] tomoyo_sb_mount+0x35/0x40 [ 709.525026][ T1811] security_sb_mount+0x87/0xd0 [ 709.529805][ T1811] do_mount+0x1d4/0x1c30 [ 709.534056][ T1811] ? kasan_kmalloc+0x9/0x10 [ 709.538593][ T1811] ? copy_mount_string+0x40/0x40 [ 709.543586][ T1811] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 709.549847][ T1811] ? copy_mount_options+0x2e8/0x3f0 [ 709.555070][ T1811] ksys_mount+0xdb/0x150 [ 709.559325][ T1811] __x64_sys_mount+0xbe/0x150 [ 709.564034][ T1811] do_syscall_64+0xfd/0x6a0 [ 709.568639][ T1811] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 709.574538][ T1811] RIP: 0033:0x45c27a [ 709.578452][ T1811] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 709.598086][ T1811] RSP: 002b:00007faa47624a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 709.606515][ T1811] RAX: ffffffffffffffda RBX: 00007faa47624b40 RCX: 000000000045c27a [ 709.614505][ T1811] RDX: 00007faa47624ae0 RSI: 0000000020000100 RDI: 00007faa47624b00 22:24:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 709.622493][ T1811] RBP: 0000000000000001 R08: 00007faa47624b40 R09: 00007faa47624ae0 [ 709.630478][ T1811] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 709.638456][ T1811] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:55 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x800e, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 709.687583][ T1811] ERROR: Out of memory at tomoyo_realpath_from_path. [ 710.092200][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 710.098198][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:24:55 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) fcntl$lock(r0, 0x24, &(0x7f00000000c0)={0x2, 0x4, 0xd21, 0x3ff, r2}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r3 = dup(r0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r3, &(0x7f0000000200)="150300000600400000000200850cf7c41975e697080000026b2a2fcddad8897c6f11876d886b17b07783af113b860f84f789cca7a7659866a63deae307d02f74610000000000000000000000963c8b7fc0", 0x51, 0x0, 0x0, 0x0) recvfrom$inet6(r3, &(0x7f0000000180)=""/71, 0x47, 0x0, 0x0, 0x0) 22:24:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c0000001900010200000000000340001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) 22:24:55 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x8035, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:55 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x6488}}, 0x30) 22:24:55 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600400011000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:55 executing program 1 (fault-call:0 fault-nth:55): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:55 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x8100, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 710.349014][ T1961] FAULT_INJECTION: forcing a failure. [ 710.349014][ T1961] name failslab, interval 1, probability 0, space 0, times 0 [ 710.378740][ T1961] CPU: 1 PID: 1961 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 22:24:55 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x8847, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 710.393466][ T1961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 710.403545][ T1961] Call Trace: [ 710.406870][ T1961] dump_stack+0x172/0x1f0 [ 710.411220][ T1961] should_fail.cold+0xa/0x15 [ 710.415819][ T1961] ? fault_create_debugfs_attr+0x180/0x180 [ 710.421632][ T1961] ? nd_jump_link+0x1d0/0x1d0 [ 710.426342][ T1961] ? ___might_sleep+0x163/0x280 [ 710.431204][ T1961] __should_failslab+0x121/0x190 [ 710.436162][ T1961] should_failslab+0x9/0x14 [ 710.440688][ T1961] __kmalloc+0x2e0/0x770 22:24:55 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x8848, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 710.444953][ T1961] ? kmem_cache_alloc+0x314/0x710 [ 710.449993][ T1961] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 710.455728][ T1961] tomoyo_realpath_from_path+0xcd/0x7b0 [ 710.461301][ T1961] tomoyo_mount_acl+0x2cc/0x840 [ 710.466168][ T1961] ? __kasan_check_read+0x11/0x20 [ 710.471745][ T1961] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 710.477316][ T1961] ? debug_check_no_obj_freed+0xc0/0x43f [ 710.482969][ T1961] ? trace_hardirqs_off+0x62/0x240 [ 710.488116][ T1961] ? lock_acquire+0x190/0x410 [ 710.492812][ T1961] ? tomoyo_mount_permission+0x10a/0x410 22:24:55 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x8864, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 710.498508][ T1961] tomoyo_mount_permission+0x16a/0x410 [ 710.504034][ T1961] ? tomoyo_mount_permission+0x10a/0x410 [ 710.509808][ T1961] ? tomoyo_mount_acl+0x840/0x840 [ 710.514848][ T1961] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 710.521113][ T1961] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 710.527371][ T1961] ? strncpy_from_user+0x2b4/0x400 [ 710.532507][ T1961] tomoyo_sb_mount+0x35/0x40 [ 710.537114][ T1961] security_sb_mount+0x87/0xd0 [ 710.541868][ T1961] do_mount+0x1d4/0x1c30 [ 710.546095][ T1961] ? kasan_kmalloc+0x9/0x10 [ 710.550592][ T1961] ? copy_mount_string+0x40/0x40 [ 710.555541][ T1961] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 710.561802][ T1961] ? copy_mount_options+0x2e8/0x3f0 [ 710.567004][ T1961] ksys_mount+0xdb/0x150 [ 710.571253][ T1961] __x64_sys_mount+0xbe/0x150 [ 710.575933][ T1961] do_syscall_64+0xfd/0x6a0 [ 710.580445][ T1961] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 710.586331][ T1961] RIP: 0033:0x45c27a [ 710.590266][ T1961] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 710.609877][ T1961] RSP: 002b:00007faa47624a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 710.618278][ T1961] RAX: ffffffffffffffda RBX: 00007faa47624b40 RCX: 000000000045c27a [ 710.626248][ T1961] RDX: 00007faa47624ae0 RSI: 0000000020000100 RDI: 00007faa47624b00 [ 710.634209][ T1961] RBP: 0000000000000001 R08: 00007faa47624b40 R09: 00007faa47624ae0 [ 710.642186][ T1961] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 22:24:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:56 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x8906, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 710.650177][ T1961] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 [ 710.664151][ T1961] ERROR: Out of memory at tomoyo_realpath_from_path. 22:24:56 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) setsockopt$packet_int(r2, 0x107, 0x1f, &(0x7f0000000280)=0x5, 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$P9_RXATTRCREATE(r2, &(0x7f0000000340)={0xffffffffffffff35, 0x21, 0x1}, 0x1a5c742a9cbb2b54) write$FUSE_GETXATTR(r2, &(0x7f0000000080)={0x18, 0x0, 0x2, {0x2}}, 0x18) sendto$inet6(r2, &(0x7f0000000200)="150300000600400000000200850cf7c41975e697080000026b2a2fcddad8897c6f11876d886b17b07783af113b860f84f789cca7a7659866a63deae307d02f74610000000000000000000000963c8b7fc0", 0x51, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r2, 0xc0106418, &(0x7f00000000c0)={0x8, 0x0, 0x7, 0x7, 0x12, 0xffffffffffffffc0}) getsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0), &(0x7f0000000300)=0x4) recvfrom$inet6(r2, &(0x7f0000000180)=""/71, 0x47, 0x0, 0x0, 0x0) 22:24:56 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0xf000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:56 executing program 1 (fault-call:0 fault-nth:56): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:56 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x6558}}, 0x30) 22:24:56 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="15030000060040002d000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c0000001900010200000000000000021d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) [ 710.897344][ T2100] FAULT_INJECTION: forcing a failure. [ 710.897344][ T2100] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 710.910587][ T2100] CPU: 0 PID: 2100 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 710.918476][ T2100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 710.928535][ T2100] Call Trace: [ 710.931840][ T2100] dump_stack+0x172/0x1f0 [ 710.936180][ T2100] should_fail.cold+0xa/0x15 [ 710.940786][ T2100] ? __kmalloc+0x163/0x770 [ 710.945214][ T2100] ? fault_create_debugfs_attr+0x180/0x180 [ 710.951117][ T2100] ? do_mount+0x1d4/0x1c30 [ 710.955535][ T2100] ? ksys_mount+0xdb/0x150 [ 710.959956][ T2100] ? __x64_sys_mount+0xbe/0x150 [ 710.964816][ T2100] ? do_syscall_64+0xfd/0x6a0 [ 710.969535][ T2100] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 710.975613][ T2100] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 710.975629][ T2100] ? bpf_prog_kallsyms_find+0x50/0x2c0 [ 710.975648][ T2100] should_fail_alloc_page+0x50/0x60 [ 710.975662][ T2100] __alloc_pages_nodemask+0x1a1/0x8f0 22:24:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:56 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0xf0ffff, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 710.975676][ T2100] ? kernel_text_address+0x73/0xf0 [ 710.975690][ T2100] ? __alloc_pages_slowpath+0x2520/0x2520 [ 710.975705][ T2100] ? unwind_get_return_address+0x61/0xa0 [ 710.975717][ T2100] ? profile_setup.cold+0xbb/0xbb [ 710.975735][ T2100] ? should_fail+0x1de/0x852 [ 710.975751][ T2100] ? fault_create_debugfs_attr+0x180/0x180 [ 710.975775][ T2100] cache_grow_begin+0x90/0xd20 [ 710.986958][ T2100] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 710.986984][ T2100] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 711.046038][ T2100] __kmalloc+0x6b2/0x770 [ 711.050286][ T2100] ? kasan_kmalloc+0x9/0x10 [ 711.054804][ T2100] ? __kmalloc+0x351/0x770 [ 711.059228][ T2100] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 711.064957][ T2100] tomoyo_realpath_from_path+0xcd/0x7b0 [ 711.070628][ T2100] tomoyo_mount_acl+0x149/0x840 [ 711.075503][ T2100] ? __kasan_check_read+0x11/0x20 [ 711.080536][ T2100] ? __kasan_check_write+0x14/0x20 [ 711.085657][ T2100] ? lock_downgrade+0x920/0x920 [ 711.090535][ T2100] ? tomoyo_check_mount_acl+0x1b0/0x1b0 22:24:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:56 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x1000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 711.096108][ T2100] ? debug_check_no_obj_freed+0xc0/0x43f [ 711.101764][ T2100] ? trace_hardirqs_off+0x62/0x240 [ 711.106909][ T2100] ? lock_acquire+0x190/0x410 [ 711.111597][ T2100] ? tomoyo_mount_permission+0x10a/0x410 [ 711.117253][ T2100] tomoyo_mount_permission+0x16a/0x410 [ 711.122737][ T2100] ? tomoyo_mount_permission+0x10a/0x410 [ 711.128394][ T2100] ? tomoyo_mount_acl+0x840/0x840 [ 711.133443][ T2100] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 711.139705][ T2100] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 711.145958][ T2100] ? strncpy_from_user+0x2b4/0x400 [ 711.151090][ T2100] tomoyo_sb_mount+0x35/0x40 [ 711.155685][ T2100] security_sb_mount+0x87/0xd0 [ 711.155704][ T2100] do_mount+0x1d4/0x1c30 [ 711.155720][ T2100] ? kasan_kmalloc+0x9/0x10 [ 711.155734][ T2100] ? copy_mount_string+0x40/0x40 [ 711.155755][ T2100] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 711.155769][ T2100] ? copy_mount_options+0x2e8/0x3f0 [ 711.155785][ T2100] ksys_mount+0xdb/0x150 [ 711.155808][ T2100] __x64_sys_mount+0xbe/0x150 [ 711.164818][ T2100] do_syscall_64+0xfd/0x6a0 [ 711.199048][ T2100] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 711.204942][ T2100] RIP: 0033:0x45c27a [ 711.208849][ T2100] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 711.228472][ T2100] RSP: 002b:00007faa47624a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 711.236899][ T2100] RAX: ffffffffffffffda RBX: 00007faa47624b40 RCX: 000000000045c27a 22:24:56 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x2000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:56 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x3000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 711.244877][ T2100] RDX: 00007faa47624ae0 RSI: 0000000020000100 RDI: 00007faa47624b00 [ 711.252859][ T2100] RBP: 0000000000000001 R08: 00007faa47624b40 R09: 00007faa47624ae0 [ 711.260844][ T2100] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 711.268834][ T2100] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:56 executing program 3: r0 = socket$packet(0x11, 0x400003, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000200)="150300000600400000000200850cf7c41975e697080000026b2a2fcddad8897c6f11876d886b17b07783af113b860f84f789cca7a7659866a63deae307d02f74610000000000000000000000963c8b7fc0", 0x51, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000080)=@gcm_128={{0x307}, "1b9b201477441822", "ebe7c692b0f1354ba15765a94e9bdb7a", "0631a9da", "9b3f6bb7117958f1"}, 0x28) recvfrom$inet6(r2, &(0x7f0000000180)=""/71, 0x47, 0x0, 0x0, 0x0) 22:24:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:56 executing program 1 (fault-call:0 fault-nth:57): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:56 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x8035}}, 0x30) 22:24:56 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x4000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:56 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600400032000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:56 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) execveat(r2, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)=[&(0x7f00000000c0)='vboxnet1vboxnet1#\x00', &(0x7f0000000100)='&vmnet0\x00', &(0x7f0000000280)='bridge0\x00', &(0x7f00000002c0)='bridge0\x00', &(0x7f0000000300)='bridge0\x00', &(0x7f0000000340)='\'GPL\xd4userwlan0:lovboxnet0@!GPL\x00', &(0x7f0000000380)='cgroup@em1\x00', &(0x7f00000003c0)='bridge0\x00', &(0x7f0000000400)='GPL\x00'], &(0x7f0000000500)=[&(0x7f00000004c0)='bridge0\x00'], 0x1000) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000200)="150300000600400000000200850cf7c41975e697080000026b2a2fcddad8897c6f11876d886b17b07783af113b860f84f789cca7a7659866a63deae307d02f74610000000000000000000000963c8b7fc0", 0x51, 0x0, 0x0, 0x0) recvfrom$inet6(r2, &(0x7f0000000180)=""/71, 0x47, 0x0, 0x0, 0x0) 22:24:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 711.588345][ T2246] FAULT_INJECTION: forcing a failure. [ 711.588345][ T2246] name failslab, interval 1, probability 0, space 0, times 0 [ 711.618847][ T2246] CPU: 1 PID: 2246 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 711.626794][ T2246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 711.636860][ T2246] Call Trace: [ 711.640171][ T2246] dump_stack+0x172/0x1f0 [ 711.644545][ T2246] should_fail.cold+0xa/0x15 [ 711.649140][ T2246] ? __x64_sys_mount+0xbe/0x150 [ 711.654003][ T2246] ? fault_create_debugfs_attr+0x180/0x180 [ 711.659834][ T2246] ? page_to_nid.part.0+0x20/0x20 [ 711.664876][ T2246] ? ___might_sleep+0x163/0x280 [ 711.669732][ T2246] __should_failslab+0x121/0x190 [ 711.674716][ T2246] should_failslab+0x9/0x14 [ 711.679204][ T2246] kmem_cache_alloc_trace+0x2d3/0x790 [ 711.684571][ T2246] ? debug_check_no_obj_freed+0xc0/0x43f [ 711.690221][ T2246] alloc_fs_context+0x5a/0x6c0 [ 711.695027][ T2246] fs_context_for_mount+0x25/0x30 [ 711.700049][ T2246] vfs_kern_mount.part.0+0x28/0xf0 [ 711.705144][ T2246] vfs_kern_mount+0x40/0x60 [ 711.709649][ T2246] btrfs_mount+0x2b4/0x15e2 [ 711.714136][ T2246] ? __kasan_check_read+0x11/0x20 [ 711.719146][ T2246] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 711.725379][ T2246] ? should_fail+0x1de/0x852 [ 711.729977][ T2246] ? fault_create_debugfs_attr+0x180/0x180 [ 711.735885][ T2246] ? btrfs_remount+0x10f0/0x10f0 [ 711.740828][ T2246] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 711.747082][ T2246] ? refcount_sub_and_test_checked+0x154/0x200 [ 711.753220][ T2246] ? refcount_dec_not_one+0x1f0/0x1f0 [ 711.758575][ T2246] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 711.764798][ T2246] ? legacy_parse_param+0x116/0x880 [ 711.769990][ T2246] ? __lookup_constant+0xd6/0x100 [ 711.775018][ T2246] ? refcount_dec_and_test_checked+0x1b/0x20 [ 711.780983][ T2246] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 711.787212][ T2246] ? apparmor_capable+0x2ed/0x630 [ 711.792218][ T2246] ? cap_capable+0x205/0x270 [ 711.796801][ T2246] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 711.803036][ T2246] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 711.809364][ T2246] ? btrfs_remount+0x10f0/0x10f0 [ 711.814306][ T2246] legacy_get_tree+0x108/0x220 [ 711.819070][ T2246] ? legacy_get_tree+0x108/0x220 [ 711.824006][ T2246] vfs_get_tree+0x8e/0x390 [ 711.828438][ T2246] do_mount+0x13b3/0x1c30 [ 711.832769][ T2246] ? copy_mount_string+0x40/0x40 [ 711.837709][ T2246] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 711.843930][ T2246] ? _copy_from_user+0x12c/0x1a0 [ 711.848852][ T2246] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 711.855083][ T2246] ? copy_mount_options+0x2e8/0x3f0 [ 711.860263][ T2246] ksys_mount+0xdb/0x150 [ 711.864492][ T2246] __x64_sys_mount+0xbe/0x150 [ 711.869159][ T2246] do_syscall_64+0xfd/0x6a0 [ 711.873675][ T2246] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 711.879550][ T2246] RIP: 0033:0x45c27a [ 711.883436][ T2246] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 711.903067][ T2246] RSP: 002b:00007faa47624a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 711.911511][ T2246] RAX: ffffffffffffffda RBX: 00007faa47624b40 RCX: 000000000045c27a [ 711.919521][ T2246] RDX: 00007faa47624ae0 RSI: 0000000020000100 RDI: 00007faa47624b00 [ 711.927476][ T2246] RBP: 0000000000000001 R08: 00007faa47624b40 R09: 00007faa47624ae0 22:24:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:57 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x5000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 711.935430][ T2246] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 711.943399][ T2246] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:57 executing program 1 (fault-call:0 fault-nth:58): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:57 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600400038000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:57 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x8100}}, 0x30) 22:24:57 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) r1 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0xfffffffffffffff7, 0x80) syz_extract_tcp_res(&(0x7f0000000300)={0x41424344, 0x41424344}, 0x1, 0x5) syz_extract_tcp_res$synack(&(0x7f0000000340)={0x41424344}, 0x1, 0x0) write$tun(r1, &(0x7f00000006c0)={@val={0x0, 0x88af}, @void, @ipv6={0x9, 0x6, "a96986", 0x2290, 0x87, 0x0, @remote, @loopback, {[@dstopts={0x73, 0x15, [], [@calipso={0x7, 0x10, {0x8a6f, 0x2, 0x8, 0xfffffffffffffffa, [0x5]}}, @pad1, @pad1, @generic={0x6, 0x87, "0ef3547cd8705bd454f23243c7c3324f9f15715c8732935558ff4ce856defdd543574b5287af5c561a304a062a7ed9801d889c25895230fe3c20f570bb7de51e3b43d407bac445fe870c4bdd37401214ea7a4654887da88d371c3fcc2edd461e00f2340392cadba0ee4a5920704babd7067f8a5b3e0a86417348852f05f57032fe28da035ed2cf"}, @ra={0x5, 0x2, 0xb7a0}, @jumbo={0xc2, 0x4, 0x1}, @padn={0x1, 0x2, [0x0, 0x0]}]}, @hopopts={0xff, 0x214, [], [@pad1, @jumbo={0xc2, 0x4, 0x76f1962f}, @enc_lim={0x4, 0x1, 0x1ff}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, [], 0xa}}, @generic={0x2, 0x1000, "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"}, @pad1, @ra={0x5, 0x2, 0x2}, @hao={0xc9, 0x10, @rand_addr="f54ce6f61f302cf3590a46624489951e"}, @padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @generic={0x10001, 0x63, "b94dd1605a972906ef1bb2718bbcd6c4f22a8675ebf0e24f0ba31bfa055d8df63708eac95cba0393ada40f3959703c3153a11c0d3486f28344b862bd28f77d08ff75db5e9f8b7394c5288bcf7280b1cbae0ebb65367750e4426eac91b8e628e328b76d"}]}, @routing={0x21, 0xa, 0x3, 0x48c5, 0x0, [@local, @ipv4={[], [], @empty}, @remote, @ipv4={[], [], @rand_addr=0x6}, @initdev={0xfe, 0x88, [], 0x1, 0x0}]}, @routing={0x3b, 0x14, 0x0, 0x1, 0x0, [@initdev={0xfe, 0x88, [], 0x0, 0x0}, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1f}}, @rand_addr="c6a584cf12b8ef50dc272b478771f746", @local, @loopback, @mcast1, @local, @mcast1, @mcast2, @mcast2]}], @tcp={{0x4e20, 0x4e23, r2, r3, 0xfffffffffffffffd, 0x0, 0xa, 0x40, 0x10001, 0x0, 0x2, {[@mss={0x2, 0x4}, @sack_perm={0x4, 0x2}, @generic={0x0, 0x2}, @timestamp={0x8, 0xa, 0x9, 0xfffffffffffffff7}]}}, {"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"}}}}}, 0x22bc) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) r5 = accept$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, &(0x7f00000000c0)=0x10) ioctl$VIDIOC_S_SELECTION(r5, 0xc040565f, &(0x7f0000000100)={0x3, 0x100, 0x2, {0x6, 0x8, 0x263c, 0x100}}) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f00000002c0)={0x0, 0x3f}, 0x8) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x14) r6 = dup(r0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r6, &(0x7f0000000200)="150300000600400000000200850cf7c41975e697080000026b2a2fcddad8897c6f11876d886b17b07783af113b860f84f789cca7a7659866a63deae307d02f74610000000000000000000000963c8b7fc0", 0x51, 0x0, 0x0, 0x0) recvfrom$inet6(r6, &(0x7f0000000180)=""/71, 0x47, 0x0, 0x0, 0x0) 22:24:57 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x6000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 712.204036][ T2382] FAULT_INJECTION: forcing a failure. [ 712.204036][ T2382] name failslab, interval 1, probability 0, space 0, times 0 [ 712.231769][ T2382] CPU: 1 PID: 2382 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 712.239711][ T2382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 712.249784][ T2382] Call Trace: 22:24:57 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x7000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 712.253093][ T2382] dump_stack+0x172/0x1f0 [ 712.257446][ T2382] should_fail.cold+0xa/0x15 [ 712.262040][ T2382] ? __kasan_check_read+0x11/0x20 [ 712.267081][ T2382] ? fault_create_debugfs_attr+0x180/0x180 [ 712.272901][ T2382] ? page_to_nid.part.0+0x20/0x20 [ 712.277941][ T2382] ? ___might_sleep+0x163/0x280 [ 712.282844][ T2382] __should_failslab+0x121/0x190 [ 712.287803][ T2382] should_failslab+0x9/0x14 [ 712.292346][ T2382] kmem_cache_alloc_trace+0x2d3/0x790 [ 712.297733][ T2382] ? lockdep_init_map+0x1be/0x6d0 22:24:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 712.302782][ T2382] legacy_init_fs_context+0x48/0xe0 [ 712.307990][ T2382] ? generic_parse_monolithic+0x200/0x200 [ 712.313722][ T2382] alloc_fs_context+0x3d1/0x6c0 [ 712.318582][ T2382] fs_context_for_mount+0x25/0x30 [ 712.327363][ T2382] do_mount+0x132d/0x1c30 [ 712.334251][ T2382] ? copy_mount_string+0x40/0x40 [ 712.339206][ T2382] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 712.345454][ T2382] ? copy_mount_options+0x2e8/0x3f0 [ 712.350661][ T2382] ksys_mount+0xdb/0x150 22:24:57 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x8000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 712.354908][ T2382] __x64_sys_mount+0xbe/0x150 [ 712.354927][ T2382] do_syscall_64+0xfd/0x6a0 [ 712.354945][ T2382] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 712.354963][ T2382] RIP: 0033:0x45c27a [ 712.374895][ T2382] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 712.395029][ T2382] RSP: 002b:00007faa47624a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 22:24:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:57 executing program 1 (fault-call:0 fault-nth:59): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 712.403463][ T2382] RAX: ffffffffffffffda RBX: 00007faa47624b40 RCX: 000000000045c27a [ 712.411446][ T2382] RDX: 00007faa47624ae0 RSI: 0000000020000100 RDI: 00007faa47624b00 [ 712.419423][ T2382] RBP: 0000000000000001 R08: 00007faa47624b40 R09: 00007faa47624ae0 [ 712.427401][ T2382] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 712.435375][ T2382] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 [ 712.504341][ T2404] FAULT_INJECTION: forcing a failure. [ 712.504341][ T2404] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 712.518385][ T2404] CPU: 1 PID: 2404 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 712.518395][ T2404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 712.518401][ T2404] Call Trace: [ 712.518435][ T2404] dump_stack+0x172/0x1f0 [ 712.518457][ T2404] should_fail.cold+0xa/0x15 [ 712.518476][ T2404] ? fault_create_debugfs_attr+0x180/0x180 [ 712.518491][ T2404] ? tomoyo_mount_acl+0x149/0x840 [ 712.518516][ T2404] ? tomoyo_mount_permission+0x16a/0x410 [ 712.518529][ T2404] ? tomoyo_sb_mount+0x35/0x40 [ 712.518546][ T2404] ? security_sb_mount+0x87/0xd0 [ 712.518562][ T2404] ? do_mount+0x1d4/0x1c30 [ 712.518586][ T2404] ? ksys_mount+0xdb/0x150 [ 712.583658][ T2404] ? __x64_sys_mount+0xbe/0x150 [ 712.588535][ T2404] ? do_syscall_64+0xfd/0x6a0 [ 712.593227][ T2404] should_fail_alloc_page+0x50/0x60 [ 712.598446][ T2404] __alloc_pages_nodemask+0x1a1/0x8f0 [ 712.603830][ T2404] ? __kasan_check_read+0x11/0x20 [ 712.608863][ T2404] ? __alloc_pages_slowpath+0x2520/0x2520 [ 712.614588][ T2404] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 712.620228][ T2404] ? __kasan_check_read+0x11/0x20 [ 712.625271][ T2404] ? fault_create_debugfs_attr+0x180/0x180 [ 712.631195][ T2404] cache_grow_begin+0x90/0xd20 [ 712.635967][ T2404] ? getname_kernel+0x53/0x370 [ 712.640743][ T2404] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 712.646991][ T2404] kmem_cache_alloc+0x64e/0x710 [ 712.651852][ T2404] getname_kernel+0x53/0x370 [ 712.656455][ T2404] kern_path+0x20/0x40 [ 712.660542][ T2404] tomoyo_mount_acl+0x28c/0x840 [ 712.665411][ T2404] ? __kasan_check_read+0x11/0x20 [ 712.670450][ T2404] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 712.676007][ T2404] ? debug_check_no_obj_freed+0xc0/0x43f [ 712.681657][ T2404] ? trace_hardirqs_off+0x62/0x240 [ 712.686831][ T2404] ? lock_acquire+0x190/0x410 [ 712.691557][ T2404] ? tomoyo_mount_permission+0x10a/0x410 [ 712.697205][ T2404] tomoyo_mount_permission+0x16a/0x410 22:24:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:58 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x8847}}, 0x30) [ 712.702667][ T2404] ? tomoyo_mount_permission+0x10a/0x410 [ 712.708310][ T2404] ? tomoyo_mount_acl+0x840/0x840 [ 712.713343][ T2404] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 712.719598][ T2404] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 712.725852][ T2404] ? strncpy_from_user+0x2b4/0x400 [ 712.730971][ T2404] tomoyo_sb_mount+0x35/0x40 [ 712.735658][ T2404] security_sb_mount+0x87/0xd0 [ 712.740432][ T2404] do_mount+0x1d4/0x1c30 [ 712.744687][ T2404] ? retint_kernel+0x2b/0x2b [ 712.749285][ T2404] ? copy_mount_string+0x40/0x40 [ 712.754226][ T2404] ? copy_mount_options+0x241/0x3f0 [ 712.759434][ T2404] ? copy_mount_options+0x24d/0x3f0 [ 712.764639][ T2404] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 712.764654][ T2404] ? copy_mount_options+0x2e8/0x3f0 [ 712.764671][ T2404] ksys_mount+0xdb/0x150 [ 712.764692][ T2404] __x64_sys_mount+0xbe/0x150 [ 712.776139][ T2404] do_syscall_64+0xfd/0x6a0 [ 712.776156][ T2404] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 712.776165][ T2404] RIP: 0033:0x45c27a [ 712.776181][ T2404] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 712.776188][ T2404] RSP: 002b:00007faa47624a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 712.827348][ T2404] RAX: ffffffffffffffda RBX: 00007faa47624b40 RCX: 000000000045c27a [ 712.835333][ T2404] RDX: 00007faa47624ae0 RSI: 0000000020000100 RDI: 00007faa47624b00 [ 712.843295][ T2404] RBP: 0000000000000001 R08: 00007faa47624b40 R09: 00007faa47624ae0 [ 712.851255][ T2404] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 712.859213][ T2404] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:24:58 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x8060000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:58 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600400039000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:58 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1, 0x1, 0x8, 0x6, @remote}, 0xfffffffffffffff1) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000200)="150300000600400000000200850cf7c41975e697080000026b2a2fcddad8897c6f11876d886b17b07783af113b860f84f789cca7a7659866a63deae307d02f74610000000000000000000000963c8b7fc0", 0x51, 0x0, 0x0, 0x0) recvfrom$inet6(r2, &(0x7f0000000180)=""/71, 0x2b, 0x4, 0x0, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) 22:24:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:58 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0xb000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:58 executing program 1 (fault-call:0 fault-nth:60): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:58 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x8848}}, 0x30) 22:24:58 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0xd000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:58 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600400042000200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 713.177310][ T2581] FAULT_INJECTION: forcing a failure. [ 713.177310][ T2581] name failslab, interval 1, probability 0, space 0, times 0 [ 713.243393][ T2581] CPU: 1 PID: 2581 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 713.251333][ T2581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 713.261398][ T2581] Call Trace: [ 713.264712][ T2581] dump_stack+0x172/0x1f0 [ 713.269071][ T2581] should_fail.cold+0xa/0x15 [ 713.273679][ T2581] ? fault_create_debugfs_attr+0x180/0x180 [ 713.279590][ T2581] ? nd_jump_link+0x1d0/0x1d0 [ 713.284277][ T2581] ? ___might_sleep+0x163/0x280 [ 713.289126][ T2581] __should_failslab+0x121/0x190 [ 713.294061][ T2581] should_failslab+0x9/0x14 [ 713.298572][ T2581] __kmalloc+0x2e0/0x770 [ 713.302816][ T2581] ? kmem_cache_alloc+0x314/0x710 [ 713.302831][ T2581] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 713.302844][ T2581] tomoyo_realpath_from_path+0xcd/0x7b0 [ 713.302866][ T2581] tomoyo_mount_acl+0x2cc/0x840 [ 713.302887][ T2581] ? __kasan_check_read+0x11/0x20 [ 713.329103][ T2581] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 713.334677][ T2581] ? debug_check_no_obj_freed+0xc0/0x43f 22:24:58 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x28000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 713.340314][ T2581] ? trace_hardirqs_off+0x62/0x240 [ 713.345440][ T2581] ? lock_acquire+0x190/0x410 [ 713.350139][ T2581] ? tomoyo_mount_permission+0x10a/0x410 [ 713.355782][ T2581] tomoyo_mount_permission+0x16a/0x410 [ 713.361249][ T2581] ? tomoyo_mount_permission+0x10a/0x410 [ 713.366893][ T2581] ? tomoyo_mount_acl+0x840/0x840 [ 713.371927][ T2581] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 713.378182][ T2581] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 713.384446][ T2581] ? strncpy_from_user+0x2b4/0x400 [ 713.389598][ T2581] tomoyo_sb_mount+0x35/0x40 22:24:58 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x3f000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 713.394198][ T2581] security_sb_mount+0x87/0xd0 [ 713.398976][ T2581] do_mount+0x1d4/0x1c30 [ 713.403232][ T2581] ? kasan_kmalloc+0x9/0x10 [ 713.407759][ T2581] ? copy_mount_string+0x40/0x40 [ 713.412714][ T2581] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 713.418991][ T2581] ? copy_mount_options+0x2e8/0x3f0 [ 713.424212][ T2581] ksys_mount+0xdb/0x150 [ 713.428468][ T2581] __x64_sys_mount+0xbe/0x150 [ 713.433170][ T2581] do_syscall_64+0xfd/0x6a0 [ 713.437714][ T2581] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 713.443604][ T2581] RIP: 0033:0x45c27a [ 713.447511][ T2581] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 713.467135][ T2581] RSP: 002b:00007faa47624a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 713.477092][ T2581] RAX: ffffffffffffffda RBX: 00007faa47624b40 RCX: 000000000045c27a [ 713.485074][ T2581] RDX: 00007faa47624ae0 RSI: 0000000020000100 RDI: 00007faa47624b00 22:24:58 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, &(0x7f0000000280)={0x5, 0x0, [{}, {}, {}, {}, {}]}) sendto$inet6(r2, &(0x7f0000000200)="150300000600400000000200850cf7c41975e697080000026b2a2fcddad8897c6f11876d886b17b07783af113b860f84f789cca7a7659866a63deae307d02f74610000000000000000000000963c8b7fc0", 0x51, 0x0, 0x0, 0x0) recvfrom$inet6(r2, &(0x7f0000000180)=""/71, 0x47, 0x0, 0x0, 0x0) 22:24:58 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x40000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:58 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 713.493053][ T2581] RBP: 0000000000000001 R08: 00007faa47624b40 R09: 00007faa47624ae0 [ 713.501035][ T2581] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 713.509033][ T2581] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 [ 713.519652][ T2581] ERROR: Out of memory at tomoyo_realpath_from_path. 22:24:59 executing program 1 (fault-call:0 fault-nth:61): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:59 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x8864}}, 0x30) 22:24:59 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x43050000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c0000001900010200000000000000141d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) 22:24:59 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="1503000006004000f4010200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:59 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x60000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 713.748476][ T2723] FAULT_INJECTION: forcing a failure. [ 713.748476][ T2723] name failslab, interval 1, probability 0, space 0, times 0 [ 713.777900][ T2723] CPU: 1 PID: 2723 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 713.785851][ T2723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 713.795929][ T2723] Call Trace: [ 713.799251][ T2723] dump_stack+0x172/0x1f0 [ 713.803694][ T2723] should_fail.cold+0xa/0x15 [ 713.808309][ T2723] ? fault_create_debugfs_attr+0x180/0x180 [ 713.814130][ T2723] ? ___might_sleep+0x163/0x280 [ 713.818999][ T2723] __should_failslab+0x121/0x190 [ 713.823954][ T2723] should_failslab+0x9/0x14 [ 713.828474][ T2723] __kmalloc+0x2e0/0x770 [ 713.832741][ T2723] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 713.838987][ T2723] ? d_absolute_path+0x11b/0x170 [ 713.843922][ T2723] ? __d_path+0x140/0x140 22:24:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:59 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x800e0000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 713.848248][ T2723] ? tomoyo_encode2.part.0+0xf5/0x400 [ 713.853613][ T2723] tomoyo_encode2.part.0+0xf5/0x400 [ 713.858822][ T2723] tomoyo_encode+0x2b/0x50 [ 713.863244][ T2723] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 713.868922][ T2723] tomoyo_mount_acl+0x2cc/0x840 [ 713.873785][ T2723] ? __kasan_check_read+0x11/0x20 [ 713.878825][ T2723] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 713.884388][ T2723] ? debug_check_no_obj_freed+0xc0/0x43f [ 713.890052][ T2723] ? trace_hardirqs_off+0x62/0x240 22:24:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 713.895201][ T2723] ? lock_acquire+0x190/0x410 [ 713.900043][ T2723] ? tomoyo_mount_permission+0x10a/0x410 [ 713.906023][ T2723] tomoyo_mount_permission+0x16a/0x410 [ 713.912367][ T2723] ? tomoyo_mount_permission+0x10a/0x410 [ 713.918393][ T2723] ? tomoyo_mount_acl+0x840/0x840 [ 713.923704][ T2723] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 713.930173][ T2723] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 713.936705][ T2723] ? strncpy_from_user+0x2b4/0x400 [ 713.942290][ T2723] tomoyo_sb_mount+0x35/0x40 [ 713.947548][ T2723] security_sb_mount+0x87/0xd0 [ 713.953858][ T2723] do_mount+0x1d4/0x1c30 [ 713.958453][ T2723] ? kasan_kmalloc+0x9/0x10 [ 713.963281][ T2723] ? copy_mount_string+0x40/0x40 [ 713.969367][ T2723] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 713.975618][ T2723] ? copy_mount_options+0x2e8/0x3f0 [ 713.980829][ T2723] ksys_mount+0xdb/0x150 [ 713.985089][ T2723] __x64_sys_mount+0xbe/0x150 [ 713.989780][ T2723] do_syscall_64+0xfd/0x6a0 [ 713.994300][ T2723] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 713.994312][ T2723] RIP: 0033:0x45c27a [ 713.994327][ T2723] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 713.994343][ T2723] RSP: 002b:00007faa47624a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 714.032119][ T2723] RAX: ffffffffffffffda RBX: 00007faa47624b40 RCX: 000000000045c27a [ 714.040089][ T2723] RDX: 00007faa47624ae0 RSI: 0000000020000100 RDI: 00007faa47624b00 22:24:59 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) getpeername$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge0\x00', r1}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @remote}, 0x14) r3 = dup(r0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r3, &(0x7f0000000200)="150300000600400000000200850cf7c41975e697080000026b2a2fcddad8897c6f11876d886b17b07783af113b860f84f789cca7a7659866a63deae307d02f74610000000000000000000000963c8b7fc0", 0x51, 0x0, 0x0, 0x0) recvfrom$inet6(r3, &(0x7f0000000180)=""/71, 0x47, 0x0, 0x0, 0x0) sendto$packet(r3, &(0x7f0000000080)="f88e38df7b9131c85258b3b1a9616450794eb186f90aa116218800c59fcd967112fb4330428f104b6de6d23130cb3bc2fce420a73b78abcdc2dd1f2ce0b9698e45e6fd889f720a92d79883e431fcdeaab11c01c055c01229c39ddaee4c98ffb88e60bc1a89a34e44536376ece3d7fb74a31662393a7169137ada7ef2665567f2f0a559adbd4013e41e14df637256d073f2f48ed09a03f670404cc2785f247ca61b109a46ee493e1249a4e0a9033d8fae0c20caaea8375e436d525fee3e7a0aa63af4be751f9fa9a41e6665c2e617a09c859c719a1689d2a1eb5ddb6e343ef7a1e2a7b2cedb2f2cb43cf57519e86fd4d2", 0xf0, 0x20000000, &(0x7f0000000300)={0x11, 0x4, r2, 0x1, 0x6, 0x6, @dev={[], 0x1b}}, 0x14) 22:24:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:59 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x80350000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 714.048091][ T2723] RBP: 0000000000000001 R08: 00007faa47624b40 R09: 00007faa47624ae0 [ 714.056059][ T2723] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 714.064053][ T2723] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 [ 714.076750][ T2723] ERROR: Out of memory at tomoyo_realpath_from_path. 22:24:59 executing program 1 (fault-call:0 fault-nth:62): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:24:59 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x8906}}, 0x30) 22:24:59 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x81000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:24:59 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="1503000006004000e8030200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:24:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:59 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x86ddffff, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 714.289611][ T2848] FAULT_INJECTION: forcing a failure. [ 714.289611][ T2848] name failslab, interval 1, probability 0, space 0, times 0 [ 714.342175][ T2848] CPU: 1 PID: 2848 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 714.350129][ T2848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 714.360196][ T2848] Call Trace: [ 714.364459][ T2848] dump_stack+0x172/0x1f0 [ 714.368823][ T2848] should_fail.cold+0xa/0x15 [ 714.373435][ T2848] ? fault_create_debugfs_attr+0x180/0x180 [ 714.379253][ T2848] ? ___might_sleep+0x163/0x280 [ 714.384136][ T2848] __should_failslab+0x121/0x190 [ 714.390577][ T2848] should_failslab+0x9/0x14 [ 714.395439][ T2848] __kmalloc+0x2e0/0x770 [ 714.399695][ T2848] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 714.405953][ T2848] ? d_absolute_path+0x11b/0x170 [ 714.410893][ T2848] ? __d_path+0x140/0x140 [ 714.415226][ T2848] ? tomoyo_encode2.part.0+0xf5/0x400 [ 714.420706][ T2848] tomoyo_encode2.part.0+0xf5/0x400 [ 714.425986][ T2848] tomoyo_encode+0x2b/0x50 [ 714.430409][ T2848] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 714.436057][ T2848] tomoyo_mount_acl+0x2cc/0x840 [ 714.440918][ T2848] ? __kasan_check_read+0x11/0x20 [ 714.445963][ T2848] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 714.451534][ T2848] ? debug_check_no_obj_freed+0xc0/0x43f [ 714.457179][ T2848] ? trace_hardirqs_off+0x62/0x240 [ 714.462325][ T2848] ? lock_acquire+0x190/0x410 [ 714.467034][ T2848] ? tomoyo_mount_permission+0x10a/0x410 [ 714.473223][ T2848] tomoyo_mount_permission+0x16a/0x410 [ 714.478706][ T2848] ? tomoyo_mount_permission+0x10a/0x410 [ 714.484371][ T2848] ? tomoyo_mount_acl+0x840/0x840 [ 714.489420][ T2848] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 714.495683][ T2848] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 714.495696][ T2848] ? strncpy_from_user+0x2b4/0x400 [ 714.495712][ T2848] tomoyo_sb_mount+0x35/0x40 [ 714.495735][ T2848] security_sb_mount+0x87/0xd0 [ 714.511681][ T2848] do_mount+0x1d4/0x1c30 [ 714.520698][ T2848] ? kasan_kmalloc+0x9/0x10 [ 714.525219][ T2848] ? copy_mount_string+0x40/0x40 [ 714.530179][ T2848] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 714.536430][ T2848] ? copy_mount_options+0x2e8/0x3f0 [ 714.541659][ T2848] ksys_mount+0xdb/0x150 [ 714.545907][ T2848] __x64_sys_mount+0xbe/0x150 [ 714.550597][ T2848] do_syscall_64+0xfd/0x6a0 [ 714.555115][ T2848] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 714.561046][ T2848] RIP: 0033:0x45c27a [ 714.564950][ T2848] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 714.584653][ T2848] RSP: 002b:00007faa47624a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 22:24:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:24:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:25:00 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000200)="150300000600400000000200850cf7c41975e697080000026b2a2fcddad8897c6f11876d886b17b07783af113b860f84f789cca7a7659866a63deae307d02f74610000000000000000000000963c8b7fc0", 0x51, 0x0, 0x0, 0x0) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000080)={0x1, 0x9, [@random="99324e609dc7", @broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @remote, @dev={[], 0x2a}, @empty, @broadcast, @remote, @broadcast]}) recvfrom$inet6(r2, &(0x7f0000000180)=""/71, 0x47, 0x0, 0x0, 0x0) 22:25:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 714.584667][ T2848] RAX: ffffffffffffffda RBX: 00007faa47624b40 RCX: 000000000045c27a [ 714.584674][ T2848] RDX: 00007faa47624ae0 RSI: 0000000020000100 RDI: 00007faa47624b00 [ 714.584682][ T2848] RBP: 0000000000000001 R08: 00007faa47624b40 R09: 00007faa47624ae0 [ 714.584689][ T2848] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 714.584708][ T2848] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 [ 714.613215][ T2848] ERROR: Out of memory at tomoyo_realpath_from_path. 22:25:00 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x88470000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:25:00 executing program 1 (fault-call:0 fault-nth:63): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:25:00 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0xe803}}, 0x30) 22:25:00 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600400000050200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:25:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:25:00 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x88480000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 714.857418][ T3096] FAULT_INJECTION: forcing a failure. [ 714.857418][ T3096] name failslab, interval 1, probability 0, space 0, times 0 22:25:00 executing program 3: r0 = socket$packet(0x11, 0x1, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) r2 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x200000) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f00000002c0)={'filter\x00', 0x4}, 0x68) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r3 = dup(r0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x20000, 0x0) sendto$inet6(r3, &(0x7f0000000200)="150300000600400000000200850cf7c41975e697080000026b2a2fcddad8897c6f11876d886b17b07783af113b860f84f789cca7a7659866a63deae307d02f74610000000000000000000000963c8b7fc0", 0x51, 0x0, 0x0, 0x0) recvfrom$inet6(r3, &(0x7f0000000180)=""/71, 0x47, 0x0, 0x0, 0x0) [ 714.900905][ T3096] CPU: 0 PID: 3096 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 714.908878][ T3096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 714.918944][ T3096] Call Trace: [ 714.922262][ T3096] dump_stack+0x172/0x1f0 [ 714.926608][ T3096] should_fail.cold+0xa/0x15 [ 714.931228][ T3096] ? __kasan_check_read+0x11/0x20 [ 714.936265][ T3096] ? fault_create_debugfs_attr+0x180/0x180 [ 714.942091][ T3096] ? page_to_nid.part.0+0x20/0x20 [ 714.947126][ T3096] ? ___might_sleep+0x163/0x280 [ 714.951989][ T3096] __should_failslab+0x121/0x190 [ 714.956939][ T3096] should_failslab+0x9/0x14 [ 714.956954][ T3096] kmem_cache_alloc_trace+0x2d3/0x790 [ 714.956971][ T3096] ? lockdep_init_map+0x1be/0x6d0 [ 714.956991][ T3096] legacy_init_fs_context+0x48/0xe0 [ 714.957014][ T3096] ? generic_parse_monolithic+0x200/0x200 [ 714.957029][ T3096] alloc_fs_context+0x3d1/0x6c0 [ 714.957045][ T3096] fs_context_for_mount+0x25/0x30 [ 714.957059][ T3096] vfs_kern_mount.part.0+0x28/0xf0 [ 714.957080][ T3096] vfs_kern_mount+0x40/0x60 [ 714.977229][ T3096] btrfs_mount+0x2b4/0x15e2 [ 714.977246][ T3096] ? __kasan_check_read+0x11/0x20 [ 714.977271][ T3096] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 714.992845][ T3096] ? should_fail+0x1de/0x852 [ 714.992862][ T3096] ? fault_create_debugfs_attr+0x180/0x180 [ 714.992881][ T3096] ? btrfs_remount+0x10f0/0x10f0 [ 714.992901][ T3096] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 714.992924][ T3096] ? refcount_sub_and_test_checked+0x154/0x200 [ 715.046125][ T3096] ? refcount_dec_not_one+0x1f0/0x1f0 22:25:00 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x88640000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:25:00 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x88a8ffff, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 715.051600][ T3096] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 715.057848][ T3096] ? legacy_parse_param+0x116/0x880 [ 715.063049][ T3096] ? __lookup_constant+0xd6/0x100 [ 715.068079][ T3096] ? refcount_dec_and_test_checked+0x1b/0x20 [ 715.074081][ T3096] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 715.080421][ T3096] ? apparmor_capable+0x2ed/0x630 [ 715.085451][ T3096] ? cap_capable+0x205/0x270 [ 715.090062][ T3096] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 715.096331][ T3096] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 715.102587][ T3096] ? btrfs_remount+0x10f0/0x10f0 [ 715.107547][ T3096] legacy_get_tree+0x108/0x220 [ 715.112333][ T3096] ? legacy_get_tree+0x108/0x220 [ 715.117284][ T3096] vfs_get_tree+0x8e/0x390 [ 715.121708][ T3096] do_mount+0x13b3/0x1c30 [ 715.126050][ T3096] ? copy_mount_string+0x40/0x40 [ 715.131016][ T3096] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 715.137260][ T3096] ? copy_mount_options+0x2e8/0x3f0 [ 715.142464][ T3096] ksys_mount+0xdb/0x150 [ 715.146711][ T3096] __x64_sys_mount+0xbe/0x150 [ 715.151398][ T3096] do_syscall_64+0xfd/0x6a0 [ 715.155918][ T3096] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 715.161815][ T3096] RIP: 0033:0x45c27a [ 715.165718][ T3096] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 715.185332][ T3096] RSP: 002b:00007faa47624a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 715.193759][ T3096] RAX: ffffffffffffffda RBX: 00007faa47624b40 RCX: 000000000045c27a 22:25:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c0000001900010200030000000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) 22:25:00 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x88caffff, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:25:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c0000001900010200040000000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) 22:25:00 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") set_robust_list(&(0x7f00000002c0)={&(0x7f00000000c0)={&(0x7f0000000080)}, 0x4, &(0x7f0000000280)={&(0x7f0000000100)}}, 0x18) sendto$inet6(r2, &(0x7f0000000200)="150300000600400000000200850cf7c41975e697080000026b2a2fcddad8897c6f11876d886b17b07783af113b860f84f789cca7a7659866a63deae307d02f74610000000000000000000000963c8b7fc0", 0x51, 0x0, 0x0, 0x0) recvfrom$inet6(r2, &(0x7f0000000180)=""/71, 0x47, 0x0, 0x0, 0x0) [ 715.201740][ T3096] RDX: 00007faa47624ae0 RSI: 0000000020000100 RDI: 00007faa47624b00 [ 715.209727][ T3096] RBP: 0000000000000001 R08: 00007faa47624b40 R09: 00007faa47624ae0 [ 715.217715][ T3096] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 715.225699][ T3096] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:25:00 executing program 1 (fault-call:0 fault-nth:64): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:25:00 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0xf401}}, 0x30) 22:25:00 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x89060000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:25:00 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="1503000006004000000a0200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:25:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 715.454707][ T3281] FAULT_INJECTION: forcing a failure. [ 715.454707][ T3281] name failslab, interval 1, probability 0, space 0, times 0 [ 715.486431][ T3281] CPU: 0 PID: 3281 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 715.494380][ T3281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 715.504450][ T3281] Call Trace: [ 715.507759][ T3281] dump_stack+0x172/0x1f0 [ 715.512154][ T3281] should_fail.cold+0xa/0x15 [ 715.516752][ T3281] ? __kasan_check_read+0x11/0x20 [ 715.521787][ T3281] ? fault_create_debugfs_attr+0x180/0x180 [ 715.527604][ T3281] ? page_to_nid.part.0+0x20/0x20 [ 715.532641][ T3281] ? ___might_sleep+0x163/0x280 [ 715.537507][ T3281] __should_failslab+0x121/0x190 [ 715.542458][ T3281] should_failslab+0x9/0x14 [ 715.546972][ T3281] kmem_cache_alloc_trace+0x2d3/0x790 [ 715.552364][ T3281] ? lockdep_init_map+0x1be/0x6d0 [ 715.557403][ T3281] legacy_init_fs_context+0x48/0xe0 [ 715.562611][ T3281] ? generic_parse_monolithic+0x200/0x200 [ 715.568423][ T3281] alloc_fs_context+0x3d1/0x6c0 [ 715.573288][ T3281] fs_context_for_mount+0x25/0x30 [ 715.578326][ T3281] vfs_kern_mount.part.0+0x28/0xf0 [ 715.583449][ T3281] vfs_kern_mount+0x40/0x60 [ 715.587974][ T3281] btrfs_mount+0x2b4/0x15e2 [ 715.592490][ T3281] ? __kasan_check_read+0x11/0x20 [ 715.597528][ T3281] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 22:25:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:25:00 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x8dffffff, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:25:01 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0xa0010000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 715.603867][ T3281] ? should_fail+0x1de/0x852 [ 715.608468][ T3281] ? fault_create_debugfs_attr+0x180/0x180 [ 715.614296][ T3281] ? btrfs_remount+0x10f0/0x10f0 [ 715.619249][ T3281] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 715.625501][ T3281] ? refcount_sub_and_test_checked+0x154/0x200 [ 715.631665][ T3281] ? refcount_dec_not_one+0x1f0/0x1f0 [ 715.637048][ T3281] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 715.643295][ T3281] ? legacy_parse_param+0x116/0x880 [ 715.648501][ T3281] ? __lookup_constant+0xd6/0x100 22:25:01 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0xf5ffffff, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 715.653539][ T3281] ? refcount_dec_and_test_checked+0x1b/0x20 [ 715.659534][ T3281] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 715.665783][ T3281] ? apparmor_capable+0x2ed/0x630 [ 715.670804][ T3281] ? cap_capable+0x205/0x270 [ 715.675403][ T3281] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 715.681658][ T3281] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 715.687909][ T3281] ? btrfs_remount+0x10f0/0x10f0 [ 715.692864][ T3281] legacy_get_tree+0x108/0x220 [ 715.697639][ T3281] ? legacy_get_tree+0x108/0x220 22:25:01 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0xffffa888, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:25:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 715.702678][ T3281] vfs_get_tree+0x8e/0x390 [ 715.707107][ T3281] do_mount+0x13b3/0x1c30 [ 715.711458][ T3281] ? copy_mount_string+0x40/0x40 [ 715.716409][ T3281] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 715.722666][ T3281] ? copy_mount_options+0x2e8/0x3f0 [ 715.727878][ T3281] ksys_mount+0xdb/0x150 [ 715.732128][ T3281] __x64_sys_mount+0xbe/0x150 [ 715.736818][ T3281] do_syscall_64+0xfd/0x6a0 [ 715.741347][ T3281] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 715.747241][ T3281] RIP: 0033:0x45c27a [ 715.751144][ T3281] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 715.770758][ T3281] RSP: 002b:00007faa47624a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 715.770772][ T3281] RAX: ffffffffffffffda RBX: 00007faa47624b40 RCX: 000000000045c27a [ 715.770779][ T3281] RDX: 00007faa47624ae0 RSI: 0000000020000100 RDI: 00007faa47624b00 [ 715.770786][ T3281] RBP: 0000000000000001 R08: 00007faa47624b40 R09: 00007faa47624ae0 [ 715.770792][ T3281] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 715.770799][ T3281] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:25:01 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x1, 0x2, [0x9, 0x3]}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000280)={r4, @in6={{0xa, 0x4e24, 0x200, @rand_addr="d6eff61d04a7be7934d0599e9bfe4536", 0x81}}, 0x5, 0x6, 0x4, 0x0, 0x200000000}, &(0x7f0000000100)=0x98) sendto$inet6(r2, &(0x7f0000000200)="150300000600400000000200850cf7c41975e697080000026b2a2fcddad8897c6f11876d886b17b07783af113b860f84f789cca7a7659866a63deae307d02f74610000000000000000000000963c8b7fc0", 0x51, 0x0, 0x0, 0x0) ioctl$VIDIOC_QUERY_DV_TIMINGS(r2, 0x80845663, &(0x7f0000000340)={0x0, @reserved}) recvfrom$inet6(r2, &(0x7f0000000180)=""/71, 0x47, 0x0, 0x0, 0x0) 22:25:01 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0xffffca88, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:25:01 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x34000}}, 0x30) 22:25:01 executing program 1 (fault-call:0 fault-nth:65): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:25:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:25:01 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="1503000006004000000c0200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:25:01 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0xffffdd86, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:25:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 716.310025][ T3441] FAULT_INJECTION: forcing a failure. [ 716.310025][ T3441] name failslab, interval 1, probability 0, space 0, times 0 [ 716.368621][ T3441] CPU: 0 PID: 3441 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 716.376564][ T3441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 716.387887][ T3441] Call Trace: [ 716.396503][ T3441] dump_stack+0x172/0x1f0 [ 716.400852][ T3441] should_fail.cold+0xa/0x15 [ 716.405562][ T3441] ? fault_create_debugfs_attr+0x180/0x180 [ 716.411395][ T3441] ? page_to_nid.part.0+0x20/0x20 [ 716.416434][ T3441] ? ___might_sleep+0x163/0x280 [ 716.421554][ T3441] __should_failslab+0x121/0x190 [ 716.426494][ T3441] should_failslab+0x9/0x14 [ 716.431021][ T3441] __kmalloc_track_caller+0x2dc/0x760 [ 716.436400][ T3441] ? kasan_unpoison_shadow+0x35/0x50 [ 716.441701][ T3441] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 716.447522][ T3441] ? vfs_parse_fs_string+0xe8/0x170 [ 716.452732][ T3441] kmemdup_nul+0x31/0xa0 [ 716.452750][ T3441] vfs_parse_fs_string+0xe8/0x170 [ 716.452772][ T3441] ? vfs_parse_fs_param+0x540/0x540 [ 716.467307][ T3441] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 716.467333][ T3441] ? alloc_fs_context+0x422/0x6c0 [ 716.478610][ T3441] do_mount+0x700/0x1c30 [ 716.482878][ T3441] ? copy_mount_string+0x40/0x40 [ 716.487834][ T3441] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 716.494093][ T3441] ? copy_mount_options+0x2e8/0x3f0 [ 716.499312][ T3441] ksys_mount+0xdb/0x150 [ 716.503562][ T3441] __x64_sys_mount+0xbe/0x150 [ 716.508251][ T3441] do_syscall_64+0xfd/0x6a0 [ 716.512765][ T3441] entry_SYSCALL_64_after_hwframe+0x49/0xbe 22:25:01 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0xfffff000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:25:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c00000019000102000b0000000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) 22:25:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 716.518660][ T3441] RIP: 0033:0x45c27a [ 716.522562][ T3441] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 716.542175][ T3441] RSP: 002b:00007faa47624a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 716.550592][ T3441] RAX: ffffffffffffffda RBX: 00007faa47624b40 RCX: 000000000045c27a [ 716.558571][ T3441] RDX: 00007faa47624ae0 RSI: 0000000020000100 RDI: 00007faa47624b00 22:25:01 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0xffffff8d, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 716.558579][ T3441] RBP: 0000000000000001 R08: 00007faa47624b40 R09: 00007faa47624ae0 [ 716.558586][ T3441] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 716.558592][ T3441] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:25:02 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000200)="150300000600400000000200850cf7c41975e697080000026b2a2fcddad8897c6f11876d886b17b07783af113b860f84f789cca7a7659866a63deae307d02f74610000000000000000000000963c8b7fc0", 0x51, 0x0, 0x0, 0x0) r4 = socket(0xa, 0x4000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x100000000000000, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f0000000280)={{0xffffffffffffffff, 0x0, 0x1f, 0x0, 0x254e}, 0x0, 0x6, 'id1\x00', 'timer0\x00', 0x0, 0x27, 0x1000, 0x84, 0xea}) recvfrom$inet6(r2, &(0x7f0000000180)=""/71, 0x47, 0x0, 0x0, 0x0) ioctl$SIOCX25SCUDMATCHLEN(r2, 0x89e7, &(0x7f0000000080)={0x75}) socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_bt_cmtp_CMTPCONNADD(r2, 0x400443c8, &(0x7f00000000c0)={r2, 0x1}) 22:25:02 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="1503000006004000000d0200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:25:02 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x400300}}, 0x30) 22:25:02 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0xfffffff5, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:25:02 executing program 1 (fault-call:0 fault-nth:66): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:25:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:25:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 716.877493][ T3582] FAULT_INJECTION: forcing a failure. [ 716.877493][ T3582] name failslab, interval 1, probability 0, space 0, times 0 [ 716.921041][ T3582] CPU: 1 PID: 3582 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 716.929005][ T3582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 716.939062][ T3582] Call Trace: [ 716.939093][ T3582] dump_stack+0x172/0x1f0 [ 716.939117][ T3582] should_fail.cold+0xa/0x15 [ 716.939138][ T3582] ? fault_create_debugfs_attr+0x180/0x180 [ 716.939171][ T3582] ? page_to_nid.part.0+0x20/0x20 [ 716.939199][ T3582] ? ___might_sleep+0x163/0x280 22:25:02 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x1a0ffffffff, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:25:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 716.967026][ T3582] __should_failslab+0x121/0x190 [ 716.971985][ T3582] should_failslab+0x9/0x14 [ 716.976515][ T3582] __kmalloc_track_caller+0x2dc/0x760 [ 716.981900][ T3582] ? legacy_init_fs_context+0x48/0xe0 [ 716.987276][ T3582] ? alloc_fs_context+0x3d1/0x6c0 [ 716.992301][ T3582] ? fs_context_for_mount+0x25/0x30 [ 716.997519][ T3582] ? do_mount+0x132d/0x1c30 [ 717.002036][ T3582] ? ksys_mount+0xdb/0x150 [ 717.006543][ T3582] ? __x64_sys_mount+0xbe/0x150 [ 717.011401][ T3582] ? do_syscall_64+0xfd/0x6a0 [ 717.016080][ T3582] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 717.022154][ T3582] ? btrfs_mount+0xdc/0x15e2 [ 717.026756][ T3582] kstrdup+0x3a/0x70 [ 717.030654][ T3582] ? btrfs_remount+0x10f0/0x10f0 [ 717.035588][ T3582] btrfs_mount+0xdc/0x15e2 [ 717.035603][ T3582] ? __kasan_check_read+0x11/0x20 [ 717.035620][ T3582] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 717.035635][ T3582] ? should_fail+0x1de/0x852 [ 717.035650][ T3582] ? fault_create_debugfs_attr+0x180/0x180 [ 717.035668][ T3582] ? page_to_nid.part.0+0x20/0x20 [ 717.035688][ T3582] ? btrfs_remount+0x10f0/0x10f0 22:25:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:25:02 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x1000000000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 717.071773][ T3582] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 717.078024][ T3582] ? refcount_sub_and_test_checked+0x154/0x200 [ 717.084188][ T3582] ? refcount_dec_not_one+0x1f0/0x1f0 [ 717.089572][ T3582] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 717.095823][ T3582] ? legacy_parse_param+0x116/0x880 [ 717.101028][ T3582] ? __lookup_constant+0xd6/0x100 [ 717.106152][ T3582] ? refcount_dec_and_test_checked+0x1b/0x20 [ 717.112162][ T3582] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 22:25:02 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0xf0ffffffffffff, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 717.118418][ T3582] ? apparmor_capable+0x2ed/0x630 [ 717.123465][ T3582] ? cap_capable+0x205/0x270 [ 717.128083][ T3582] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 717.134335][ T3582] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 717.140585][ T3582] ? btrfs_remount+0x10f0/0x10f0 [ 717.145540][ T3582] legacy_get_tree+0x108/0x220 [ 717.150314][ T3582] ? legacy_get_tree+0x108/0x220 [ 717.155261][ T3582] vfs_get_tree+0x8e/0x390 [ 717.159692][ T3582] do_mount+0x13b3/0x1c30 [ 717.164042][ T3582] ? copy_mount_string+0x40/0x40 [ 717.168991][ T3582] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 717.175241][ T3582] ? copy_mount_options+0x2e8/0x3f0 [ 717.180474][ T3582] ksys_mount+0xdb/0x150 [ 717.184732][ T3582] __x64_sys_mount+0xbe/0x150 [ 717.189423][ T3582] do_syscall_64+0xfd/0x6a0 [ 717.193944][ T3582] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 717.199846][ T3582] RIP: 0033:0x45c27a [ 717.203743][ T3582] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 717.223356][ T3582] RSP: 002b:00007faa47624a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 717.231785][ T3582] RAX: ffffffffffffffda RBX: 00007faa47624b40 RCX: 000000000045c27a [ 717.239773][ T3582] RDX: 00007faa47624ae0 RSI: 0000000020000100 RDI: 00007faa47624b00 [ 717.247750][ T3582] RBP: 0000000000000001 R08: 00007faa47624b40 R09: 00007faa47624ae0 [ 717.247758][ T3582] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 717.247765][ T3582] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:25:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c0000001900010200120000000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) 22:25:02 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x100000000000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:25:02 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="1503000006004000000e0200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:25:02 executing program 1 (fault-call:0 fault-nth:67): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:25:02 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$can_raw(r2, &(0x7f0000000380)={&(0x7f0000000280)={0x1d, r1}, 0x10, &(0x7f0000000340)={&(0x7f00000002c0)=@canfd={{0x0, 0x474f15f8, 0x7, 0x3}, 0xf, 0x2, 0x0, 0x0, "53e46326fdb40886bbdc292072e19a3cddbce4cf5d708dfcc3c018ca4f9a922f30b0f22c9d7cec0f97c0e689f86214f04f4a93a64ebf2d2f5ae7b94c73f38d7c"}, 0x48}, 0x1, 0x0, 0x0, 0x4000080}, 0x20000040) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000200)="150300000600400000000200850cf7c41975e697080000026b2a2fcddad8897c6f11876d886b17b07783af113b860f84f789cca7a7659866a63deae307d02f74610000000000000000000000963c8b7fc0", 0x51, 0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r2, 0x80845663, &(0x7f0000000080)) recvfrom$inet6(r2, &(0x7f0000000180)=""/71, 0x47, 0x0, 0x0, 0x0) 22:25:02 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x1000000}}, 0x30) 22:25:02 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x200000000000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 717.490571][ T3738] FAULT_INJECTION: forcing a failure. [ 717.490571][ T3738] name failslab, interval 1, probability 0, space 0, times 0 [ 717.503222][ T3738] CPU: 1 PID: 3738 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 717.511130][ T3738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 717.521256][ T3738] Call Trace: [ 717.524599][ T3738] dump_stack+0x172/0x1f0 [ 717.528969][ T3738] should_fail.cold+0xa/0x15 [ 717.533576][ T3738] ? fault_create_debugfs_attr+0x180/0x180 22:25:02 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x300000000000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 717.539396][ T3738] ? percpu_ref_tryget_live+0x290/0x290 [ 717.544968][ T3738] __should_failslab+0x121/0x190 [ 717.549928][ T3738] should_failslab+0x9/0x14 [ 717.554543][ T3738] kmem_cache_alloc+0x47/0x710 [ 717.559331][ T3738] ? refill_stock+0x19c/0x230 [ 717.564022][ T3738] xas_alloc+0x346/0x460 [ 717.568282][ T3738] xas_create+0x2cd/0x1060 [ 717.572709][ T3738] ? mark_held_locks+0xf0/0xf0 [ 717.577493][ T3738] xas_store+0x9a/0x1a00 [ 717.581757][ T3738] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 22:25:02 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x400000000000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 717.588020][ T3738] ? xas_start+0x166/0x560 [ 717.592563][ T3738] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 717.598825][ T3738] ? xas_load+0x67/0x150 [ 717.603094][ T3738] __add_to_page_cache_locked+0x5d8/0xec0 [ 717.608837][ T3738] ? __kasan_check_read+0x11/0x20 [ 717.613983][ T3738] ? __page_cache_alloc+0x480/0x480 [ 717.619201][ T3738] ? __alloc_pages_nodemask+0x576/0x8f0 [ 717.624767][ T3738] ? count_shadow_nodes+0x830/0x830 [ 717.630071][ T3738] add_to_page_cache_lru+0x1d8/0x790 [ 717.635367][ T3738] ? add_to_page_cache_locked+0x40/0x40 [ 717.640913][ T3738] ? __page_cache_alloc+0x116/0x480 [ 717.646126][ T3738] do_read_cache_page+0x499/0xb90 [ 717.651159][ T3738] read_cache_page_gfp+0x28/0x30 [ 717.656106][ T3738] btrfs_scan_one_device+0x19b/0x710 [ 717.661397][ T3738] ? device_list_add+0x14f0/0x14f0 [ 717.666514][ T3738] ? trace_hardirqs_off+0x230/0x240 [ 717.671716][ T3738] ? btrfs_mount_root+0xb2f/0x1290 [ 717.676829][ T3738] btrfs_mount_root+0x711/0x1290 [ 717.681780][ T3738] ? btrfs_decode_error+0x70/0x70 [ 717.686819][ T3738] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 717.693061][ T3738] ? legacy_parse_param+0x116/0x880 [ 717.698252][ T3738] ? __lookup_constant+0xd6/0x100 [ 717.703279][ T3738] ? security_fs_context_parse_param+0x81/0xb0 [ 717.709436][ T3738] ? logfc+0x700/0x700 [ 717.713513][ T3738] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 717.719773][ T3738] ? vfs_parse_fs_param+0xcd/0x540 [ 717.724881][ T3738] ? kfree+0x1fd/0x2c0 [ 717.728957][ T3738] ? vfs_parse_fs_string+0x116/0x170 [ 717.734238][ T3738] ? vfs_parse_fs_param+0x540/0x540 [ 717.739438][ T3738] ? btrfs_decode_error+0x70/0x70 [ 717.744461][ T3738] legacy_get_tree+0x108/0x220 [ 717.749232][ T3738] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 717.756606][ T3738] vfs_get_tree+0x8e/0x390 [ 717.761017][ T3738] fc_mount+0x17/0xc0 [ 717.764996][ T3738] vfs_kern_mount.part.0+0xd8/0xf0 [ 717.770106][ T3738] vfs_kern_mount+0x40/0x60 [ 717.774616][ T3738] btrfs_mount+0x2b4/0x15e2 [ 717.779115][ T3738] ? __kasan_check_read+0x11/0x20 [ 717.784227][ T3738] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 717.790466][ T3738] ? should_fail+0x1de/0x852 [ 717.795067][ T3738] ? fault_create_debugfs_attr+0x180/0x180 [ 717.800884][ T3738] ? btrfs_remount+0x10f0/0x10f0 [ 717.805836][ T3738] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 717.812097][ T3738] ? refcount_sub_and_test_checked+0x154/0x200 [ 717.818261][ T3738] ? refcount_dec_not_one+0x1f0/0x1f0 [ 717.823639][ T3738] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 717.829887][ T3738] ? legacy_parse_param+0x116/0x880 [ 717.835090][ T3738] ? __lookup_constant+0xd6/0x100 [ 717.840122][ T3738] ? refcount_dec_and_test_checked+0x1b/0x20 [ 717.846103][ T3738] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 717.852350][ T3738] ? apparmor_capable+0x2ed/0x630 [ 717.857378][ T3738] ? cap_capable+0x205/0x270 [ 717.861975][ T3738] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 717.868230][ T3738] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 717.874482][ T3738] ? btrfs_remount+0x10f0/0x10f0 [ 717.879437][ T3738] legacy_get_tree+0x108/0x220 [ 717.884209][ T3738] ? legacy_get_tree+0x108/0x220 [ 717.889152][ T3738] vfs_get_tree+0x8e/0x390 [ 717.893577][ T3738] do_mount+0x13b3/0x1c30 [ 717.897925][ T3738] ? copy_mount_string+0x40/0x40 [ 717.902880][ T3738] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 717.909143][ T3738] ? _copy_from_user+0x12c/0x1a0 [ 717.914102][ T3738] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 717.920360][ T3738] ? copy_mount_options+0x2e8/0x3f0 [ 717.925558][ T3738] ksys_mount+0xdb/0x150 [ 717.929801][ T3738] __x64_sys_mount+0xbe/0x150 [ 717.934480][ T3738] do_syscall_64+0xfd/0x6a0 [ 717.938997][ T3738] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 717.944893][ T3738] RIP: 0033:0x45c27a [ 717.948792][ T3738] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 717.968413][ T3738] RSP: 002b:00007faa47624a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 717.976838][ T3738] RAX: ffffffffffffffda RBX: 00007faa47624b40 RCX: 000000000045c27a [ 717.984822][ T3738] RDX: 00007faa47624ae0 RSI: 0000000020000100 RDI: 00007faa47624b00 22:25:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 717.992802][ T3738] RBP: 0000000000000001 R08: 00007faa47624b40 R09: 00007faa47624ae0 [ 718.000799][ T3738] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 718.008776][ T3738] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:25:03 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x500000000000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:25:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:25:03 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x600000000000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:25:03 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x700000000000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:25:03 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600400000110200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:25:03 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x2000000}}, 0x30) 22:25:03 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$isdn(r2, &(0x7f00000002c0)={0x7, 0x400000, "e6875194a03324a8228d6d71f7c79c9265791c067d00bad070bfe6bf004a32d3e32ff574bade86bba9547c294716f6a083dc923a0451298f548f0085a6de579e1b72d26a762dab2337b78b9dc71d1ddc19f4942438552086b427e3370f81ab6e0a3c96585239dbc70ac5fb8095739585cd6e1ca637311a1cdb67e26927e863c1c92ad45a44015cc7fff0ad82be0edfdf7266900cb802"}, 0x9e, 0x10, &(0x7f0000000380)={0x22, 0x94a, 0x6, 0x5, 0x9}, 0x6) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") getpeername$packet(r0, &(0x7f0000000100), &(0x7f0000000280)=0x14) sendto$inet6(r2, &(0x7f0000000200)="150300000600400000000200850cf7c41975e697080000026b2a2fcddad8897c6f11876d886b17b07783af113b860f84f789cca7a7659866a63deae307d02f74610000000000000000000000963c8b7fc0", 0x51, 0x0, 0x0, 0x0) recvfrom$inet6(r2, &(0x7f0000000180)=""/71, 0x47, 0x0, 0x0, 0x0) fsetxattr$security_smack_entry(r2, &(0x7f0000000080)='security.SMACK64MMAP\x00', &(0x7f00000000c0)='bridge0\x00', 0x8, 0x3) 22:25:03 executing program 1 (fault-call:0 fault-nth:68): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:25:03 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x800000000000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:25:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 718.449497][ T3887] FAULT_INJECTION: forcing a failure. [ 718.449497][ T3887] name failslab, interval 1, probability 0, space 0, times 0 22:25:03 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x4000000}}, 0x30) [ 718.494385][ T3887] CPU: 0 PID: 3887 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 718.502327][ T3887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 718.512386][ T3887] Call Trace: [ 718.515703][ T3887] dump_stack+0x172/0x1f0 [ 718.520057][ T3887] should_fail.cold+0xa/0x15 [ 718.524765][ T3887] ? fault_create_debugfs_attr+0x180/0x180 [ 718.530587][ T3887] ? page_to_nid.part.0+0x20/0x20 [ 718.535632][ T3887] ? ___might_sleep+0x163/0x280 [ 718.540534][ T3887] __should_failslab+0x121/0x190 [ 718.545490][ T3887] should_failslab+0x9/0x14 [ 718.550034][ T3887] kmem_cache_alloc_trace+0x2d3/0x790 [ 718.555420][ T3887] ? kasan_kmalloc+0x9/0x10 [ 718.559934][ T3887] ? __kmalloc_node+0x4e/0x70 [ 718.564629][ T3887] btrfs_mount_root+0x174/0x1290 [ 718.569580][ T3887] ? btrfs_decode_error+0x70/0x70 [ 718.574625][ T3887] ? logfc+0x700/0x700 [ 718.578690][ T3887] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 718.584916][ T3887] ? legacy_parse_param+0x116/0x880 [ 718.590103][ T3887] ? __lookup_constant+0xd6/0x100 [ 718.595122][ T3887] ? security_fs_context_parse_param+0x81/0xb0 [ 718.601259][ T3887] ? logfc+0x700/0x700 [ 718.605314][ T3887] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 718.611552][ T3887] ? vfs_parse_fs_param+0xcd/0x540 [ 718.616675][ T3887] ? kfree+0x1fd/0x2c0 [ 718.620753][ T3887] ? vfs_parse_fs_string+0x116/0x170 [ 718.626044][ T3887] ? vfs_parse_fs_param+0x540/0x540 [ 718.631234][ T3887] ? btrfs_decode_error+0x70/0x70 [ 718.636259][ T3887] legacy_get_tree+0x108/0x220 [ 718.641043][ T3887] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 718.647283][ T3887] vfs_get_tree+0x8e/0x390 [ 718.651701][ T3887] fc_mount+0x17/0xc0 [ 718.655678][ T3887] vfs_kern_mount.part.0+0xd8/0xf0 [ 718.660787][ T3887] vfs_kern_mount+0x40/0x60 [ 718.665281][ T3887] btrfs_mount+0x2b4/0x15e2 [ 718.669796][ T3887] ? __kasan_check_read+0x11/0x20 [ 718.674821][ T3887] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 718.681057][ T3887] ? should_fail+0x1de/0x852 [ 718.685641][ T3887] ? fault_create_debugfs_attr+0x180/0x180 [ 718.691461][ T3887] ? btrfs_remount+0x10f0/0x10f0 [ 718.696407][ T3887] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 718.702677][ T3887] ? refcount_sub_and_test_checked+0x154/0x200 [ 718.708825][ T3887] ? refcount_dec_not_one+0x1f0/0x1f0 [ 718.714201][ T3887] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 718.720585][ T3887] ? legacy_parse_param+0x116/0x880 [ 718.725792][ T3887] ? __lookup_constant+0xd6/0x100 [ 718.730805][ T3887] ? refcount_dec_and_test_checked+0x1b/0x20 [ 718.736784][ T3887] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 718.743035][ T3887] ? apparmor_capable+0x2ed/0x630 [ 718.748046][ T3887] ? cap_capable+0x205/0x270 [ 718.752631][ T3887] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 718.758872][ T3887] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 718.765117][ T3887] ? btrfs_remount+0x10f0/0x10f0 [ 718.770052][ T3887] legacy_get_tree+0x108/0x220 [ 718.774807][ T3887] ? legacy_get_tree+0x108/0x220 [ 718.779735][ T3887] vfs_get_tree+0x8e/0x390 [ 718.784137][ T3887] do_mount+0x13b3/0x1c30 [ 718.788458][ T3887] ? copy_mount_string+0x40/0x40 [ 718.793402][ T3887] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 718.799634][ T3887] ? copy_mount_options+0x2e8/0x3f0 [ 718.804819][ T3887] ksys_mount+0xdb/0x150 [ 718.809050][ T3887] __x64_sys_mount+0xbe/0x150 [ 718.813716][ T3887] do_syscall_64+0xfd/0x6a0 [ 718.818206][ T3887] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 718.824091][ T3887] RIP: 0033:0x45c27a 22:25:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:25:04 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x806000000000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:25:04 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0xb00000000000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:25:04 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="1503000006004000002d0200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) [ 718.827988][ T3887] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 718.847599][ T3887] RSP: 002b:00007faa47624a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 718.856030][ T3887] RAX: ffffffffffffffda RBX: 00007faa47624b40 RCX: 000000000045c27a [ 718.864176][ T3887] RDX: 00007faa47624ae0 RSI: 0000000020000100 RDI: 00007faa47624b00 [ 718.872143][ T3887] RBP: 0000000000000001 R08: 00007faa47624b40 R09: 00007faa47624ae0 [ 718.880208][ T3887] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 718.888166][ T3887] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:25:04 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0xd00000000000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:25:04 executing program 1 (fault-call:0 fault-nth:69): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:25:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 719.093902][ T3915] FAULT_INJECTION: forcing a failure. [ 719.093902][ T3915] name failslab, interval 1, probability 0, space 0, times 0 [ 719.142437][ T3915] CPU: 0 PID: 3915 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 719.150388][ T3915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 719.160452][ T3915] Call Trace: [ 719.163755][ T3915] dump_stack+0x172/0x1f0 [ 719.168074][ T3915] should_fail.cold+0xa/0x15 [ 719.172649][ T3915] ? __kasan_check_read+0x11/0x20 [ 719.177664][ T3915] ? fault_create_debugfs_attr+0x180/0x180 [ 719.183466][ T3915] ? page_to_nid.part.0+0x20/0x20 [ 719.188490][ T3915] ? ___might_sleep+0x163/0x280 [ 719.193355][ T3915] __should_failslab+0x121/0x190 [ 719.198395][ T3915] should_failslab+0x9/0x14 [ 719.202906][ T3915] kmem_cache_alloc_trace+0x2d3/0x790 [ 719.208295][ T3915] ? lockdep_init_map+0x1be/0x6d0 [ 719.213342][ T3915] legacy_init_fs_context+0x48/0xe0 [ 719.218539][ T3915] ? generic_parse_monolithic+0x200/0x200 [ 719.224253][ T3915] alloc_fs_context+0x3d1/0x6c0 [ 719.229100][ T3915] fs_context_for_mount+0x25/0x30 [ 719.234127][ T3915] vfs_kern_mount.part.0+0x28/0xf0 [ 719.239402][ T3915] vfs_kern_mount+0x40/0x60 [ 719.243906][ T3915] btrfs_mount+0x2b4/0x15e2 [ 719.248398][ T3915] ? __kasan_check_read+0x11/0x20 [ 719.253427][ T3915] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 719.260024][ T3915] ? should_fail+0x1de/0x852 [ 719.264633][ T3915] ? fault_create_debugfs_attr+0x180/0x180 [ 719.270525][ T3915] ? btrfs_remount+0x10f0/0x10f0 [ 719.275471][ T3915] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 719.281727][ T3915] ? refcount_sub_and_test_checked+0x154/0x200 [ 719.287903][ T3915] ? refcount_dec_not_one+0x1f0/0x1f0 [ 719.293316][ T3915] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 719.299573][ T3915] ? legacy_parse_param+0x116/0x880 [ 719.304799][ T3915] ? __lookup_constant+0xd6/0x100 [ 719.309825][ T3915] ? refcount_dec_and_test_checked+0x1b/0x20 [ 719.315832][ T3915] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 719.322095][ T3915] ? apparmor_capable+0x2ed/0x630 [ 719.327152][ T3915] ? cap_capable+0x205/0x270 [ 719.331838][ T3915] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 719.338089][ T3915] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 719.344338][ T3915] ? btrfs_remount+0x10f0/0x10f0 [ 719.349283][ T3915] legacy_get_tree+0x108/0x220 [ 719.354058][ T3915] ? legacy_get_tree+0x108/0x220 [ 719.359009][ T3915] vfs_get_tree+0x8e/0x390 [ 719.363431][ T3915] do_mount+0x13b3/0x1c30 [ 719.367802][ T3915] ? copy_mount_string+0x40/0x40 [ 719.372787][ T3915] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 719.379687][ T3915] ? copy_mount_options+0x2e8/0x3f0 [ 719.384901][ T3915] ksys_mount+0xdb/0x150 [ 719.389163][ T3915] __x64_sys_mount+0xbe/0x150 [ 719.394406][ T3915] do_syscall_64+0xfd/0x6a0 [ 719.398909][ T3915] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 719.404816][ T3915] RIP: 0033:0x45c27a [ 719.408720][ T3915] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 719.428327][ T3915] RSP: 002b:00007faa47624a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 719.436757][ T3915] RAX: ffffffffffffffda RBX: 00007faa47624b40 RCX: 000000000045c27a [ 719.444815][ T3915] RDX: 00007faa47624ae0 RSI: 0000000020000100 RDI: 00007faa47624b00 [ 719.453258][ T3915] RBP: 0000000000000001 R08: 00007faa47624b40 R09: 00007faa47624ae0 [ 719.461244][ T3915] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 719.469210][ T3915] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:25:04 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x80082, 0x3) sendto$inet6(r2, &(0x7f0000000280)="5b78b2413ba9769663f8cf8cf176edb4c1b88829b7b9ce1312a098cd9073ba4924372e0d10219c4eacfa2a6cb03c91926d9762f2a09f1dbedc091c75de011ffa5fa1cf4de662b600c9bc211b36ff5adbaa0d616a8f03186aedc8f2e3a9542ce04d1c3a94235a1d70f7639727594270f68186842a61474038aad5173aaa10428b88dc51d611cbd76a", 0x88, 0x20008040, &(0x7f00000000c0)={0xa, 0x4e21, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6}, 0x1c) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r3 = dup(r0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r3, &(0x7f0000000200)="150300000600400000000200850cf7c41975e697080000026b2a2fcddad8897c6f11876d886b17b07783af113b860f84f789cca7a7659866a63deae307d02f74610000000000000000000000963c8b7fc0", 0x51, 0x0, 0x0, 0x0) recvfrom$inet6(r3, &(0x7f0000000180)=""/71, 0x47, 0x0, 0x0, 0x0) 22:25:04 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000}}, 0x30) 22:25:04 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x2800000000000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:25:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:25:04 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600400000320200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:25:04 executing program 1 (fault-call:0 fault-nth:70): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:25:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:25:05 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x3f00000000000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 719.686413][ T4042] FAULT_INJECTION: forcing a failure. [ 719.686413][ T4042] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 719.699673][ T4042] CPU: 0 PID: 4042 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 719.707676][ T4042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 719.717918][ T4042] Call Trace: [ 719.721239][ T4042] dump_stack+0x172/0x1f0 [ 719.725610][ T4042] should_fail.cold+0xa/0x15 [ 719.730224][ T4042] ? vfs_get_tree+0x8e/0x390 [ 719.734832][ T4042] ? fault_create_debugfs_attr+0x180/0x180 [ 719.740654][ T4042] ? do_mount+0x13b3/0x1c30 [ 719.745163][ T4042] ? ksys_mount+0xdb/0x150 [ 719.749588][ T4042] ? __x64_sys_mount+0xbe/0x150 [ 719.754450][ T4042] ? do_syscall_64+0xfd/0x6a0 [ 719.759143][ T4042] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 719.765226][ T4042] should_fail_alloc_page+0x50/0x60 [ 719.770435][ T4042] __alloc_pages_nodemask+0x1a1/0x8f0 [ 719.775814][ T4042] ? cache_grow_end+0xa4/0x190 [ 719.780600][ T4042] ? __alloc_pages_slowpath+0x2520/0x2520 22:25:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 719.786414][ T4042] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 719.792056][ T4042] ? __kasan_check_read+0x11/0x20 [ 719.797126][ T4042] ? fault_create_debugfs_attr+0x180/0x180 [ 719.802956][ T4042] cache_grow_begin+0x90/0xd20 [ 719.807735][ T4042] ? btrfs_mount_root+0x1d0/0x1290 [ 719.812904][ T4042] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 719.820303][ T4042] kmem_cache_alloc_trace+0x6b3/0x790 [ 719.825698][ T4042] ? kasan_kmalloc+0x9/0x10 [ 719.830227][ T4042] btrfs_mount_root+0x1d0/0x1290 22:25:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:25:05 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x4000000000000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 719.835211][ T4042] ? btrfs_decode_error+0x70/0x70 [ 719.840257][ T4042] ? logfc+0x700/0x700 [ 719.844368][ T4042] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 719.850711][ T4042] ? legacy_parse_param+0x116/0x880 [ 719.855956][ T4042] ? __lookup_constant+0xd6/0x100 [ 719.860989][ T4042] ? security_fs_context_parse_param+0x81/0xb0 [ 719.867157][ T4042] ? logfc+0x700/0x700 [ 719.871254][ T4042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 719.877528][ T4042] ? vfs_parse_fs_param+0xcd/0x540 [ 719.882916][ T4042] ? kfree+0x1fd/0x2c0 [ 719.887524][ T4042] ? vfs_parse_fs_string+0x116/0x170 [ 719.892821][ T4042] ? vfs_parse_fs_param+0x540/0x540 [ 719.898119][ T4042] ? btrfs_decode_error+0x70/0x70 [ 719.903160][ T4042] legacy_get_tree+0x108/0x220 [ 719.907939][ T4042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 719.916636][ T4042] vfs_get_tree+0x8e/0x390 [ 719.921070][ T4042] fc_mount+0x17/0xc0 [ 719.925059][ T4042] vfs_kern_mount.part.0+0xd8/0xf0 [ 719.930190][ T4042] vfs_kern_mount+0x40/0x60 22:25:05 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x4305000000000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 719.934716][ T4042] btrfs_mount+0x2b4/0x15e2 [ 719.939233][ T4042] ? __kasan_check_read+0x11/0x20 [ 719.944265][ T4042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 719.950526][ T4042] ? should_fail+0x1de/0x852 [ 719.955124][ T4042] ? fault_create_debugfs_attr+0x180/0x180 [ 719.960944][ T4042] ? btrfs_remount+0x10f0/0x10f0 [ 719.965902][ T4042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 719.972238][ T4042] ? refcount_sub_and_test_checked+0x154/0x200 [ 719.978397][ T4042] ? refcount_dec_not_one+0x1f0/0x1f0 [ 719.983781][ T4042] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 719.990040][ T4042] ? legacy_parse_param+0x116/0x880 [ 719.995245][ T4042] ? __lookup_constant+0xd6/0x100 [ 720.000277][ T4042] ? refcount_dec_and_test_checked+0x1b/0x20 [ 720.006261][ T4042] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 720.006276][ T4042] ? apparmor_capable+0x2ed/0x630 [ 720.006288][ T4042] ? cap_capable+0x205/0x270 [ 720.006310][ T4042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 720.028476][ T4042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 720.034739][ T4042] ? btrfs_remount+0x10f0/0x10f0 [ 720.039696][ T4042] legacy_get_tree+0x108/0x220 [ 720.044482][ T4042] ? legacy_get_tree+0x108/0x220 [ 720.049441][ T4042] vfs_get_tree+0x8e/0x390 [ 720.053870][ T4042] do_mount+0x13b3/0x1c30 [ 720.058222][ T4042] ? copy_mount_string+0x40/0x40 [ 720.063180][ T4042] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 720.069619][ T4042] ? copy_mount_options+0x2e8/0x3f0 [ 720.074938][ T4042] ksys_mount+0xdb/0x150 [ 720.079198][ T4042] __x64_sys_mount+0xbe/0x150 [ 720.083897][ T4042] do_syscall_64+0xfd/0x6a0 [ 720.088424][ T4042] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 720.094319][ T4042] RIP: 0033:0x45c27a [ 720.098220][ T4042] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 720.117816][ T4042] RSP: 002b:00007faa47624a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 720.126240][ T4042] RAX: ffffffffffffffda RBX: 00007faa47624b40 RCX: 000000000045c27a [ 720.134203][ T4042] RDX: 00007faa47624ae0 RSI: 0000000020000100 RDI: 00007faa47624b00 [ 720.142157][ T4042] RBP: 0000000000000001 R08: 00007faa47624b40 R09: 00007faa47624ae0 [ 720.150114][ T4042] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 720.158246][ T4042] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:25:05 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000080)={0x1, 0x5, 0xffff, 0xae}, 0x8) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000200)="150300000600400000000200850cf7c41975e697080000026b2a2fcddad8897c6f11876d886b17b07783af113b860f84f789cca7a7659866a63deae307d02f74610000000000000000000000963c8b7fc0", 0x51, 0x0, 0x0, 0x0) recvfrom$inet6(r2, &(0x7f0000000180)=""/71, 0x47, 0x0, 0x0, 0x0) 22:25:05 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x8000000}}, 0x30) 22:25:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:25:05 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x6000000000000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:25:05 executing program 1 (fault-call:0 fault-nth:71): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:25:05 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600400000380200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:25:05 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x800e000000000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 720.379009][ T4181] FAULT_INJECTION: forcing a failure. [ 720.379009][ T4181] name failslab, interval 1, probability 0, space 0, times 0 [ 720.416875][ T4181] CPU: 1 PID: 4181 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 720.424824][ T4181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 720.434907][ T4181] Call Trace: [ 720.438238][ T4181] dump_stack+0x172/0x1f0 [ 720.442594][ T4181] should_fail.cold+0xa/0x15 [ 720.442615][ T4181] ? fault_create_debugfs_attr+0x180/0x180 [ 720.442633][ T4181] ? page_to_nid.part.0+0x20/0x20 [ 720.442647][ T4181] ? ___might_sleep+0x163/0x280 [ 720.442675][ T4181] __should_failslab+0x121/0x190 [ 720.453096][ T4181] should_failslab+0x9/0x14 [ 720.453112][ T4181] kmem_cache_alloc_trace+0x2d3/0x790 [ 720.453125][ T4181] ? kasan_kmalloc+0x9/0x10 [ 720.453136][ T4181] ? __kmalloc_node+0x4e/0x70 [ 720.453155][ T4181] btrfs_mount_root+0x174/0x1290 [ 720.453171][ T4181] ? btrfs_decode_error+0x70/0x70 [ 720.453190][ T4181] ? logfc+0x700/0x700 [ 720.453215][ T4181] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 720.507276][ T4181] ? legacy_parse_param+0x116/0x880 [ 720.512511][ T4181] ? __lookup_constant+0xd6/0x100 [ 720.517554][ T4181] ? security_fs_context_parse_param+0x81/0xb0 [ 720.523723][ T4181] ? logfc+0x700/0x700 [ 720.527807][ T4181] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 720.534064][ T4181] ? vfs_parse_fs_param+0xcd/0x540 [ 720.539186][ T4181] ? kfree+0x1fd/0x2c0 [ 720.543281][ T4181] ? vfs_parse_fs_string+0x116/0x170 [ 720.548580][ T4181] ? vfs_parse_fs_param+0x540/0x540 [ 720.553793][ T4181] ? btrfs_decode_error+0x70/0x70 [ 720.558821][ T4181] legacy_get_tree+0x108/0x220 [ 720.563590][ T4181] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 720.569859][ T4181] vfs_get_tree+0x8e/0x390 [ 720.574301][ T4181] fc_mount+0x17/0xc0 [ 720.578301][ T4181] vfs_kern_mount.part.0+0xd8/0xf0 [ 720.583421][ T4181] vfs_kern_mount+0x40/0x60 [ 720.587938][ T4181] btrfs_mount+0x2b4/0x15e2 [ 720.592443][ T4181] ? __kasan_check_read+0x11/0x20 [ 720.592464][ T4181] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 720.592487][ T4181] ? should_fail+0x1de/0x852 [ 720.603746][ T4181] ? fault_create_debugfs_attr+0x180/0x180 [ 720.603768][ T4181] ? btrfs_remount+0x10f0/0x10f0 [ 720.603787][ T4181] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 720.603802][ T4181] ? refcount_sub_and_test_checked+0x154/0x200 [ 720.603822][ T4181] ? refcount_dec_not_one+0x1f0/0x1f0 [ 720.636860][ T4181] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 720.643120][ T4181] ? legacy_parse_param+0x116/0x880 [ 720.648341][ T4181] ? __lookup_constant+0xd6/0x100 [ 720.653393][ T4181] ? refcount_dec_and_test_checked+0x1b/0x20 [ 720.659393][ T4181] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 720.665648][ T4181] ? apparmor_capable+0x2ed/0x630 [ 720.670676][ T4181] ? cap_capable+0x205/0x270 [ 720.675281][ T4181] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 720.681549][ T4181] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 720.687811][ T4181] ? btrfs_remount+0x10f0/0x10f0 [ 720.692766][ T4181] legacy_get_tree+0x108/0x220 [ 720.697545][ T4181] ? legacy_get_tree+0x108/0x220 [ 720.702494][ T4181] vfs_get_tree+0x8e/0x390 [ 720.706928][ T4181] do_mount+0x13b3/0x1c30 [ 720.711282][ T4181] ? copy_mount_string+0x40/0x40 [ 720.716252][ T4181] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 720.722509][ T4181] ? copy_mount_options+0x2e8/0x3f0 [ 720.727719][ T4181] ksys_mount+0xdb/0x150 [ 720.731974][ T4181] __x64_sys_mount+0xbe/0x150 [ 720.736673][ T4181] do_syscall_64+0xfd/0x6a0 [ 720.741186][ T4181] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 720.747080][ T4181] RIP: 0033:0x45c27a [ 720.750984][ T4181] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 720.770600][ T4181] RSP: 002b:00007faa47624a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 22:25:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:25:05 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x8035000000000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:25:05 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x8100000000000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:25:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c0000001900010200000c00000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) 22:25:05 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x86ddffff00000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 720.779032][ T4181] RAX: ffffffffffffffda RBX: 00007faa47624b40 RCX: 000000000045c27a [ 720.787020][ T4181] RDX: 00007faa47624ae0 RSI: 0000000020000100 RDI: 00007faa47624b00 [ 720.795005][ T4181] RBP: 0000000000000001 R08: 00007faa47624b40 R09: 00007faa47624ae0 [ 720.802990][ T4181] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 720.810965][ T4181] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:25:06 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000200)="150300000600400000000200850cf7c41975e697080000026b2a2fcddad8897c6f11876d886b17b07783af113b860f84f789cca7a7659866a63deae307d02f74610000000000000000000000963c8b7fc0", 0x51, 0x0, 0x0, 0x0) mkdirat(r2, &(0x7f0000000080)='./file0\x00', 0x40) recvfrom$inet6(r2, &(0x7f0000000180)=""/71, 0x47, 0x0, 0x0, 0x0) 22:25:06 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x8060000}}, 0x30) 22:25:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:25:06 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x8847000000000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:25:06 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600400000390200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:25:06 executing program 1 (fault-call:0 fault-nth:72): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:25:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c0000001900010200000f00000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) [ 720.979309][ T4322] FAULT_INJECTION: forcing a failure. [ 720.979309][ T4322] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 720.992769][ T4322] CPU: 1 PID: 4322 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 721.000675][ T4322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 721.010745][ T4322] Call Trace: [ 721.014073][ T4322] dump_stack+0x172/0x1f0 [ 721.018430][ T4322] should_fail.cold+0xa/0x15 [ 721.023028][ T4322] ? kasan_kmalloc+0x9/0x10 22:25:06 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x8848000000000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 721.027558][ T4322] ? fault_create_debugfs_attr+0x180/0x180 [ 721.033638][ T4322] ? vfs_kern_mount.part.0+0xd8/0xf0 [ 721.038928][ T4322] ? vfs_kern_mount+0x40/0x60 [ 721.043604][ T4322] ? btrfs_mount+0x2b4/0x15e2 [ 721.043621][ T4322] ? legacy_get_tree+0x108/0x220 [ 721.043635][ T4322] ? vfs_get_tree+0x8e/0x390 [ 721.043655][ T4322] ? do_mount+0x13b3/0x1c30 [ 721.062459][ T4322] ? ksys_mount+0xdb/0x150 [ 721.066882][ T4322] ? __x64_sys_mount+0xbe/0x150 [ 721.071749][ T4322] should_fail_alloc_page+0x50/0x60 [ 721.071764][ T4322] __alloc_pages_nodemask+0x1a1/0x8f0 [ 721.071789][ T4322] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 721.088574][ T4322] ? should_fail+0x1de/0x852 [ 721.093171][ T4322] ? __alloc_pages_slowpath+0x2520/0x2520 [ 721.098904][ T4322] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 721.104559][ T4322] ? __kasan_check_read+0x11/0x20 [ 721.109602][ T4322] ? fault_create_debugfs_attr+0x180/0x180 [ 721.115424][ T4322] cache_grow_begin+0x90/0xd20 [ 721.120196][ T4322] ? btrfs_mount_root+0x174/0x1290 [ 721.125320][ T4322] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 721.131579][ T4322] kmem_cache_alloc_trace+0x6b3/0x790 [ 721.137000][ T4322] ? kasan_kmalloc+0x9/0x10 [ 721.141539][ T4322] btrfs_mount_root+0x174/0x1290 [ 721.146492][ T4322] ? btrfs_decode_error+0x70/0x70 [ 721.151544][ T4322] ? logfc+0x700/0x700 [ 721.155628][ T4322] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 721.161882][ T4322] ? legacy_parse_param+0x116/0x880 [ 721.167087][ T4322] ? __lookup_constant+0xd6/0x100 [ 721.172125][ T4322] ? security_fs_context_parse_param+0x81/0xb0 22:25:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:25:06 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x8864000000000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 721.178295][ T4322] ? logfc+0x700/0x700 [ 721.182375][ T4322] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 721.188624][ T4322] ? vfs_parse_fs_param+0xcd/0x540 [ 721.193740][ T4322] ? kfree+0x1fd/0x2c0 [ 721.197815][ T4322] ? vfs_parse_fs_string+0x116/0x170 [ 721.203105][ T4322] ? vfs_parse_fs_param+0x540/0x540 [ 721.203123][ T4322] ? btrfs_decode_error+0x70/0x70 [ 721.203136][ T4322] legacy_get_tree+0x108/0x220 [ 721.203155][ T4322] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 721.203177][ T4322] vfs_get_tree+0x8e/0x390 [ 721.213383][ T4322] fc_mount+0x17/0xc0 [ 721.213400][ T4322] vfs_kern_mount.part.0+0xd8/0xf0 [ 721.213416][ T4322] vfs_kern_mount+0x40/0x60 [ 721.213432][ T4322] btrfs_mount+0x2b4/0x15e2 [ 721.213446][ T4322] ? __kasan_check_read+0x11/0x20 [ 721.213462][ T4322] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 721.213477][ T4322] ? should_fail+0x1de/0x852 [ 721.213493][ T4322] ? fault_create_debugfs_attr+0x180/0x180 [ 721.213516][ T4322] ? btrfs_remount+0x10f0/0x10f0 [ 721.213533][ T4322] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 22:25:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c0000001900010200001200000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) [ 721.213556][ T4322] ? refcount_sub_and_test_checked+0x154/0x200 [ 721.285935][ T4322] ? refcount_dec_not_one+0x1f0/0x1f0 [ 721.291334][ T4322] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 721.297599][ T4322] ? legacy_parse_param+0x116/0x880 [ 721.302818][ T4322] ? __lookup_constant+0xd6/0x100 [ 721.307902][ T4322] ? refcount_dec_and_test_checked+0x1b/0x20 [ 721.313905][ T4322] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 721.320169][ T4322] ? apparmor_capable+0x2ed/0x630 [ 721.325199][ T4322] ? cap_capable+0x205/0x270 22:25:06 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x88a8ffff00000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 721.329923][ T4322] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 721.336189][ T4322] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 721.343070][ T4322] ? btrfs_remount+0x10f0/0x10f0 [ 721.348027][ T4322] legacy_get_tree+0x108/0x220 [ 721.352802][ T4322] ? legacy_get_tree+0x108/0x220 [ 721.357766][ T4322] vfs_get_tree+0x8e/0x390 [ 721.362189][ T4322] do_mount+0x13b3/0x1c30 [ 721.362207][ T4322] ? copy_mount_string+0x40/0x40 [ 721.362229][ T4322] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 721.362251][ T4322] ? copy_mount_options+0x2e8/0x3f0 [ 721.377773][ T4322] ksys_mount+0xdb/0x150 [ 721.387198][ T4322] __x64_sys_mount+0xbe/0x150 [ 721.391885][ T4322] do_syscall_64+0xfd/0x6a0 [ 721.396407][ T4322] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 721.402337][ T4322] RIP: 0033:0x45c27a [ 721.406241][ T4322] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 721.425890][ T4322] RSP: 002b:00007faa47624a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 721.434314][ T4322] RAX: ffffffffffffffda RBX: 00007faa47624b40 RCX: 000000000045c27a [ 721.442298][ T4322] RDX: 00007faa47624ae0 RSI: 0000000020000100 RDI: 00007faa47624b00 [ 721.450283][ T4322] RBP: 0000000000000001 R08: 00007faa47624b40 R09: 00007faa47624ae0 [ 721.458272][ T4322] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 721.466255][ T4322] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:25:06 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) recvfrom$inet6(r2, &(0x7f0000000100)=""/64, 0x40, 0x141, &(0x7f0000000280)={0xa, 0x4e21, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4c}, 0x1c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000080)={0x7b, 0x0, [0x8001, 0x0, 0x5, 0x7fffffff]}) sendto$inet6(r2, &(0x7f0000000200)="150300000600400000000200850cf7c41975e697080000026b2a2fcddad8897c6f11876d886b17b07783af113b860f84f789cca7a7659866a63deae307d02f74610000000000000000000000963c8b7fc0", 0x51, 0x0, 0x0, 0x0) recvfrom$inet6(r2, &(0x7f0000000180)=""/71, 0x47, 0x0, 0x0, 0x0) 22:25:07 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0xa000000}}, 0x30) 22:25:07 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x88caffff00000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:25:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:25:07 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="1503000006004000003f0200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:25:07 executing program 1 (fault-call:0 fault-nth:73): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 721.738595][ T4462] FAULT_INJECTION: forcing a failure. [ 721.738595][ T4462] name failslab, interval 1, probability 0, space 0, times 0 [ 721.768768][ T4462] CPU: 1 PID: 4462 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 721.776711][ T4462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 22:25:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:25:07 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x8906000000000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 721.786784][ T4462] Call Trace: [ 721.790102][ T4462] dump_stack+0x172/0x1f0 [ 721.794460][ T4462] should_fail.cold+0xa/0x15 [ 721.799091][ T4462] ? fault_create_debugfs_attr+0x180/0x180 [ 721.804920][ T4462] ? page_to_nid.part.0+0x20/0x20 [ 721.809958][ T4462] ? ___might_sleep+0x163/0x280 [ 721.814838][ T4462] __should_failslab+0x121/0x190 [ 721.814854][ T4462] should_failslab+0x9/0x14 [ 721.814866][ T4462] kmem_cache_alloc+0x2aa/0x710 [ 721.814885][ T4462] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 22:25:07 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x8dffffff00000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 721.814901][ T4462] ? _atomic_dec_and_lock+0x143/0x210 [ 721.814917][ T4462] getname_kernel+0x53/0x370 [ 721.814943][ T4462] kern_path+0x20/0x40 [ 721.849489][ T4462] lookup_bdev.part.0+0x7b/0x1b0 [ 721.854450][ T4462] ? blkdev_open+0x290/0x290 [ 721.859047][ T4462] ? btrfs_open_devices+0x74/0x160 [ 721.864178][ T4462] blkdev_get_by_path+0x81/0x130 [ 721.869136][ T4462] btrfs_get_bdev_and_sb+0x38/0x300 [ 721.874364][ T4462] open_fs_devices+0x6e7/0xc40 [ 721.879158][ T4462] ? btrfs_uuid_rescan_kthread+0x60/0x60 22:25:07 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0xf5ffffff00000000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 721.884811][ T4462] ? btrfs_scan_one_device+0x5ac/0x710 [ 721.890301][ T4462] btrfs_open_devices+0x140/0x160 [ 721.895346][ T4462] btrfs_mount_root+0x793/0x1290 [ 721.900312][ T4462] ? btrfs_decode_error+0x70/0x70 [ 721.905385][ T4462] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 721.911757][ T4462] ? legacy_parse_param+0x116/0x880 [ 721.916974][ T4462] ? __lookup_constant+0xd6/0x100 [ 721.922022][ T4462] ? security_fs_context_parse_param+0x81/0xb0 [ 721.928195][ T4462] ? logfc+0x700/0x700 [ 721.932285][ T4462] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 22:25:07 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0xffffffffa0010000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 721.938548][ T4462] ? vfs_parse_fs_param+0xcd/0x540 [ 721.943676][ T4462] ? kfree+0x1fd/0x2c0 [ 721.947760][ T4462] ? vfs_parse_fs_string+0x116/0x170 [ 721.953059][ T4462] ? vfs_parse_fs_param+0x540/0x540 [ 721.958270][ T4462] ? btrfs_decode_error+0x70/0x70 [ 721.963306][ T4462] legacy_get_tree+0x108/0x220 [ 721.968082][ T4462] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 721.974349][ T4462] vfs_get_tree+0x8e/0x390 [ 721.978788][ T4462] fc_mount+0x17/0xc0 [ 721.982778][ T4462] vfs_kern_mount.part.0+0xd8/0xf0 22:25:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 721.987903][ T4462] vfs_kern_mount+0x40/0x60 [ 721.992462][ T4462] btrfs_mount+0x2b4/0x15e2 [ 721.996982][ T4462] ? preempt_schedule_irq+0xf3/0x160 [ 722.002288][ T4462] ? btrfs_remount+0x10f0/0x10f0 [ 722.007234][ T4462] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 722.013478][ T4462] ? refcount_sub_and_test_checked+0x154/0x200 [ 722.013491][ T4462] ? refcount_dec_not_one+0x1f0/0x1f0 [ 722.013514][ T4462] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 722.013530][ T4462] ? legacy_parse_param+0x116/0x880 [ 722.013543][ T4462] ? __lookup_constant+0xd6/0x100 [ 722.013558][ T4462] ? refcount_dec_and_test_checked+0x1b/0x20 [ 722.013580][ T4462] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 722.053745][ T4462] ? apparmor_capable+0x2ed/0x630 [ 722.058775][ T4462] ? cap_capable+0x205/0x270 [ 722.063376][ T4462] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 722.069632][ T4462] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 722.075884][ T4462] ? btrfs_remount+0x10f0/0x10f0 [ 722.080835][ T4462] legacy_get_tree+0x108/0x220 [ 722.085604][ T4462] ? legacy_get_tree+0x108/0x220 [ 722.090553][ T4462] vfs_get_tree+0x8e/0x390 [ 722.094990][ T4462] do_mount+0x13b3/0x1c30 [ 722.099420][ T4462] ? copy_mount_string+0x40/0x40 [ 722.104376][ T4462] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 722.110629][ T4462] ? copy_mount_options+0x2e8/0x3f0 [ 722.115924][ T4462] ksys_mount+0xdb/0x150 [ 722.120175][ T4462] __x64_sys_mount+0xbe/0x150 [ 722.124973][ T4462] do_syscall_64+0xfd/0x6a0 [ 722.129489][ T4462] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 722.135409][ T4462] RIP: 0033:0x45c27a [ 722.135425][ T4462] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 722.135432][ T4462] RSP: 002b:00007faa47624a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 722.135444][ T4462] RAX: ffffffffffffffda RBX: 00007faa47624b40 RCX: 000000000045c27a [ 722.135452][ T4462] RDX: 00007faa47624ae0 RSI: 0000000020000100 RDI: 00007faa47624b00 22:25:07 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r1, 0x1, 0xfffffffffffffffc, 0x6, @remote}, 0xfffffffffffffe1a) r2 = dup(r0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r2, 0xc0305615, &(0x7f0000000080)={0x0, {0x5}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000100), &(0x7f0000000280)=0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000200)="150300000600400000000200850cf7c41975e697080000026b2a2fcddad8897c6f11876d886b17b07783af113b860f84f789cca7a7659866a63deae307d02f74610000000000000000000000963c8b7fc0", 0x51, 0x0, 0x0, 0x0) recvfrom$inet6(r2, &(0x7f0000000180)=""/71, 0x47, 0x0, 0x0, 0x0) [ 722.135459][ T4462] RBP: 0000000000000001 R08: 00007faa47624b40 R09: 00007faa47624ae0 [ 722.135465][ T4462] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 722.135472][ T4462] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:25:07 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0xe000000}}, 0x30) 22:25:07 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0xfffffffffffff000, @dev={0xfe, 0x80, [0x0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:25:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:25:07 executing program 1 (fault-call:0 fault-nth:74): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:25:07 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600400000400200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) [ 722.407203][ T4604] FAULT_INJECTION: forcing a failure. [ 722.407203][ T4604] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 722.420456][ T4604] CPU: 1 PID: 4604 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 722.428361][ T4604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 722.438436][ T4604] Call Trace: [ 722.441757][ T4604] dump_stack+0x172/0x1f0 [ 722.446104][ T4604] should_fail.cold+0xa/0x15 [ 722.450707][ T4604] ? vfs_get_tree+0x8e/0x390 [ 722.455308][ T4604] ? fault_create_debugfs_attr+0x180/0x180 [ 722.461117][ T4604] ? do_mount+0x13b3/0x1c30 [ 722.465625][ T4604] ? ksys_mount+0xdb/0x150 [ 722.470046][ T4604] ? __x64_sys_mount+0xbe/0x150 [ 722.474906][ T4604] ? do_syscall_64+0xfd/0x6a0 [ 722.479589][ T4604] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 722.485666][ T4604] should_fail_alloc_page+0x50/0x60 [ 722.485679][ T4604] __alloc_pages_nodemask+0x1a1/0x8f0 [ 722.485691][ T4604] ? cache_grow_end+0xa4/0x190 [ 722.485705][ T4604] ? __alloc_pages_slowpath+0x2520/0x2520 22:25:07 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x2, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:25:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c0000001900010200006000000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) [ 722.485718][ T4604] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 722.485739][ T4604] ? __kasan_check_read+0x11/0x20 [ 722.517391][ T4604] ? fault_create_debugfs_attr+0x180/0x180 [ 722.523216][ T4604] cache_grow_begin+0x90/0xd20 [ 722.527990][ T4604] ? btrfs_mount_root+0x1d0/0x1290 [ 722.533112][ T4604] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 722.539363][ T4604] kmem_cache_alloc_trace+0x6b3/0x790 [ 722.544746][ T4604] ? kasan_kmalloc+0x9/0x10 [ 722.549269][ T4604] btrfs_mount_root+0x1d0/0x1290 [ 722.554223][ T4604] ? btrfs_decode_error+0x70/0x70 [ 722.559259][ T4604] ? logfc+0x700/0x700 [ 722.563341][ T4604] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 722.569602][ T4604] ? legacy_parse_param+0x116/0x880 [ 722.572146][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 722.574822][ T4604] ? __lookup_constant+0xd6/0x100 [ 722.574842][ T4604] ? security_fs_context_parse_param+0x81/0xb0 [ 722.574856][ T4604] ? logfc+0x700/0x700 [ 722.574880][ T4604] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 722.580638][ C0] protocol 88fb is buggy, dev hsr_slave_1 22:25:08 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x3, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 722.585613][ T4604] ? vfs_parse_fs_param+0xcd/0x540 [ 722.585626][ T4604] ? kfree+0x1fd/0x2c0 [ 722.585641][ T4604] ? vfs_parse_fs_string+0x116/0x170 [ 722.585655][ T4604] ? vfs_parse_fs_param+0x540/0x540 [ 722.585671][ T4604] ? btrfs_decode_error+0x70/0x70 [ 722.585691][ T4604] legacy_get_tree+0x108/0x220 [ 722.637215][ T4604] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 722.643556][ T4604] vfs_get_tree+0x8e/0x390 [ 722.647987][ T4604] fc_mount+0x17/0xc0 [ 722.651984][ T4604] vfs_kern_mount.part.0+0xd8/0xf0 [ 722.657104][ T4604] vfs_kern_mount+0x40/0x60 [ 722.661626][ T4604] btrfs_mount+0x2b4/0x15e2 [ 722.666137][ T4604] ? __kasan_check_read+0x11/0x20 [ 722.671346][ T4604] ? __kasan_check_write+0x14/0x20 [ 722.676465][ T4604] ? lock_downgrade+0x920/0x920 [ 722.681330][ T4604] ? rwlock_bug.part.0+0x90/0x90 [ 722.686275][ T4604] ? btrfs_remount+0x10f0/0x10f0 [ 722.691222][ T4604] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 722.697479][ T4604] ? refcount_sub_and_test_checked+0x154/0x200 22:25:08 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x4, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:25:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c0000001900010200586500000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) [ 722.703668][ T4604] ? refcount_dec_not_one+0x1f0/0x1f0 [ 722.709073][ T4604] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 722.715589][ T4604] ? legacy_parse_param+0x116/0x880 [ 722.720790][ T4604] ? __lookup_constant+0xd6/0x100 [ 722.725826][ T4604] ? refcount_dec_and_test_checked+0x1b/0x20 [ 722.731819][ T4604] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 722.738071][ T4604] ? apparmor_capable+0x2ed/0x630 [ 722.743109][ T4604] ? cap_capable+0x205/0x270 [ 722.747712][ T4604] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 722.753960][ T4604] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 722.760210][ T4604] ? btrfs_remount+0x10f0/0x10f0 [ 722.765158][ T4604] legacy_get_tree+0x108/0x220 [ 722.769931][ T4604] ? legacy_get_tree+0x108/0x220 [ 722.774881][ T4604] vfs_get_tree+0x8e/0x390 [ 722.779325][ T4604] do_mount+0x13b3/0x1c30 [ 722.783670][ T4604] ? copy_mount_string+0x40/0x40 [ 722.788620][ T4604] ? copy_mount_options+0x241/0x3f0 [ 722.793837][ T4604] ? __sanitizer_cov_trace_pc+0x1a/0x50 [ 722.799396][ T4604] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 22:25:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 722.805744][ T4604] ? copy_mount_options+0x2e8/0x3f0 [ 722.810966][ T4604] ksys_mount+0xdb/0x150 [ 722.815232][ T4604] __x64_sys_mount+0xbe/0x150 [ 722.819922][ T4604] do_syscall_64+0xfd/0x6a0 [ 722.824442][ T4604] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 722.830350][ T4604] RIP: 0033:0x45c27a [ 722.834256][ T4604] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 722.853874][ T4604] RSP: 002b:00007faa47624a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 722.862292][ T4604] RAX: ffffffffffffffda RBX: 00007faa47624b40 RCX: 000000000045c27a [ 722.870273][ T4604] RDX: 00007faa47624ae0 RSI: 0000000020000100 RDI: 00007faa47624b00 [ 722.878247][ T4604] RBP: 0000000000000001 R08: 00007faa47624b40 R09: 00007faa47624ae0 [ 722.886219][ T4604] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 722.894193][ T4604] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:25:08 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f00000002c0)={'lo\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000200)="150300000600400000000200850cf7c41975e697080000026b2a2fcddad8897c6f11876d886b17b07783af113b860f84f789cca7a7659866a63deae307d02f74610000000000000000000000963c8b7fc0", 0x51, 0x0, 0x0, 0x0) recvfrom$inet6(r2, &(0x7f0000000180)=""/71, 0x47, 0x0, 0x0, 0x0) r4 = accept4(r3, &(0x7f00000000c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, &(0x7f0000000280)=0x80, 0x800) bind$packet(r2, &(0x7f0000000080)={0x11, 0x1, r1, 0x1, 0xb96}, 0x14) ioctl$sock_netrom_SIOCDELRT(r4, 0x890c, &(0x7f0000000340)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={'nr', 0x0}, 0x7fff, 'syz1\x00', @default, 0x400, 0x5, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}) setsockopt$inet_sctp6_SCTP_NODELAY(r5, 0x84, 0x3, &(0x7f0000000300)=0x40, 0x4) 22:25:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c000000190001020006c500000000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) 22:25:08 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x5, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:25:08 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x11000000}}, 0x30) 22:25:08 executing program 1 (fault-call:0 fault-nth:75): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:25:08 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600400000420200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:25:08 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x6, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:25:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 723.289245][ T4751] FAULT_INJECTION: forcing a failure. [ 723.289245][ T4751] name failslab, interval 1, probability 0, space 0, times 0 [ 723.323063][ T4751] CPU: 0 PID: 4751 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 22:25:08 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x7, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 723.331026][ T4751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 723.341095][ T4751] Call Trace: [ 723.344416][ T4751] dump_stack+0x172/0x1f0 [ 723.348790][ T4751] should_fail.cold+0xa/0x15 [ 723.353394][ T4751] ? fault_create_debugfs_attr+0x180/0x180 [ 723.359213][ T4751] ? page_to_nid.part.0+0x20/0x20 [ 723.364245][ T4751] ? ___might_sleep+0x163/0x280 [ 723.369105][ T4751] __should_failslab+0x121/0x190 [ 723.374053][ T4751] should_failslab+0x9/0x14 [ 723.378559][ T4751] __kmalloc_track_caller+0x2dc/0x760 [ 723.383936][ T4751] ? kasan_kmalloc+0x9/0x10 [ 723.388483][ T4751] ? kmem_cache_alloc_trace+0x346/0x790 [ 723.394037][ T4751] ? kasan_kmalloc+0x9/0x10 [ 723.398549][ T4751] ? btrfs_mount_root+0x2b8/0x1290 [ 723.403671][ T4751] kstrdup+0x3a/0x70 [ 723.407580][ T4751] btrfs_mount_root+0x2b8/0x1290 [ 723.412525][ T4751] ? btrfs_decode_error+0x70/0x70 [ 723.417560][ T4751] ? logfc+0x700/0x700 [ 723.421644][ T4751] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 723.427898][ T4751] ? legacy_parse_param+0x116/0x880 [ 723.433105][ T4751] ? __lookup_constant+0xd6/0x100 22:25:08 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x8, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 723.438144][ T4751] ? security_fs_context_parse_param+0x81/0xb0 [ 723.444298][ T4751] ? logfc+0x700/0x700 [ 723.444316][ T4751] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 723.444327][ T4751] ? vfs_parse_fs_param+0xcd/0x540 [ 723.444338][ T4751] ? kfree+0x1fd/0x2c0 [ 723.444352][ T4751] ? vfs_parse_fs_string+0x116/0x170 [ 723.444366][ T4751] ? vfs_parse_fs_param+0x540/0x540 [ 723.444380][ T4751] ? btrfs_decode_error+0x70/0x70 [ 723.444392][ T4751] legacy_get_tree+0x108/0x220 22:25:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 723.444405][ T4751] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 723.444429][ T4751] vfs_get_tree+0x8e/0x390 [ 723.495768][ T4751] fc_mount+0x17/0xc0 [ 723.499763][ T4751] vfs_kern_mount.part.0+0xd8/0xf0 [ 723.504883][ T4751] vfs_kern_mount+0x40/0x60 [ 723.509397][ T4751] btrfs_mount+0x2b4/0x15e2 [ 723.513914][ T4751] ? __kasan_check_read+0x11/0x20 [ 723.518959][ T4751] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 723.525232][ T4751] ? should_fail+0x1de/0x852 [ 723.529848][ T4751] ? fault_create_debugfs_attr+0x180/0x180 [ 723.535675][ T4751] ? btrfs_remount+0x10f0/0x10f0 [ 723.540634][ T4751] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 723.546891][ T4751] ? refcount_sub_and_test_checked+0x154/0x200 [ 723.553058][ T4751] ? refcount_dec_not_one+0x1f0/0x1f0 [ 723.553076][ T4751] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 723.553091][ T4751] ? legacy_parse_param+0x116/0x880 [ 723.553103][ T4751] ? __lookup_constant+0xd6/0x100 [ 723.553117][ T4751] ? refcount_dec_and_test_checked+0x1b/0x20 [ 723.553130][ T4751] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 723.553144][ T4751] ? apparmor_capable+0x2ed/0x630 [ 723.553156][ T4751] ? cap_capable+0x205/0x270 [ 723.553180][ T4751] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 723.603071][ T4751] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 723.609331][ T4751] ? btrfs_remount+0x10f0/0x10f0 [ 723.614372][ T4751] legacy_get_tree+0x108/0x220 [ 723.619160][ T4751] ? legacy_get_tree+0x108/0x220 [ 723.624122][ T4751] vfs_get_tree+0x8e/0x390 [ 723.628577][ T4751] do_mount+0x13b3/0x1c30 [ 723.632918][ T4751] ? copy_mount_string+0x40/0x40 [ 723.637875][ T4751] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 723.644129][ T4751] ? copy_mount_options+0x2e8/0x3f0 [ 723.649349][ T4751] ksys_mount+0xdb/0x150 [ 723.653601][ T4751] __x64_sys_mount+0xbe/0x150 [ 723.658285][ T4751] do_syscall_64+0xfd/0x6a0 [ 723.662799][ T4751] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 723.668693][ T4751] RIP: 0033:0x45c27a 22:25:09 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0xb, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 723.672596][ T4751] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 723.692211][ T4751] RSP: 002b:00007faa47624a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 723.700630][ T4751] RAX: ffffffffffffffda RBX: 00007faa47624b40 RCX: 000000000045c27a [ 723.708603][ T4751] RDX: 00007faa47624ae0 RSI: 0000000020000100 RDI: 00007faa47624b00 [ 723.716581][ T4751] RBP: 0000000000000001 R08: 00007faa47624b40 R09: 00007faa47624ae0 [ 723.724571][ T4751] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 723.732544][ T4751] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:25:09 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) r2 = socket(0x10, 0x800, 0x8) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x4) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r3 = dup(r0) recvfrom$inet6(r3, &(0x7f0000000280)=""/72, 0x48, 0x10000, &(0x7f0000000100)={0xa, 0x4e21, 0x0, @empty, 0x102000000000}, 0x1c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet6(r3, &(0x7f0000000200)="150300000600400000000200850cf7c41975e697080000026b2a2fcddad8897c6f11876d886b17b07783af113b860f84f789cca7a7659866a63deae307d02f74610000000000000000000000963c8b7fc0", 0x51, 0x0, 0x0, 0x0) recvfrom$inet6(r3, &(0x7f0000000180)=""/71, 0x47, 0x0, 0x0, 0x0) 22:25:09 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0xd, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:25:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:25:09 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600400003e80200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:25:09 executing program 1 (fault-call:0 fault-nth:76): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:25:09 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x18000000}}, 0x30) 22:25:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:25:09 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x28, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:25:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) [ 724.068871][ T4896] FAULT_INJECTION: forcing a failure. [ 724.068871][ T4896] name failslab, interval 1, probability 0, space 0, times 0 22:25:09 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x60, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 724.113148][ T4896] CPU: 0 PID: 4896 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 724.121093][ T4896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 724.131170][ T4896] Call Trace: [ 724.134486][ T4896] dump_stack+0x172/0x1f0 [ 724.138840][ T4896] should_fail.cold+0xa/0x15 [ 724.143443][ T4896] ? alloc_page_buffers+0x16a/0x5c0 [ 724.148646][ T4896] ? fault_create_debugfs_attr+0x180/0x180 [ 724.154464][ T4896] ? btrfs_open_devices+0x140/0x160 22:25:09 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0xf0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 724.159673][ T4896] ? find_get_entry+0x50e/0x880 [ 724.164533][ T4896] ? __kasan_check_read+0x11/0x20 [ 724.169567][ T4896] __should_failslab+0x121/0x190 [ 724.174508][ T4896] should_failslab+0x9/0x14 [ 724.174521][ T4896] kmem_cache_alloc+0x47/0x710 [ 724.174537][ T4896] ? ___might_sleep+0x163/0x280 [ 724.174552][ T4896] ? mempool_alloc+0x380/0x380 [ 724.174563][ T4896] mempool_alloc_slab+0x47/0x60 [ 724.174573][ T4896] mempool_alloc+0x169/0x380 [ 724.174585][ T4896] ? workingset_refault+0xba0/0xba0 [ 724.174600][ T4896] ? mempool_destroy+0x40/0x40 [ 724.174611][ T4896] ? __kasan_check_write+0x14/0x20 [ 724.174630][ T4896] ? lock_downgrade+0x920/0x920 [ 724.174643][ T4896] ? rwlock_bug.part.0+0x90/0x90 [ 724.174657][ T4896] ? __find_get_block+0x555/0xdb0 [ 724.174679][ T4896] bio_alloc_bioset+0x3b9/0x680 [ 724.174692][ T4896] ? __find_get_block+0x330/0xdb0 [ 724.174713][ T4896] ? bvec_alloc+0x2f0/0x2f0 [ 724.183964][ T4896] ? __getblk_gfp+0x5c/0xa10 [ 724.183979][ T4896] submit_bh_wbc+0x1c5/0x900 [ 724.183994][ T4896] __bread_gfp+0x164/0x370 22:25:09 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x1a0, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 724.184016][ T4896] btrfs_read_dev_one_super+0xb6/0x2a0 [ 724.184030][ T4896] btrfs_read_dev_super+0x6c/0xd0 [ 724.184043][ T4896] ? btrfs_read_dev_one_super+0x2a0/0x2a0 [ 724.184063][ T4896] btrfs_get_bdev_and_sb+0xff/0x300 [ 724.184083][ T4896] open_fs_devices+0x6e7/0xc40 [ 724.287132][ T4896] ? btrfs_uuid_rescan_kthread+0x60/0x60 [ 724.292870][ T4896] ? btrfs_scan_one_device+0x5ac/0x710 [ 724.298345][ T4896] btrfs_open_devices+0x140/0x160 [ 724.303391][ T4896] btrfs_mount_root+0x793/0x1290 [ 724.308347][ T4896] ? btrfs_decode_error+0x70/0x70 [ 724.313389][ T4896] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 724.319668][ T4896] ? legacy_parse_param+0x116/0x880 [ 724.324876][ T4896] ? __lookup_constant+0xd6/0x100 [ 724.329918][ T4896] ? security_fs_context_parse_param+0x81/0xb0 [ 724.336085][ T4896] ? logfc+0x700/0x700 [ 724.340165][ T4896] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 724.346419][ T4896] ? vfs_parse_fs_param+0xcd/0x540 [ 724.351558][ T4896] ? kfree+0x1fd/0x2c0 [ 724.355632][ T4896] ? vfs_parse_fs_string+0x116/0x170 [ 724.360927][ T4896] ? vfs_parse_fs_param+0x540/0x540 [ 724.367387][ T4896] ? btrfs_decode_error+0x70/0x70 [ 724.372425][ T4896] legacy_get_tree+0x108/0x220 [ 724.377201][ T4896] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 724.383467][ T4896] vfs_get_tree+0x8e/0x390 [ 724.387921][ T4896] fc_mount+0x17/0xc0 [ 724.397301][ T4896] vfs_kern_mount.part.0+0xd8/0xf0 [ 724.397316][ T4896] vfs_kern_mount+0x40/0x60 [ 724.397334][ T4896] btrfs_mount+0x2b4/0x15e2 [ 724.397346][ T4896] ? __kasan_check_read+0x11/0x20 [ 724.397363][ T4896] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 724.397389][ T4896] ? should_fail+0x1de/0x852 [ 724.411533][ T4896] ? fault_create_debugfs_attr+0x180/0x180 [ 724.411555][ T4896] ? btrfs_remount+0x10f0/0x10f0 [ 724.411580][ T4896] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 724.444438][ T4896] ? refcount_sub_and_test_checked+0x154/0x200 [ 724.450587][ T4896] ? refcount_dec_not_one+0x1f0/0x1f0 [ 724.455951][ T4896] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 724.462203][ T4896] ? legacy_parse_param+0x116/0x880 [ 724.467425][ T4896] ? __lookup_constant+0xd6/0x100 [ 724.472482][ T4896] ? refcount_dec_and_test_checked+0x1b/0x20 [ 724.478481][ T4896] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 724.484741][ T4896] ? apparmor_capable+0x2ed/0x630 [ 724.489776][ T4896] ? cap_capable+0x205/0x270 [ 724.494454][ T4896] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 724.500704][ T4896] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 724.506965][ T4896] ? btrfs_remount+0x10f0/0x10f0 [ 724.512021][ T4896] legacy_get_tree+0x108/0x220 [ 724.516823][ T4896] ? legacy_get_tree+0x108/0x220 [ 724.521779][ T4896] vfs_get_tree+0x8e/0x390 [ 724.526209][ T4896] do_mount+0x13b3/0x1c30 [ 724.530567][ T4896] ? copy_mount_string+0x40/0x40 [ 724.535523][ T4896] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 724.541770][ T4896] ? _copy_from_user+0x12c/0x1a0 [ 724.546740][ T4896] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 724.553042][ T4896] ? copy_mount_options+0x2e8/0x3f0 [ 724.558251][ T4896] ksys_mount+0xdb/0x150 [ 724.562530][ T4896] __x64_sys_mount+0xbe/0x150 [ 724.567252][ T4896] do_syscall_64+0xfd/0x6a0 [ 724.571788][ T4896] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 724.577689][ T4896] RIP: 0033:0x45c27a [ 724.581598][ T4896] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 724.601195][ T4896] RSP: 002b:00007faa47624a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 22:25:10 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$VIDIOC_S_HW_FREQ_SEEK(r2, 0x40305652, &(0x7f0000000100)={0x918b, 0x3, 0x80, 0x5, 0x0, 0xd0, 0xfffffffffffffff9}) write$UHID_DESTROY(r2, &(0x7f0000000180), 0x4) sendto$inet6(r2, &(0x7f0000000200)="150300000600400000000200850cf7c41975e697080000026b2a2fcddad8897c6f11876d886b17b07783af113b860f84f789cca7a7659866a63deae307d02f74610000000000000000000000963c8b7fc0", 0x51, 0x0, 0x0, 0x0) recvfrom$inet6(r2, &(0x7f0000000080)=""/71, 0xd7, 0x0, 0x0, 0x0) 22:25:10 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x300, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) 22:25:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c0000001900010200000000040000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) [ 724.609613][ T4896] RAX: ffffffffffffffda RBX: 00007faa47624b40 RCX: 000000000045c27a [ 724.617581][ T4896] RDX: 00007faa47624ae0 RSI: 0000000020000100 RDI: 00007faa47624b00 [ 724.625574][ T4896] RBP: 0000000000000001 R08: 00007faa47624b40 R09: 00007faa47624ae0 [ 724.633545][ T4896] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 724.641510][ T4896] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 22:25:10 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendto$inet6(r2, &(0x7f0000000180)="150300000600400001f40200850cf7c21975e697080000026b2a2fcddad8897c6f118756886b662100080000d51cc5470a66e79f60d8b33deae307d02f74610000000000b7c3d66412e3a9a03f60845fb5", 0x51, 0x0, 0x0, 0x0) 22:25:10 executing program 1 (fault-call:0 fault-nth:77): syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 22:25:10 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1fe, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) bind$packet(r0, &(0x7f0000000680)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) r2 = dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x26000000}}, 0x30) 22:25:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:25:10 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x500, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 724.878872][ T5070] FAULT_INJECTION: forcing a failure. [ 724.878872][ T5070] name failslab, interval 1, probability 0, space 0, times 0 [ 724.909243][ T5070] CPU: 0 PID: 5070 Comm: syz-executor.1 Not tainted 5.3.0-rc1+ #84 [ 724.917215][ T5070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 724.927301][ T5070] Call Trace: [ 724.930610][ T5070] dump_stack+0x172/0x1f0 [ 724.934955][ T5070] should_fail.cold+0xa/0x15 [ 724.939548][ T5070] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 724.945626][ T5070] ? fault_create_debugfs_attr+0x180/0x180 [ 724.951444][ T5070] ? page_to_nid.part.0+0x20/0x20 [ 724.956478][ T5070] ? ___might_sleep+0x163/0x280 [ 724.961343][ T5070] __should_failslab+0x121/0x190 [ 724.966322][ T5070] should_failslab+0x9/0x14 [ 724.970882][ T5070] __kmalloc+0x2e0/0x770 [ 724.975132][ T5070] ? fault_create_debugfs_attr+0x180/0x180 [ 724.980942][ T5070] ? bio_alloc_bioset+0x40f/0x680 [ 724.986203][ T5070] bio_alloc_bioset+0x40f/0x680 [ 724.991161][ T5070] ? bvec_alloc+0x2f0/0x2f0 [ 724.995675][ T5070] ? bd_set_size+0xb0/0xb0 [ 725.000100][ T5070] ? wait_for_completion+0x440/0x440 [ 725.005381][ T5070] ? blkdev_put+0xc0/0x560 [ 725.009811][ T5070] btrfs_alloc_device+0xd3/0x720 [ 725.014768][ T5070] ? btrfs_find_device_by_devspec+0x620/0x620 [ 725.020850][ T5070] ? blkdev_put+0x98/0x560 22:25:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2c0000001900010200000000060000001d01000018000400643fdd5b49fad3c4b20000003fe6a8483f853210edaf5473618937936947dfb5bc4912bf20c6ea13f41122416fcdbe0f59dd38d003d77710e8bf41bca5c1f554504fb1a6f4d31055cc11e3d5d4dd2e9d90e5b9715e03a566de718e81854d3eabb213a96e41c74079744f22e66b112269602d7180a054a9d79eac102bc6f300d4ed430f4cf456beb0777ee687ccde75a34428b44953f208614f527e3c1f54a732196d745832a07802891f8435a106f24299adec96d6568a8d9f11fbaafda9237bdc2c52f49b021b85ee3e7700721de31aba779120e18f8816228853dcfee53dca74c99a3ac9a6eeb276f6b1fa7318004ea13ea376f307a55b08de0ebb6b07"], 0x2c}}, 0x0) 22:25:10 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x543, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 725.020878][ T5070] close_fs_devices.part.0+0x1f2/0x7d0 [ 725.030868][ T5070] btrfs_close_devices+0xa0/0x200 [ 725.035917][ T5070] btrfs_mount_root+0xf42/0x1290 [ 725.040950][ T5070] ? btrfs_decode_error+0x70/0x70 [ 725.045996][ T5070] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 725.052261][ T5070] ? legacy_parse_param+0x116/0x880 [ 725.057473][ T5070] ? __lookup_constant+0xd6/0x100 [ 725.062597][ T5070] ? security_fs_context_parse_param+0x81/0xb0 [ 725.068763][ T5070] ? logfc+0x700/0x700 [ 725.072956][ T5070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 725.079209][ T5070] ? vfs_parse_fs_param+0xcd/0x540 [ 725.084331][ T5070] ? kfree+0x1fd/0x2c0 [ 725.088405][ T5070] ? vfs_parse_fs_string+0x116/0x170 [ 725.093696][ T5070] ? vfs_parse_fs_param+0x540/0x540 [ 725.098909][ T5070] ? btrfs_decode_error+0x70/0x70 [ 725.103943][ T5070] legacy_get_tree+0x108/0x220 [ 725.108704][ T5070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 725.114943][ T5070] vfs_get_tree+0x8e/0x390 [ 725.119375][ T5070] fc_mount+0x17/0xc0 [ 725.123447][ T5070] vfs_kern_mount.part.0+0xd8/0xf0 22:25:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) 22:25:10 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @dev={0xfe, 0x80, [0x600, 0x0, 0x100000000000000]}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @icmpv6=@pkt_toobig={0x3, 0x689, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x2f, 0x0, @loopback, @dev, [], "800000e77f000400"}}}}}}}, 0x0) [ 725.128559][ T5070] vfs_kern_mount+0x40/0x60 [ 725.133069][ T5070] btrfs_mount+0x2b4/0x15e2 [ 725.137665][ T5070] ? __kasan_check_read+0x11/0x20 [ 725.142698][ T5070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 725.148948][ T5070] ? should_fail+0x1de/0x852 [ 725.153545][ T5070] ? fault_create_debugfs_attr+0x180/0x180 [ 725.159373][ T5070] ? btrfs_remount+0x10f0/0x10f0 [ 725.164312][ T5070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 725.164328][ T5070] ? refcount_sub_and_test_checked+0x154/0x200 [ 725.164341][ T5070] ? refcount_dec_not_one+0x1f0/0x1f0 [ 725.164355][ T5070] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 725.164372][ T5070] ? legacy_parse_param+0x116/0x880 [ 725.164386][ T5070] ? __lookup_constant+0xd6/0x100 [ 725.164407][ T5070] ? refcount_dec_and_test_checked+0x1b/0x20 [ 725.176823][ T5070] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 725.210786][ T5070] ? apparmor_capable+0x2ed/0x630 [ 725.215800][ T5070] ? cap_capable+0x205/0x270 [ 725.220394][ T5070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 725.226641][ T5070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 725.232894][ T5070] ? btrfs_remount+0x10f0/0x10f0 [ 725.237844][ T5070] legacy_get_tree+0x108/0x220 [ 725.242618][ T5070] ? legacy_get_tree+0x108/0x220 [ 725.247566][ T5070] vfs_get_tree+0x8e/0x390 [ 725.251988][ T5070] do_mount+0x13b3/0x1c30 [ 725.256325][ T5070] ? __this_cpu_preempt_check+0x3a/0x210 [ 725.261959][ T5070] ? copy_mount_string+0x40/0x40 [ 725.267017][ T5070] ? copy_mount_options+0x23c/0x3f0 [ 725.272230][ T5070] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 725.278492][ T5070] ? copy_mount_options+0x2e8/0x3f0 [ 725.283709][ T5070] ksys_mount+0xdb/0x150 [ 725.287971][ T5070] __x64_sys_mount+0xbe/0x150 [ 725.292769][ T5070] do_syscall_64+0xfd/0x6a0 [ 725.297388][ T5070] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 725.303442][ T5070] RIP: 0033:0x45c27a [ 725.307340][ T5070] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 725.326963][ T5070] RSP: 002b:00007faa47624a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 725.335487][ T5070] RAX: ffffffffffffffda RBX: 00007faa47624b40 RCX: 000000000045c27a [ 725.343464][ T5070] RDX: 00007faa47624ae0 RSI: 0000000020000100 RDI: 00007faa47624b00 [ 725.343472][ T5070] RBP: 0000000000000001 R08: 00007faa47624b40 R09: 00007faa47624ae0 [ 725.343479][ T5070] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 725.343485][ T5070] R13: 00000000004c88e2 R14: 00000000004df6b0 R15: 0000000000000003 [ 725.348840][ T5070] ------------[ cut here ]------------