, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89060000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:45 executing program 5: r0 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, &(0x7f00000000c0)=0x80, 0x80000) r1 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000140)={r1, 0x1}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:45 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x806]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:45 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:45 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:45 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:45 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000004000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:45 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000001000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:45 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xf0ffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:45 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:45 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe80]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:45 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:45 executing program 5: set_mempolicy(0x1, &(0x7f0000000040), 0x7) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xaaaaaaaaaaaa888, &(0x7f0000000200)=[{&(0x7f0000000140)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:45 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:45 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:45 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:45 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:45 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000002300005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000040000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:45 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2800]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:45 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:45 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:45 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3580]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:45 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x420, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000500)={0xa8, 0x0, &(0x7f0000000340)=[@request_death={0x400c630e, 0x2}, @reply_sg={0x40486312, {0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x60, 0x18, &(0x7f0000000140)={@fda={0x66646185, 0x1, 0x2, 0x29}, @fd={0x66642a85, 0x0, r0}, @ptr={0x70742a85, 0x1, &(0x7f00000000c0)=""/22, 0x16, 0x1, 0x4}}, &(0x7f00000001c0)={0x0, 0x20, 0x38}}, 0x440}, @transaction_sg={0x40486311, {0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x60, 0x18, &(0x7f0000000280)={@fda={0x66646185, 0x8, 0x0, 0x1f}, @ptr={0x70742a85, 0x0, &(0x7f0000000240)=""/39, 0x27, 0x0, 0x39}, @fd={0x66642a85, 0x0, r0}}, &(0x7f0000000300)={0x0, 0x20, 0x48}}}], 0xef, 0x0, &(0x7f0000000400)="d874e9083b71c5179fd60c9e26ab3d5a496fe81d0dcfe6f38dd68a675c0d4127cdd163c7296ffb6ec75342043f596e8e3b046b5894d7af8ea85835d3c18d7f5b0596429d05c3b42992924baf086e9143ab7c6856b99ff312f86e332db92033e8303aa3a781f1c80c96bb4d27e5c50772374f41c8b46eb14bffbefb01a719415d616f4426eb5e9f20b54e22fe55a5e32266e16f5161654278087fb227fd23f1178f9476c4a4ac0f351b50d80637140990b1be89a167c1c2b89aecec167a779ad5d7644cb6c880731fce7f34a6f92afc4afadb9d4cf063a62548885551a862485e65b3e88d9c5f7f75d4b2788af58003"}) write$P9_RLERROR(r0, &(0x7f0000000080)={0xf, 0x7, 0x1, {0x6, 'btrfs\x00'}}, 0xf) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000580)='/dev/sequencer2\x00', 0x101000, 0x0) ioctl$VIDIOC_DBG_G_REGISTER(r0, 0xc0385650, &(0x7f0000000540)={{0x0, @addr=0xffffffffffffff00}, 0x8, 0xe1, 0x5}) 09:09:45 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffa888]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:45 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x500000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:46 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x600000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:46 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffca88]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000003005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:46 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:46 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000000010000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:46 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x700000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:46 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:46 executing program 5: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x5, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000680)="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", 0x1000, 0x9}], 0x400, &(0x7f0000000140)={[{@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x1}}], [{@dont_measure='dont_measure'}]}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:46 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffdd86]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:46 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:46 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000005005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:46 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:46 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x806000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2124.612249][T21670] ntfs: (device loop5): parse_options(): Unrecognized mount option dont_measure. [ 2124.639842][T21670] ntfs: (device loop5): parse_options(): Unrecognized mount option . 09:09:46 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8d]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:46 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000000020000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:46 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4788]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:46 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x900000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:46 executing program 5: uselib(&(0x7f0000000000)='./file0\x00') 09:09:46 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:46 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xa00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:46 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4888]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000006005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:46 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x20000, 0x0) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000080)=0xffffffffffffffa0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:46 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:46 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xd00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:46 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:46 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000000030000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:46 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6488]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:46 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffffffffff]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:46 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x1000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:46 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x1100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:47 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800e]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:47 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000380)="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", 0x1d0, 0x10000}], 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x301001, 0x0) mmap$perf(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x110, r1, 0x0) accept$unix(r0, 0x0, &(0x7f0000000080)=0x33f) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f0000000140)='btrfs\x00', 0x0, r1) 09:09:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000007005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:47 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:47 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x2800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000000040000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:47 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8035]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:47 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x3c00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:47 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:47 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:47 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x3f00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:47 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:47 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x200040, 0x6) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f00000003c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x42008, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@fscache='fscache'}, {@aname={'aname', 0x3d, '+vmnet1+GPL'}}], [{@measure='measure'}, {@context={'context', 0x3d, 'user_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/media#\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'btrfs\x00'}}, {@seclabel='seclabel'}, {@uid_lt={'uid<', r1}}, {@dont_hash='dont_hash'}]}}) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0x4) r2 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x3f, 0x42) io_uring_enter(r0, 0x2, 0x1f, 0x3, &(0x7f0000000040)={0x9}, 0x8) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f00000000c0)={r2, 0x0, 0x4000, 0x100000000}) 09:09:47 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000009005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:47 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:47 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8847]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000000050000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:47 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:47 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x4305000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:47 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8848]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:47 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x4400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:47 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8864]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:47 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x400, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000180)={0x80, @time, 0x81, {0x7f00, 0x5}, 0x6, 0x2, 0x8000}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x40000, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x5, 0x0, "04bf24c2c1c83d8948383c6b2bea57768a89146d8b463af26c359c6742e2a77818b50ea750d7d1a5ec069cc6d2fcc49b4dd10197cc33504533a2cd50c1d9cd67002cfe347aa5a1ff594757f65cedc73c"}, 0xd8) r2 = syz_open_dev$swradio(&(0x7f0000000380)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000040)=[@in={0x2, 0x4e24, @loopback}], 0x10) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000340), &(0x7f00000003c0)=0x4) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000080)) 09:09:47 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:47 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x800e000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100000000000a005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:47 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x8035000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:47 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8906]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:47 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000000060000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:48 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0xfffffffffffffffe, 0x40000, 0x0) accept4$bt_l2cap(r0, &(0x7f0000000080), &(0x7f00000000c0)=0xe, 0x800) 09:09:48 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb200]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:48 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x8100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:48 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:48 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x86ddffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:48 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:48 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x806000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:48 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100000000000b005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:48 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x8847000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:48 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000000070000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:48 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:48 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:48 executing program 5: syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xaaaaaaaaaaaad40, &(0x7f0000000600)=[{&(0x7f0000000000)="630180bde5bf69beef29da4483b0cc622462b9d03e2472d935412a09d6c7beccaf2f9ff4a03a1e2e792a391137de", 0x0, 0x4}, {&(0x7f0000000140)="3d838f14e67edc228babc631704631722144def6ba62f7e75392bf5a51fa85eef44b53d7a262f367e2880aee559b92674767112a174e145a777ae1b22e8a6d5fa9b0ace4481814f0ec3ce42f51eeb50fb7de0e93c6267b358b412bdfc072d1be0c2737d46eacf758dddd5593c869ba08ea45f67f4f0adf60f4f38bfedbecfdf2db35be9f8c9acee7934655ac40b935886d2abb", 0x0, 0xfffffffffffff801}, {&(0x7f0000000200)="deb51ff427fb6dc0d2383af9690366fe71da5335834dea383dab8637eb973679c5515692739e7e91d09768f515f88c807c6f663097d602b30d6e0b0600db08899497610f9aff46ee2843ea50b1a3acfaa43c5ecfe49c56977b47c8f59750a34423ee273a26ff51a06dd4b92ee0d6db27ce3ad2b46fb7666bcccee2ffa90b183c24b6d9db77ad833ceed0b1bd9ee3364fe0dd6e0ef474636d5ab86f5a570ef1eedd2c3463d2240dd4bfc6374b82a11a9ca7d5c6e7e7debc7088b069c190aef5cfdad4cd3dfc01e5243e6973602dd92cce419a1210b21574fb", 0x0, 0x3db0}, {&(0x7f0000000300)="38c82291b321e5922e54434d0b3fe57d7961e5d3ace3ad012abb9ddd330241a10d79a0526b949e4050dc609f504bfb3fb3a6d81fb6f4d3169eb714f4c808eff34e09c32d3d2656fa0d76a2c273a363fdcbf9c3cd218e0d673318404436c3afa8b63ea7d10878880891abc9126dd2b7197076bf0cac2c5d11a1e4ae7dba1a887a78174f8a4044e5cb600012e27af514626c7160d98c1b9baceaa794dc927ff386ec29c556ffdaf3635c2d0d0d99f90a75439966d65e8172807d1fc246ef201f01e1e82ab58d77317f2e27063d91e2", 0x0, 0x1}, {&(0x7f0000000400)="e6f7a5a46c9a29db303a124a77fbc43a4dab3b1588c11f3b004cf5111bf2bb471b25bd051f882b2654308f5e638ab7d7efeb6660bbe404918a08163649f339e0c87c5c0c0f06", 0x0, 0x6}, {&(0x7f0000000040)="462decc0d4993d0eeaefcce911f9801b0d6779e7ca2a827cbc2112210a0767ea7a47cbae4d", 0x0, 0x9}, {&(0x7f0000000480)="11d939458812381c874aee98747eaf71953f338a994f67f075a1ad88c480fe6c4c1cd2728253335020aa1b2f05a1f022f1ab416be47fdee467567ba44aacee946dbefdc50188c7ebcb1db7f8378ba8cc4ba6d60af0f2aa238491c1e233155802e5241ec22c79636de5fa63373596a1315b191043e054ffa16cc23221cbbdea2b7fef", 0x0, 0x9}], 0x0, 0x0) 09:09:48 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffff]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:48 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x8848000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:48 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:48 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x8864000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:48 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:48 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:48 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000002010005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:48 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x88a8ffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:48 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000000080000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:48 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:48 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2800000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:48 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000240)={{{@in, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000140)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) lchown(&(0x7f00000000c0)='./file0\x00', r0, r1) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r2, 0x401870cc, &(0x7f0000000080)={0x0, 0xfff, 0x3, 0x4}) 09:09:48 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:48 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x88caffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:48 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c00000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:49 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:49 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x8906000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:49 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000020005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:49 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) r0 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/validatetrans\x00', 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r1, 0x114, 0xa, &(0x7f00000000c0), 0x1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x80, 0x0) ioctl$FICLONE(r0, 0x40049409, r2) 09:09:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000000090000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:49 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x8dffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:49 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:49 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2127.397506][ C1] net_ratelimit: 26 callbacks suppressed [ 2127.397513][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2127.408905][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2127.414669][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2127.420423][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:09:49 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xb200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:49 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:49 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:49 executing program 5: [ 2127.557346][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2127.563149][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2127.568944][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2127.574687][ C0] protocol 88fb is buggy, dev hsr_slave_1 09:09:49 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xdc05000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2127.637362][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2127.643144][ C0] protocol 88fb is buggy, dev hsr_slave_1 09:09:49 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800e000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000001020005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:49 executing program 5: syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x1, 0x1, &(0x7f0000000200)=[{&(0x7f0000000340)="8da44b2fc0ed0000000000000001004d82400e5996cf02ae2f00000000000048aeb81e1b00920efd9a0000010000a52c4d00000000000000000000000000000000000000000000000000000900"/86, 0x56, 0x89}], 0x14, 0x0) 09:09:49 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:49 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xf5ffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:49 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8035000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d010000000000000000000000000a0000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:49 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xfe80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:49 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8060000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:49 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:49 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xfeffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:49 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:49 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000000040)='nfs4\x00', &(0x7f0000000080)='./file0\x00', 0x7f, 0x4, &(0x7f0000000540)=[{&(0x7f0000000240)="2b06a428ae88546f430f8d6dc4ac3eb55f2512fc34a89eaef14ca3347ad806d354c08afd71d01d0362d83f1eea0c3fba1697c869e93d484ccaa0604be087cfdf933c937e45333665b7b5e5ba8aa77acd854387949695b704b07abbc5a5a4bdf85c231c34e646490608ad2faf463a32e1943a8e75a3da3ed5b3fc13ed439ce177f7f3c98fcc605649c163eff8586bf895c6b7c10151d42b5b3568d47007d86a1cc44bfda139e93f02f658383f6e8325d725247c0ee51ac785119691a7aace39c55a048c37744f2e70e7b32db1f28d8c1a4532a3bd08bed06bd13358985eb609128c1bb8811ae0d5938ce9896c002fafdd2610bbb145c0bc4a", 0xf8, 0x3}, {&(0x7f0000000680)="6b52687861a228949e1ddfcb6bcedc1a71771bec226870b82aaf69260c380f0dbec018b364e02064b94d16d11e7d3cd11cd643428ddad86126330cbc60bfe85032943e04870819e86019adfc49a1b994d3a2d3c065443e45c5c4fe7254675d88388df02be1eb5d8f5e04785969f049bd6b38e29929179dfde6319ed71cb30003d398e2310f76d57f2230de556f96cfff8eac11ad45ef422ca5cec00992e19be825e6105a1cd88d08480aeb0706568796ff0bd3eb16ff7e1d53f496b483a5660666e57ebaefd3d2039916821e0c7600", 0xcf, 0x79b}, {&(0x7f0000000440)="6cedc1bd4b05426aa201fa65b0486dee51a9c7b25309e515dca3bb52592c608d1e43938c936b08b787c373814479b2a8c09e24fd0cb0f128b71ef948b02ea9f1502a86ac0955b38d176f22222ae777cecb5091516d7e5082a13642a1904f28bc81d7e2eb75587dbdb8c55c89e6b71ae693bee4af8efadf9f99b200d81d05ca04f964b01b78e6b1c0da46fc6fed99ae88d4516b3700a613e85d9fed608a890b80aaa7add441f61c112bc3e00bf934a15fbe70bdc128f3ba1a6a604c1a4dbe2249c2902935f765ae93ca3f8ff37925a7e45ab47a94395b696d686da4f0b28f92b9", 0xe0, 0x4}, {&(0x7f0000000140)="f2222708d25d498525012445fbbdd8489aa073f35dc912a8b6962a6f61a95878b218f28f2306185984435be51a28439a092163034b39dba4a257251ace8abd25aa60d945f53b982f57e55783010fb9422edb04d2589b0bffc43f5146cecb46764b2d43556e97de9f91a57edb7939966ff8bfbb2c2be0fa52480224e8ef077790", 0x80, 0x7}], 0x0, &(0x7f00000000c0)='btrfs\x00') syz_mount_image$vfat(&(0x7f00000001c0)='vfat\x00', &(0x7f0000000340)='./file0/file0\x00', 0x2, 0x7, &(0x7f00000019c0)=[{&(0x7f0000000780)="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", 0x1000, 0x9b3}, {&(0x7f0000000380)="51b5e3b515a07bebd11a68bd3a52dcb89414c316cfb6cf1262601d7a40d44eb7be0b08", 0x23, 0x2a}, {&(0x7f00000003c0)="e9684e22ad8da836c14a8d42265fb91399f7fa374a63033bb8b5", 0x1a, 0xfff}, {&(0x7f0000001780)="44fb5b4b993e13e074f802a3b6abe805c9c98cd8f34a9f34e1040ec9f74c84b76d43a07bdb4a24d20e5c1d59350fd4f3884ba38eb533cbf8ffceb1e0074671862d9da10ab03d1bc2803247f71391a64cf645838bfa65733d100435e3c1b1d933d0bcef06a4c3fede5579ed008a3768347fcc7342f61a7f6451b071319a3e4295cbe22b09cd7f61fc4d015324b304d2a6360411ad12b0b27b8b1a878cc27a109276800359cb7b96cfdabe72f1e0468df15d255fed100a3fb2ef2080393faefc13db6b9ebcf831c8c774c60172f553", 0xce}, {&(0x7f0000001880)="4795fd0c1c92ffdcb69befe6213235def3ce16b301cdd10e51d7f2ac6b7d8615b8d1ebe0e5472d77ea4b7a18ccac0c6ebd2bfed7854e07f81e45c648081e1edf4dbf5c734e836f32e31c81a2813c93e4753faa23ea02723868d25e7b66c002752684f94c04503e6f78e8fbe9bc65e474b1dc313ae4f16eaa9d15d1f555377990bdebcc1307", 0x85, 0xfa}, {&(0x7f0000000400)="7c0a8c2fea7c9493f2", 0x9, 0x8000}, {&(0x7f0000001940)="946641f28517ca9045869ff5f845bf3b7c1be25c725475508d2b63f66ebaac9b1995f82b73b4659ce4f2542a4ecbef619c8cde4fc746d94def83e189b5e01ca9a469ab28db4e04594fa2a09b4f0afae01a31322efb6904fb683078f09a0af2f6349689c873237695e9011f36554bcacadb865a023b3707ebaf", 0x79, 0x20}], 0x0, &(0x7f00000005c0)={[{@uni_xlateno='uni_xlate=0'}, {@utf8='utf8=1'}], [{@appraise_type='appraise_type=imasig'}]}) 09:09:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000023005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:50 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:50 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:50 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xff00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:50 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d010000000000000000000000000b0000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:50 executing program 5: pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000140)=0x7, 0x2) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100000000000060cfcad15266535f4d", 0x1a4, 0x8}], 0x100000, 0x0) 09:09:50 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:50 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8847000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:50 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:50 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:50 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:50 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000000100000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100000000003f005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:50 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:50 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8848000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:50 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:50 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000000c0)=0xfffffffffffffffb) read(r0, &(0x7f0000000040)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0x4) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) 09:09:50 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:50 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:50 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8864000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:50 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:50 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000600)="804000001009594b85c63c1cbd217c1befb0bb7a37993f6570e7e16ce3ec50bfc5ef8a02d2d09d533bdb902162bd8a34bd99f1433849e30002000015c7903df39cd3cec7fd016a7d19f90d050474571be52defa8b3180d89ea2486a44400000000000000000000000000b60ceceb46f90c68c46c5ad8340b1ce369fbab834d586f066b3038584fbf07d6267527b883f5bd4a9e79005018b93dceb15b0500000000000000cb121a0eac58b8ca3bd80eb2f318d9b248a27fa1eaf833f783226721942a1bc8c9c2c0dc9020854af9fc965fa33e5841c38eb34fe16faac841f96cadbe", 0xe1}], 0x1}, 0x0) r1 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f00000000c0), 0x492492492492191, 0x0) r2 = getpgrp(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r2) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x38) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r3, 0x0, 0x0) 09:09:50 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43050000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:50 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d010000000000000000000000001f0000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2128.971788][T23131] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2320 sclass=netlink_route_socket pig=23131 comm=syz-executor.5 09:09:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000040005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:50 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff00000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:50 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:50 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:50 executing program 5: perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000140)={0x0, 0x6, 0x30}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000280)={r0}, &(0x7f0000000240)=0xfffffe83) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RVERSION(r3, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x15) write$P9_RAUTH(r3, &(0x7f0000000040)={0x14, 0x67, 0x1}, 0x14) write$P9_RGETATTR(r3, &(0x7f0000000500)={0xa0, 0x19, 0x1}, 0xa0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) r4 = dup3(0xffffffffffffffff, r3, 0x80000) ioctl$TIOCSCTTY(r4, 0x540e, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 09:09:50 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:50 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800e0000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:50 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff00000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:50 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000000200000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:51 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80350000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:51 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8906000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:51 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000010000000000ff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:51 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:51 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:51 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff00000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:51 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) connect(r2, &(0x7f00000001c0)=@in={0x2, 0x4e20, @local}, 0x80) sendmmsg(r2, &(0x7f00000002c0), 0x4000000000000d7, 0x0) 09:09:51 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:51 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:51 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb200000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:51 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000fff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000010200000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:51 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:51 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88470000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:51 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:51 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"/480]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @rand_addr="ffd722dce20f92597102784bad12b4ec"}, {0x2, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000, 0xfd000000]}}, r2}}, 0x48) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x10000, 0x0) pread64(r1, &(0x7f00000004c0)=""/232, 0xe8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) ioctl$sock_inet6_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000700)={@empty, 0x76, r4}) ioctl$SIOCAX25GETINFO(r3, 0x89ed, &(0x7f00000001c0)) ioctl$VIDIOC_DBG_G_CHIP_INFO(r3, 0xc0c85666, &(0x7f0000000740)={{0x4, @name="49440d0ea4599594b607ba480bdd462e7177854cbdae620278aa702638747925"}, "cf966903f32a44c4e6d994b39fe9657fad9de2dcc5246595c5c5a1bdaebb913b", 0x2}) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000840)={0x0, 0x93, "5d4e0e0878a702371e35cd7a4a75794390c4e28b61e24179f85ecbbb03164a0bf13dda6878f8af7cce43eb2dfb094cafe5c87173eae2f8f323c41755bade4f35acabdadc83146aa1292e8126f8c1a7209876aa7cf840521cce36903939fbd8099c0ded7dfbb93685d87f02cf973bf6c515381f0e88f830d873086b2b7546330c3b1802594d6a8e07c33b2f8366805c1472b0fe"}, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000940)={0x48a, 0x561bee4a, 0x8, 0x9, 0x5, 0x0, 0x3, 0x800, r5}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0xfffffffffffffff8) getsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000980)={0x1, 0x48, "bdd877c3f7ab16fdf77a334175ee6af9358f01f54a4053899372ad8a0b4548e8e6f75819f79a5122ea915dd52419adb564cff9815c377294b25d9d37344f16184d69595fd5d7cbcc"}) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) ioctl$VIDIOC_DECODER_CMD(r3, 0xc0485660, &(0x7f0000000a00)={0x3, 0x1, @raw_data=[0x6, 0xfffffffffffffff8, 0x9, 0xfffffffffffffffc, 0x7fffffff, 0x101, 0xe390, 0x101, 0x0, 0x7, 0x8, 0x9ec, 0x0, 0x9, 0x0, 0x6]}) 09:09:51 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:51 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88480000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:51 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:51 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:51 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88640000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:51 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:51 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100000000000000ff42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000000230000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:51 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"/480]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @rand_addr="ffd722dce20f92597102784bad12b4ec"}, {0x2, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000, 0xfd000000]}}, r2}}, 0x48) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x10000, 0x0) pread64(r1, &(0x7f00000004c0)=""/232, 0xe8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) ioctl$sock_inet6_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000700)={@empty, 0x76, r4}) ioctl$SIOCAX25GETINFO(r3, 0x89ed, &(0x7f00000001c0)) ioctl$VIDIOC_DBG_G_CHIP_INFO(r3, 0xc0c85666, &(0x7f0000000740)={{0x4, @name="49440d0ea4599594b607ba480bdd462e7177854cbdae620278aa702638747925"}, "cf966903f32a44c4e6d994b39fe9657fad9de2dcc5246595c5c5a1bdaebb913b", 0x2}) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000840)={0x0, 0x93, "5d4e0e0878a702371e35cd7a4a75794390c4e28b61e24179f85ecbbb03164a0bf13dda6878f8af7cce43eb2dfb094cafe5c87173eae2f8f323c41755bade4f35acabdadc83146aa1292e8126f8c1a7209876aa7cf840521cce36903939fbd8099c0ded7dfbb93685d87f02cf973bf6c515381f0e88f830d873086b2b7546330c3b1802594d6a8e07c33b2f8366805c1472b0fe"}, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000940)={0x48a, 0x561bee4a, 0x8, 0x9, 0x5, 0x0, 0x3, 0x800, r5}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0xfffffffffffffff8) getsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000980)={0x1, 0x48, "bdd877c3f7ab16fdf77a334175ee6af9358f01f54a4053899372ad8a0b4548e8e6f75819f79a5122ea915dd52419adb564cff9815c377294b25d9d37344f16184d69595fd5d7cbcc"}) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) ioctl$VIDIOC_DECODER_CMD(r3, 0xc0485660, &(0x7f0000000a00)={0x3, 0x1, @raw_data=[0x6, 0xfffffffffffffff8, 0x9, 0xfffffffffffffffc, 0x7fffffff, 0x101, 0xe390, 0x101, 0x0, 0x7, 0x8, 0x9ec, 0x0, 0x9, 0x0, 0x6]}) 09:09:51 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:51 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:51 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @rand_addr="ffd722dce20f92597102784bad12b4ec"}, {0x2, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000, 0xfd000000]}}, r1}}, 0x48) pread64(r0, &(0x7f00000004c0)=""/232, 0xe8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@initdev}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000980)={0x1, 0x3e, "bdd877c3f7ab16fdf77a334175ee6af9358f01f54a4053899372ad8a0b4548e8e6f75819f79a5122ea915dd52419adb564cff9815c377294b25d9d37344f"}) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 09:09:51 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:51 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:51 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:51 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:51 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000002005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d010000000000000000000000003f0000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:52 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89060000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @rand_addr="ffd722dce20f92597102784bad12b4ec"}, {0x2, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000, 0xfd000000]}}, r1}}, 0x48) pread64(r0, &(0x7f00000004c0)=""/232, 0xe8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@initdev}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000980)={0x1, 0x3e, "bdd877c3f7ab16fdf77a334175ee6af9358f01f54a4053899372ad8a0b4548e8e6f75819f79a5122ea915dd52419adb564cff9815c377294b25d9d37344f"}) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 09:09:52 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:52 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xb2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:52 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:52 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000003005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:52 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000000c0)={0x3, 0x40, 0xfa00, {{0x2, 0x0, 0x0, @rand_addr="ffd722dce20f92597102784bad12b4ec"}, {0x2, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000, 0xfd000000]}}, r1}}, 0x48) pread64(r0, &(0x7f00000004c0)=""/232, 0xe8, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@initdev}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) ioctl$SIOCAX25GETINFO(0xffffffffffffffff, 0x89ed, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000980)={0x1, 0x3e, "bdd877c3f7ab16fdf77a334175ee6af9358f01f54a4053899372ad8a0b4548e8e6f75819f79a5122ea915dd52419adb564cff9815c377294b25d9d37344f"}) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 09:09:52 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:52 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:52 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:52 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000000400000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:52 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:52 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:52 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:52 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000002000), 0x215) write$FUSE_INIT(r0, &(0x7f0000001500)={0x50, 0x0, 0x1}, 0x50) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @broadcast}, 'sit0\x00'}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r3, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) 09:09:52 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000004005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:52 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x543, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:52 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:52 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:52 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:52 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x5dc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:52 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d0100000000000000000000000f420000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:52 executing program 5: 09:09:52 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffa888]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:52 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:52 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000005005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:52 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:52 executing program 5: 09:09:52 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffca88]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:52 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x608, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:52 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000000480000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:52 executing program 5: 09:09:52 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:52 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffdd86]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:52 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000006005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:52 executing program 5: 09:09:52 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x689, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:52 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:53 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002e00)=""/58, 0x3a}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fba, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x20002, 0x0) writev(r0, &(0x7f00000023c0), 0x1000000000000252) 09:09:53 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:53 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:53 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:53 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d010000000000000000000000004c0000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:53 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x806, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:53 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8d]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:53 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000007005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000009c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0xd, 0x3}]}]}}, &(0x7f0000000a80)=""/209, 0x36, 0xd1, 0x1}, 0x20) 09:09:53 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x900, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:53 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:53 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:53 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000000680000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:53 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:53 executing program 5: 09:09:53 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffffffffff]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:53 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xd00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:53 executing program 5: 09:09:53 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000008005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:53 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:53 executing program 5: 09:09:53 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:53 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:53 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d010000000000000000000000006c0000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:53 executing program 5: 09:09:53 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x1100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:53 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:53 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:53 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x2800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:53 executing program 5: 09:09:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000009005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:53 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:53 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x543]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:53 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x3580, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:53 executing program 5: 09:09:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000000740000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:54 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:54 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:54 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x3c00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:54 executing program 5: 09:09:54 executing program 5: 09:09:54 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100000000000a005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:54 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x3f00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:54 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x608]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:54 executing program 5: 09:09:54 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d010000000000000000000000007a0000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:54 executing program 5: 09:09:54 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:54 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x689]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:54 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:54 executing program 5: 09:09:54 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100000000000b005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:54 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:54 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x4400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:54 executing program 5: 09:09:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000ffffff8c0000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:54 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x806]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:54 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x806000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:54 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x4788, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:54 executing program 5: 09:09:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000010005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:54 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x4888, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:54 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:54 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:54 executing program 5: 09:09:54 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x6488, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2133.021653][T24104] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop4 09:09:54 executing program 5: 09:09:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d010000000000000000000000edc00000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:54 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:54 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:54 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x800e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:54 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x8035, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:55 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000023005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:55 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2800000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:55 executing program 5: 09:09:55 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe80]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:55 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x80fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:55 executing program 5: 09:09:55 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000fffffff40000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:55 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:55 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:55 executing program 5: 09:09:55 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:55 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000035f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:55 executing program 5: 09:09:55 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x8847, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:55 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:55 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2800]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2133.637356][ C1] net_ratelimit: 26 callbacks suppressed [ 2133.637363][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2133.648802][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2133.654718][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2133.660490][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:09:55 executing program 5: 09:09:55 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x8848, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2133.797353][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2133.803170][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2133.808981][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2133.814729][ C0] protocol 88fb is buggy, dev hsr_slave_1 09:09:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000fffffff50000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:55 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:55 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3580]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:55 executing program 5: 09:09:55 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x8864, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2133.877367][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2133.883169][ C0] protocol 88fb is buggy, dev hsr_slave_1 09:09:55 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000055f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:55 executing program 5: 09:09:55 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800e000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:55 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c00]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:55 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x8906, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:55 executing program 5: 09:09:55 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8035000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000fffffff60000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:55 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:55 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xb200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:55 executing program 5: 09:09:55 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:55 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:55 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000065f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:55 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xdc05, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:56 executing program 5: 09:09:56 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:56 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000fffffdf90000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:56 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:56 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:56 executing program 5: 09:09:56 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:56 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000075f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:56 executing program 5: 09:09:56 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8847000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:56 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4788]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:56 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xff00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:56 executing program 5: 09:09:56 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000fffffffb0000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:56 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8848000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:56 executing program 5: 09:09:56 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4888]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:56 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:56 executing program 5: 09:09:56 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8864000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:56 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000095f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:56 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6488]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:56 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xf0ffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:56 executing program 5: 09:09:56 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:56 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000fffffdfc0000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:56 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff00000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:56 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800e]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:56 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:56 executing program 5: 09:09:56 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000010000000000000a5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:56 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff00000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:56 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:56 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8035]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:56 executing program 5: 09:09:56 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:56 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8906000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:56 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000fffffdfd0000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:56 executing program 5: 09:09:56 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:56 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:56 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff00000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:56 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000010000000000000b5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:56 executing program 5: 09:09:57 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:57 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8847]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:57 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:57 executing program 5: 09:09:57 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb200000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000000ff0000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:57 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8848]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:57 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:57 executing program 5: 09:09:57 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x8060000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:57 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000020105f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:57 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8864]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:57 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:57 executing program 5: 09:09:57 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x9000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:57 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8906]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d0100000000000000000000000fff0000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:57 executing program 5: 09:09:57 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:57 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xa000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:57 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:57 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb200]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:57 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000205f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:57 executing program 5: 09:09:57 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xd000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:57 executing program 5: r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc05c6104, &(0x7f0000000080)) 09:09:57 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x2, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:57 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000ffffefff0000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:57 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:57 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x3, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:57 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x11000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:57 executing program 5: r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") ioctl$sock_inet6_tcp_SIOCINQ(r0, 0xc05c6104, &(0x7f0000000080)) 09:09:57 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:57 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000010205f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:57 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x5, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:57 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x28000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:57 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x0) recvmmsg(r0, &(0x7f0000003b40)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), 0x4) shutdown(r0, 0x0) 09:09:57 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x6, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:57 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x3c000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000ffefffff0000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:57 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:57 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000235f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:57 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x3f000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:58 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x7, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:58 executing program 5: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0xfffffffffffffffd}, 0x20) getsockname$packet(r0, 0x0, &(0x7f0000001780)) 09:09:58 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffff]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:58 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:58 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x8, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:58 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:58 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000f9fdffff0000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:58 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x43050000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:58 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0xd, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:58 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f0000000080)={0xf, 0x8, 0xfa00, {r1}}, 0x10) 09:09:58 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000010000000000003f5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:58 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:58 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x11, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:58 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:58 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x44000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:58 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000fcfdffff0000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:58 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c00]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:58 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x800e0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:58 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x28, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:58 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:58 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000405f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:58 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:58 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x80350000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:58 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x60, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:58 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:58 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x81000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:58 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0xb2, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:58 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000fdfdffff0000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:58 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:58 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x86ddffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:58 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000ff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:58 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:58 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb200]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:58 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x88470000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:58 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0xf0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:58 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:58 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4888]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:58 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x88480000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:58 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x300, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:59 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d010000000000000000008cffffff0000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:59 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x88640000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:59 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:59 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100000000000fff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:59 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x88a8ffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:59 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x500, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:59 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:59 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8060000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:59 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x88caffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:59 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x89060000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:59 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:59 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x543, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:59 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000f4ffffff0000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:59 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x8dffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:59 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x600, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:59 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000025f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:59 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xb2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:59 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:59 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:59 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xdc050000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:59 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x608, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:59 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:59 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x689, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:59 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xf5ffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:59 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xfe800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:59 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000035f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:59 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000f5ffffff0000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:59 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x700, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:59 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:59 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xfeffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:59 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:09:59 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x806, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:59 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:59 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xff000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:59 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0xd00, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:59 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xffffa888, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:59 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:09:59 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000045f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000f6ffffff0000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:00 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0xe80, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:00 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xffffca88, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:00 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:00 executing program 5: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:00 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x1100, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:00 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43050000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:00 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xffffdd86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:00 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xfffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:00 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x2800, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:00 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800e0000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000055f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000fbffffff0000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:00 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xffffff8d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:00 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x3580, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:00 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80350000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:00 executing program 5: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:00 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xfffffff5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:00 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x3f00, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:00 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000065f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:00 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:00 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:00 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x4000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000200000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:00 executing program 5: syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:00 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:00 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88470000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:00 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x4305, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:00 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x4788, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:00 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88480000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:00 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xf0ffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:01 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000075f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:01 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:01 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x4888, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:01 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000300000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:01 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:01 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88640000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:01 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x6000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:01 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:01 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:01 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x6488, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:01 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000085f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:01 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:01 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:01 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x800e, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2139.878435][ C1] net_ratelimit: 26 callbacks suppressed [ 2139.878442][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2139.889979][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2139.895850][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2139.901616][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:10:01 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000400000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:01 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x500000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:01 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89060000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:01 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x8035, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2140.037376][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2140.043188][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2140.048997][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2140.054742][ C0] protocol 88fb is buggy, dev hsr_slave_1 09:10:01 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x8100, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:01 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x600000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2140.117374][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2140.123172][ C0] protocol 88fb is buggy, dev hsr_slave_1 09:10:01 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000095f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:01 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 09:10:01 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x700000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:01 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x8847, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:02 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000500000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:02 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:02 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:02 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x8848, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:02 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:02 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x8864, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:02 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x806000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:02 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000010000000000000a5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:02 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x900000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:02 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 09:10:02 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x8906, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:02 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:02 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000600000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:02 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xa00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:02 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0xb200, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:02 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffa888]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:02 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0xf000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:02 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xd00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:02 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a0000010000000000010000000000000b5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:02 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffca88]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:02 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 09:10:02 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:02 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0xff00, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:02 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x1100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:02 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000700000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:02 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffdd86]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:02 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 09:10:02 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0xf0ffff, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:02 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x2800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:02 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000105f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:03 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:03 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x3c00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:03 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x1000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:03 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 09:10:03 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x3f00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:03 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x2000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:03 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000800000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:03 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:03 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8d]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:03 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x3000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:03 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 09:10:03 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000235f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:03 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:03 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x5000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:03 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x4305000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:03 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x4400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:03 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:03 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x6000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:03 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000900000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:03 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 09:10:03 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x800e000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:03 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x7000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:03 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffffffffff]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:04 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100000000000000ff42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:04 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x8035000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:04 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:04 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x8000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:04 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 09:10:04 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x8100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:04 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x8060000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:04 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000a00000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:04 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:04 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x86ddffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:04 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0xd000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:04 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f425d5266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:04 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 09:10:04 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x11000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:04 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x8847000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:04 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:04 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x8848000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:04 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485d66535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:04 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000b00000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:04 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:04 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x8864000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:04 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x28000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:04 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600), 0x0, 0x10000}], 0x0, 0x0) 09:10:04 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x88a8ffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:04 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x3f000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:04 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x88caffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:04 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:04 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x8906000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:04 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x40000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:05 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x43050000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:05 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600), 0x0, 0x10000}], 0x0, 0x0) 09:10:05 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:05 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485225535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:05 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x8dffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:05 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000001000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:05 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x60000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:05 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xb200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:05 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:05 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600), 0x0, 0x10000}], 0x0, 0x0) 09:10:05 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xdc05000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:05 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x800e0000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:05 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:05 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xf5ffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:05 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000002300000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:05 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248522e535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:05 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) 09:10:05 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xfe80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:05 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x80350000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:05 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x806000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:05 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xfeffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:05 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x81000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:05 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:05 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) 09:10:05 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xff00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:05 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x86ddffff, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:05 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000004800000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:05 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248522f535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:05 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:05 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x88470000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:05 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:05 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2", 0x24, 0x10000}], 0x0, 0x0) 09:10:06 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x88480000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:06 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:06 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:06 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:06 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x88640000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:06 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 09:10:06 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000004c00000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:06 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248525c535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:06 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2800000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:06 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:06 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x88a8ffff, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:06 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 09:10:06 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:06 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x88caffff, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:06 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c00000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:06 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000006800000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:06 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:06 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 09:10:06 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x89060000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:06 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852665d5f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:06 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:06 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:06 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x8dffffff, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:06 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:06 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:06 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0xb2000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:06 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff", 0x3f, 0x10000}], 0x0, 0x0) 09:10:06 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000006c00000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:06 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:06 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:06 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0xf5ffffff, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x5d, 0x10000}], 0x0, 0x0) 09:10:07 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:07 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0xff000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:07 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:07 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff", 0x3f, 0x10000}], 0x0, 0x0) 09:10:07 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800e000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:07 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:07 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0xffffa888, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:07 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000007400000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:07 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:07 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0xffffca88, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:07 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8035000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10002}], 0x0, 0x0) 09:10:07 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0xffffdd86, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:07 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:07 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff", 0x3f, 0x10000}], 0x0, 0x0) 09:10:07 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:07 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0xfffff000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:07 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:07 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:07 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000007a00000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:07 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:07 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f424852", 0x44, 0x10000}], 0x0, 0x0) 09:10:07 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0xffffff8d, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:07 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10003}], 0x0, 0x0) 09:10:07 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8847000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:07 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0xfffffff5, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:07 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2146.117366][ C1] net_ratelimit: 26 callbacks suppressed [ 2146.117377][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2146.128824][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2146.134636][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2146.140396][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:10:07 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8848000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:07 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xb2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:07 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0xf0ffffffffffff, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f424852", 0x44, 0x10000}], 0x0, 0x0) [ 2146.277348][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2146.283148][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2146.288955][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2146.294696][ C0] protocol 88fb is buggy, dev hsr_slave_1 09:10:08 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000003000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:08 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:08 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x100000000000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:08 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8864000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2146.357372][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2146.363694][ C0] protocol 88fb is buggy, dev hsr_slave_1 09:10:08 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10004}], 0x0, 0x0) 09:10:08 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x200000000000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:08 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:08 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff00000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:08 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:08 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x543, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f424852", 0x44, 0x10000}], 0x0, 0x0) 09:10:08 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x5dc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:08 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000005000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:08 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x300000000000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:08 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff00000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:08 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x600, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:08 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10005}], 0x0, 0x0) 09:10:08 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x608, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:08 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 09:10:08 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x500000000000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:08 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8906000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:08 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x689, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:08 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff00000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:08 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x600000000000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:08 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000006000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:08 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:08 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10006}], 0x0, 0x0) 09:10:08 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb200000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:08 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x700000000000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:08 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x806, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 09:10:09 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x800000000000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:09 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:09 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x900, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:09 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:09 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x806000000000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:09 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000007000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:09 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:09 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10007}], 0x0, 0x0) 09:10:09 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xd00, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:09 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0xd00000000000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:09 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 09:10:09 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:09 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x1100000000000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:09 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x1100, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:09 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:09 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x2800000000000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:09 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000009000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:09 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x2800, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:09 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10008}], 0x0, 0x0) 09:10:09 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x3580, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:09 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:09 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x3f00000000000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 09:10:09 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x3c00, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:09 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x3f00, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:09 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:09 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x4000000000000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:09 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:09 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d0100000000000000000000000a000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:09 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:09 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 09:10:09 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10009}], 0x0, 0x0) 09:10:09 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x4305000000000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:09 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:09 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x4400, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:09 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x6000000000000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:10 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:10 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x4788, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 09:10:10 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x4888, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:10 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d0100000000000000000000000b000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:10 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x800e000000000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:10 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:10 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x6488, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x1000a}], 0x0, 0x0) 09:10:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48}], 0x0, 0x0) 09:10:10 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x8035000000000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:10 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x800e, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:10 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:10 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x8035, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:10 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x8100000000000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:10 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:10 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d0100000000000000000000420f000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:10 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x80fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x1000b}], 0x0, 0x0) 09:10:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48}], 0x0, 0x0) 09:10:10 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x86ddffff00000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:10 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:10 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x8847000000000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:10 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:10 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:10 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x8848000000000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:10 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x8847, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:10 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10010}], 0x0, 0x0) 09:10:10 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000002010000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:10 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48}], 0x0, 0x0) 09:10:10 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:10 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x8848, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:11 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x8864000000000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:11 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:11 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x8864, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:11 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x88a8ffff00000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:11 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10023}], 0x0, 0x0) 09:10:11 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffdd86]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:11 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x88caffff00000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:11 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x8906, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:11 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d0100000000000000000000001f000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:11 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:11 executing program 5: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x8100, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:11 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x8906000000000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:11 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xb200, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:11 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000023000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:11 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x8dffffff00000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:11 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10300}], 0x0, 0x0) 09:10:11 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:11 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xdc05, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:11 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0xb200000000000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:11 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:11 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000020000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:11 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:11 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:11 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0xf5ffffff00000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:11 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89060000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:11 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10500}], 0x0, 0x0) 09:10:11 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0xff00000000000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:11 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xff00, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:11 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:11 executing program 5: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:12 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0xfffffffffffff000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:12 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:12 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000001020000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:12 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x543]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:12 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:12 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4eaa, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:12 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xf0ffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:12 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10600}], 0x0, 0x0) 09:10:12 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x2, 0x0, 0x5}}}}}}}, 0x0) 09:10:12 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:12 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:12 executing program 5 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:12 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:12 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000023000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:12 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x608]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:12 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x3, 0x0, 0x5}}}}}}}, 0x0) 09:10:12 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2150.693125][T26054] FAULT_INJECTION: forcing a failure. [ 2150.693125][T26054] name failslab, interval 1, probability 0, space 0, times 0 [ 2150.711450][T26054] CPU: 1 PID: 26054 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2150.719530][T26054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2150.729579][T26054] Call Trace: [ 2150.732875][T26054] dump_stack+0x172/0x1f0 [ 2150.737209][T26054] should_fail.cold+0xa/0x15 [ 2150.741801][T26054] ? fault_create_debugfs_attr+0x180/0x180 [ 2150.747601][T26054] ? page_to_nid.part.0+0x20/0x20 [ 2150.752622][T26054] ? ___might_sleep+0x163/0x280 [ 2150.757649][T26054] __should_failslab+0x121/0x190 [ 2150.762586][T26054] should_failslab+0x9/0x14 [ 2150.767080][T26054] __kmalloc+0x2e0/0x770 [ 2150.771322][T26054] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2150.777558][T26054] ? fput_many+0x12c/0x1a0 [ 2150.781970][T26054] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2150.788201][T26054] ? strnlen_user+0x1ed/0x2e0 [ 2150.792867][T26054] ? __x64_sys_memfd_create+0x13c/0x470 [ 2150.798410][T26054] __x64_sys_memfd_create+0x13c/0x470 [ 2150.803775][T26054] ? switch_fpu_return+0x1fa/0x4f0 [ 2150.808882][T26054] ? memfd_fcntl+0x1580/0x1580 [ 2150.813638][T26054] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2150.819702][T26054] ? trace_hardirqs_off_caller+0x65/0x230 [ 2150.825415][T26054] ? trace_hardirqs_on+0x67/0x240 [ 2150.830437][T26054] do_syscall_64+0xfd/0x6a0 [ 2150.834939][T26054] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2150.840825][T26054] RIP: 0033:0x459879 [ 2150.844716][T26054] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2150.864316][T26054] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2150.872732][T26054] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459879 [ 2150.880699][T26054] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 2150.888659][T26054] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2150.896789][T26054] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f9e2b3636d4 [ 2150.904893][T26054] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:12 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:12 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x5, 0x0, 0x5}}}}}}}, 0x0) 09:10:12 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10700}], 0x0, 0x0) 09:10:12 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x689]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:12 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:12 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d0100000000000000000000003f000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:12 executing program 5 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:12 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x6, 0x0, 0x5}}}}}}}, 0x0) 09:10:12 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:12 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2151.155565][T26081] FAULT_INJECTION: forcing a failure. [ 2151.155565][T26081] name failslab, interval 1, probability 0, space 0, times 0 [ 2151.186262][T26081] CPU: 0 PID: 26081 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2151.194348][T26081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2151.204395][T26081] Call Trace: [ 2151.207688][T26081] dump_stack+0x172/0x1f0 [ 2151.212018][T26081] should_fail.cold+0xa/0x15 [ 2151.216605][T26081] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2151.222671][T26081] ? fault_create_debugfs_attr+0x180/0x180 [ 2151.228470][T26081] ? page_to_nid.part.0+0x20/0x20 [ 2151.233495][T26081] ? ___might_sleep+0x163/0x280 [ 2151.238346][T26081] __should_failslab+0x121/0x190 [ 2151.243278][T26081] ? shmem_destroy_inode+0x80/0x80 [ 2151.248381][T26081] should_failslab+0x9/0x14 [ 2151.252884][T26081] kmem_cache_alloc+0x2aa/0x710 [ 2151.257747][T26081] ? __alloc_fd+0x487/0x620 [ 2151.262254][T26081] ? __kasan_check_read+0x11/0x20 [ 2151.267273][T26081] ? shmem_destroy_inode+0x80/0x80 [ 2151.272383][T26081] shmem_alloc_inode+0x1c/0x50 [ 2151.277146][T26081] alloc_inode+0x68/0x1e0 [ 2151.281479][T26081] new_inode_pseudo+0x19/0xf0 [ 2151.286149][T26081] new_inode+0x1f/0x40 [ 2151.290214][T26081] shmem_get_inode+0x84/0x7e0 [ 2151.294887][T26081] __shmem_file_setup.part.0+0x7e/0x2b0 [ 2151.300429][T26081] shmem_file_setup+0x66/0x90 [ 2151.305106][T26081] __x64_sys_memfd_create+0x2a2/0x470 [ 2151.310473][T26081] ? memfd_fcntl+0x1580/0x1580 [ 2151.315231][T26081] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2151.321303][T26081] ? trace_hardirqs_off_caller+0x65/0x230 [ 2151.327017][T26081] ? trace_hardirqs_on+0x67/0x240 [ 2151.332039][T26081] do_syscall_64+0xfd/0x6a0 [ 2151.336542][T26081] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2151.342423][T26081] RIP: 0033:0x459879 [ 2151.346316][T26081] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2151.365913][T26081] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2151.374323][T26081] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459879 [ 2151.382287][T26081] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 2151.390254][T26081] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2151.398216][T26081] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f9e2b3636d4 09:10:13 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x7, 0x0, 0x5}}}}}}}, 0x0) 09:10:13 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2151.406181][T26081] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:13 executing program 5 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10900}], 0x0, 0x0) 09:10:13 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x806]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:13 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:13 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000040000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2151.599504][T26101] FAULT_INJECTION: forcing a failure. [ 2151.599504][T26101] name failslab, interval 1, probability 0, space 0, times 0 [ 2151.614374][T26101] CPU: 0 PID: 26101 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2151.622451][T26101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2151.632499][T26101] Call Trace: [ 2151.635811][T26101] dump_stack+0x172/0x1f0 [ 2151.640152][T26101] should_fail.cold+0xa/0x15 [ 2151.644739][T26101] ? fault_create_debugfs_attr+0x180/0x180 [ 2151.650536][T26101] ? __kasan_check_read+0x11/0x20 [ 2151.655564][T26101] ? ___might_sleep+0x163/0x280 [ 2151.660412][T26101] __should_failslab+0x121/0x190 [ 2151.665345][T26101] should_failslab+0x9/0x14 [ 2151.669842][T26101] kmem_cache_alloc+0x2aa/0x710 [ 2151.674687][T26101] ? __put_user_ns+0x70/0x70 [ 2151.679269][T26101] ? percpu_ref_put_many+0xb6/0x190 [ 2151.684462][T26101] ? memcg_kmem_put_cache+0x3e/0x50 [ 2151.689659][T26101] security_inode_alloc+0x39/0x160 [ 2151.694768][T26101] inode_init_always+0x56e/0xb50 [ 2151.699706][T26101] alloc_inode+0x89/0x1e0 [ 2151.704027][T26101] new_inode_pseudo+0x19/0xf0 [ 2151.708696][T26101] new_inode+0x1f/0x40 [ 2151.712765][T26101] shmem_get_inode+0x84/0x7e0 [ 2151.717438][T26101] __shmem_file_setup.part.0+0x7e/0x2b0 [ 2151.722981][T26101] shmem_file_setup+0x66/0x90 [ 2151.727659][T26101] __x64_sys_memfd_create+0x2a2/0x470 [ 2151.733028][T26101] ? memfd_fcntl+0x1580/0x1580 [ 2151.737789][T26101] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2151.743851][T26101] ? trace_hardirqs_off_caller+0x65/0x230 [ 2151.749565][T26101] ? trace_hardirqs_on+0x67/0x240 [ 2151.754586][T26101] do_syscall_64+0xfd/0x6a0 [ 2151.759092][T26101] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2151.764976][T26101] RIP: 0033:0x459879 [ 2151.768871][T26101] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2151.788468][T26101] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 09:10:13 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x8, 0x0, 0x5}}}}}}}, 0x0) 09:10:13 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x8060000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:13 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:13 executing program 5 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2151.796875][T26101] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459879 [ 2151.804836][T26101] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 2151.812801][T26101] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2151.820766][T26101] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f9e2b3636d4 [ 2151.828729][T26101] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:13 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x9000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:13 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10a00}], 0x0, 0x0) [ 2151.953490][T26114] FAULT_INJECTION: forcing a failure. [ 2151.953490][T26114] name failslab, interval 1, probability 0, space 0, times 0 [ 2151.977355][T26114] CPU: 1 PID: 26114 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2151.985438][T26114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2151.995482][T26114] Call Trace: [ 2151.998775][T26114] dump_stack+0x172/0x1f0 [ 2152.003102][T26114] should_fail.cold+0xa/0x15 [ 2152.007685][T26114] ? should_fail+0x1de/0x852 [ 2152.012290][T26114] ? fault_create_debugfs_attr+0x180/0x180 [ 2152.018097][T26114] ? page_to_nid.part.0+0x20/0x20 [ 2152.023114][T26114] ? ___might_sleep+0x163/0x280 [ 2152.027968][T26114] __should_failslab+0x121/0x190 [ 2152.032907][T26114] should_failslab+0x9/0x14 [ 2152.037408][T26114] kmem_cache_alloc+0x2aa/0x710 [ 2152.042260][T26114] ? lock_acquire+0x190/0x410 [ 2152.046930][T26114] ? current_time+0x6b/0x140 [ 2152.051517][T26114] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2152.057746][T26114] ? timespec64_trunc+0xf0/0x180 [ 2152.062680][T26114] __d_alloc+0x2e/0x8c0 [ 2152.066834][T26114] d_alloc_pseudo+0x1e/0x70 [ 2152.071334][T26114] alloc_file_pseudo+0xe2/0x280 [ 2152.076181][T26114] ? alloc_file+0x4d0/0x4d0 [ 2152.080682][T26114] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 2152.086938][T26114] __shmem_file_setup.part.0+0x108/0x2b0 [ 2152.092567][T26114] shmem_file_setup+0x66/0x90 [ 2152.097243][T26114] __x64_sys_memfd_create+0x2a2/0x470 [ 2152.102617][T26114] ? memfd_fcntl+0x1580/0x1580 [ 2152.107382][T26114] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2152.113442][T26114] ? trace_hardirqs_off_caller+0x65/0x230 [ 2152.119152][T26114] ? trace_hardirqs_on+0x67/0x240 [ 2152.124175][T26114] do_syscall_64+0xfd/0x6a0 [ 2152.128677][T26114] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2152.134557][T26114] RIP: 0033:0x459879 [ 2152.138450][T26114] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2152.158053][T26114] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2152.166545][T26114] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459879 [ 2152.174507][T26114] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 2152.182472][T26114] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2152.190438][T26114] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f9e2b3636d4 09:10:13 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0xd, 0x0, 0x5}}}}}}}, 0x0) 09:10:13 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xa000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2152.198909][T26114] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:14 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:14 executing program 5 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:14 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000f42000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:14 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xd000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:14 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe80]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:14 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x11, 0x0, 0x5}}}}}}}, 0x0) 09:10:14 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2152.357353][ C1] net_ratelimit: 26 callbacks suppressed [ 2152.357360][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2152.369264][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2152.375068][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2152.380840][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:10:14 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2152.435101][T26140] FAULT_INJECTION: forcing a failure. [ 2152.435101][T26140] name failslab, interval 1, probability 0, space 0, times 0 [ 2152.493935][T26140] CPU: 1 PID: 26140 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2152.502027][T26140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2152.512087][T26140] Call Trace: [ 2152.515383][T26140] dump_stack+0x172/0x1f0 [ 2152.517366][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2152.519719][T26140] should_fail.cold+0xa/0x15 [ 2152.519739][T26140] ? rwlock_bug.part.0+0x90/0x90 [ 2152.525470][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2152.530000][T26140] ? fault_create_debugfs_attr+0x180/0x180 [ 2152.530014][T26140] ? page_to_nid.part.0+0x20/0x20 [ 2152.530032][T26140] ? ___might_sleep+0x163/0x280 [ 2152.535000][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2152.540663][T26140] __should_failslab+0x121/0x190 [ 2152.540681][T26140] should_failslab+0x9/0x14 [ 2152.546477][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2152.551464][T26140] kmem_cache_alloc+0x2aa/0x710 [ 2152.551475][T26140] ? rwlock_bug.part.0+0x90/0x90 [ 2152.551493][T26140] ? __d_instantiate+0x82/0x470 [ 2152.591700][T26140] ? lock_downgrade+0x920/0x920 [ 2152.596549][T26140] __alloc_file+0x27/0x340 [ 2152.597351][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2152.600960][T26140] alloc_empty_file+0x72/0x170 [ 2152.600973][T26140] alloc_file+0x5e/0x4d0 [ 2152.600990][T26140] alloc_file_pseudo+0x189/0x280 [ 2152.606706][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2152.611418][T26140] ? alloc_file+0x4d0/0x4d0 [ 2152.611432][T26140] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 2152.611452][T26140] __shmem_file_setup.part.0+0x108/0x2b0 [ 2152.642593][T26140] shmem_file_setup+0x66/0x90 [ 2152.647271][T26140] __x64_sys_memfd_create+0x2a2/0x470 [ 2152.652638][T26140] ? memfd_fcntl+0x1580/0x1580 [ 2152.657396][T26140] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2152.663458][T26140] ? trace_hardirqs_off_caller+0x65/0x230 [ 2152.669174][T26140] ? trace_hardirqs_on+0x67/0x240 [ 2152.674214][T26140] do_syscall_64+0xfd/0x6a0 [ 2152.678717][T26140] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2152.684597][T26140] RIP: 0033:0x459879 [ 2152.688521][T26140] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2152.708113][T26140] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2152.716519][T26140] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459879 [ 2152.724489][T26140] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 2152.732457][T26140] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 09:10:14 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x28, 0x0, 0x5}}}}}}}, 0x0) [ 2152.740419][T26140] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f9e2b3636d4 [ 2152.748473][T26140] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:14 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10b00}], 0x0, 0x0) 09:10:14 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x11000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:14 executing program 5 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:14 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2800]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:14 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x60, 0x0, 0x5}}}}}}}, 0x0) 09:10:14 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000048000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:14 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x28000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2152.867576][T26156] FAULT_INJECTION: forcing a failure. [ 2152.867576][T26156] name failslab, interval 1, probability 0, space 0, times 0 [ 2152.904775][T26156] CPU: 1 PID: 26156 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2152.912854][T26156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2152.922938][T26156] Call Trace: [ 2152.926237][T26156] dump_stack+0x172/0x1f0 [ 2152.930598][T26156] should_fail.cold+0xa/0x15 [ 2152.935192][T26156] ? fault_create_debugfs_attr+0x180/0x180 [ 2152.941017][T26156] ? page_to_nid.part.0+0x20/0x20 [ 2152.946047][T26156] ? ___might_sleep+0x163/0x280 [ 2152.950906][T26156] __should_failslab+0x121/0x190 [ 2152.955842][T26156] should_failslab+0x9/0x14 [ 2152.960338][T26156] kmem_cache_alloc+0x2aa/0x710 [ 2152.965189][T26156] ? memcg_kmem_put_cache+0x3e/0x50 [ 2152.970383][T26156] ? kmem_cache_alloc+0x314/0x710 [ 2152.975406][T26156] security_file_alloc+0x39/0x170 [ 2152.980429][T26156] __alloc_file+0xde/0x340 [ 2152.984859][T26156] alloc_empty_file+0x72/0x170 [ 2152.989632][T26156] alloc_file+0x5e/0x4d0 [ 2152.993890][T26156] alloc_file_pseudo+0x189/0x280 [ 2152.998822][T26156] ? alloc_file+0x4d0/0x4d0 [ 2153.003319][T26156] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 2153.009560][T26156] __shmem_file_setup.part.0+0x108/0x2b0 [ 2153.015194][T26156] shmem_file_setup+0x66/0x90 [ 2153.019870][T26156] __x64_sys_memfd_create+0x2a2/0x470 [ 2153.025243][T26156] ? memfd_fcntl+0x1580/0x1580 [ 2153.030003][T26156] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2153.036067][T26156] ? trace_hardirqs_off_caller+0x65/0x230 [ 2153.041784][T26156] ? trace_hardirqs_on+0x67/0x240 [ 2153.046897][T26156] do_syscall_64+0xfd/0x6a0 [ 2153.051402][T26156] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2153.057289][T26156] RIP: 0033:0x459879 [ 2153.061179][T26156] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2153.080777][T26156] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2153.089185][T26156] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459879 [ 2153.097152][T26156] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 2153.105126][T26156] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 09:10:14 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x3c000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2153.113090][T26156] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f9e2b3636d4 [ 2153.121055][T26156] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:14 executing program 5 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:14 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0xb2, 0x0, 0x5}}}}}}}, 0x0) 09:10:14 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3580]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2153.251399][T26172] FAULT_INJECTION: forcing a failure. [ 2153.251399][T26172] name failslab, interval 1, probability 0, space 0, times 0 [ 2153.267381][T26172] CPU: 0 PID: 26172 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2153.275471][T26172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2153.285548][T26172] Call Trace: [ 2153.288839][T26172] dump_stack+0x172/0x1f0 [ 2153.293169][T26172] should_fail.cold+0xa/0x15 [ 2153.297862][T26172] ? fault_create_debugfs_attr+0x180/0x180 [ 2153.303773][T26172] ? unwind_get_return_address+0x61/0xa0 [ 2153.309404][T26172] ? profile_setup.cold+0xbb/0xbb [ 2153.314425][T26172] ? ___might_sleep+0x163/0x280 [ 2153.319292][T26172] __should_failslab+0x121/0x190 [ 2153.324257][T26172] should_failslab+0x9/0x14 [ 2153.328749][T26172] __kmalloc+0x2e0/0x770 [ 2153.332996][T26172] ? mark_held_locks+0xf0/0xf0 [ 2153.337753][T26172] ? stack_trace_save+0xac/0xe0 [ 2153.342596][T26172] ? stack_trace_consume_entry+0x190/0x190 [ 2153.348396][T26172] ? kasan_unpoison_shadow+0x35/0x50 [ 2153.353679][T26172] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2153.359396][T26172] tomoyo_realpath_from_path+0xcd/0x7b0 [ 2153.364939][T26172] ? tomoyo_path_perm+0x1cb/0x430 [ 2153.369973][T26172] tomoyo_path_perm+0x230/0x430 [ 2153.374821][T26172] ? tomoyo_path_perm+0x1cb/0x430 [ 2153.379846][T26172] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 2153.385906][T26172] ? __fget+0x35d/0x560 [ 2153.390058][T26172] ? __kasan_check_read+0x11/0x20 [ 2153.395088][T26172] ? __kasan_check_read+0x11/0x20 [ 2153.400111][T26172] ? __fget+0xa3/0x560 [ 2153.404189][T26172] ? lock_acquire+0x190/0x410 [ 2153.408859][T26172] ? do_sys_ftruncate+0x282/0x550 [ 2153.413878][T26172] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2153.420183][T26172] tomoyo_path_truncate+0x1d/0x30 [ 2153.425207][T26172] security_path_truncate+0xf2/0x150 [ 2153.430483][T26172] do_sys_ftruncate+0x3d9/0x550 [ 2153.435330][T26172] __x64_sys_ftruncate+0x59/0x80 [ 2153.440265][T26172] do_syscall_64+0xfd/0x6a0 [ 2153.444774][T26172] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2153.450676][T26172] RIP: 0033:0x459847 [ 2153.454572][T26172] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2153.474171][T26172] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 2153.482575][T26172] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459847 [ 2153.490537][T26172] RDX: 0000000020000228 RSI: 0000000000020000 RDI: 0000000000000004 09:10:15 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x3f000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2153.498502][T26172] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2153.506465][T26172] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 2153.514428][T26172] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 2153.535244][T26172] ERROR: Out of memory at tomoyo_realpath_from_path. 09:10:15 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x11020}], 0x0, 0x0) 09:10:15 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0xf0, 0x0, 0x5}}}}}}}, 0x0) 09:10:15 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:15 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c00]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:15 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x300, 0x0, 0x5}}}}}}}, 0x0) 09:10:15 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d0100000000000000000000004c000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:15 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x43050000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:15 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:15 executing program 5 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:15 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x44000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:15 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x500, 0x0, 0x5}}}}}}}, 0x0) 09:10:15 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x800e0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2153.935034][T26210] FAULT_INJECTION: forcing a failure. [ 2153.935034][T26210] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2153.948254][T26210] CPU: 0 PID: 26210 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2153.956313][T26210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2153.966352][T26210] Call Trace: [ 2153.969634][T26210] dump_stack+0x172/0x1f0 [ 2153.969653][T26210] should_fail.cold+0xa/0x15 [ 2153.969672][T26210] ? fault_create_debugfs_attr+0x180/0x180 [ 2153.984357][T26210] ? is_bpf_text_address+0xac/0x170 [ 2153.989556][T26210] ? __kasan_check_read+0x11/0x20 [ 2153.994586][T26210] should_fail_alloc_page+0x50/0x60 [ 2153.999781][T26210] __alloc_pages_nodemask+0x1a1/0x900 [ 2154.005153][T26210] ? __bpf_address_lookup+0x310/0x310 [ 2154.010527][T26210] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2154.016248][T26210] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2154.021969][T26210] ? kernel_text_address+0x73/0xf0 [ 2154.027087][T26210] ? fault_create_debugfs_attr+0x180/0x180 [ 2154.032897][T26210] cache_grow_begin+0x90/0xd20 [ 2154.037661][T26210] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2154.043378][T26210] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2154.049617][T26210] __kmalloc+0x6b2/0x770 [ 2154.053852][T26210] ? mark_held_locks+0xf0/0xf0 [ 2154.058607][T26210] ? stack_trace_save+0xac/0xe0 [ 2154.063450][T26210] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2154.069168][T26210] tomoyo_realpath_from_path+0xcd/0x7b0 [ 2154.074707][T26210] ? tomoyo_path_perm+0x1cb/0x430 [ 2154.079740][T26210] tomoyo_path_perm+0x230/0x430 [ 2154.084604][T26210] ? tomoyo_path_perm+0x1cb/0x430 [ 2154.089624][T26210] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 2154.095686][T26210] ? __fget+0x35d/0x560 [ 2154.099834][T26210] ? __kasan_check_read+0x11/0x20 [ 2154.104853][T26210] ? __kasan_check_read+0x11/0x20 [ 2154.109877][T26210] ? __fget+0xa3/0x560 [ 2154.113950][T26210] ? lock_acquire+0x190/0x410 [ 2154.118620][T26210] ? do_sys_ftruncate+0x282/0x550 [ 2154.123639][T26210] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2154.129874][T26210] tomoyo_path_truncate+0x1d/0x30 [ 2154.134896][T26210] security_path_truncate+0xf2/0x150 [ 2154.140178][T26210] do_sys_ftruncate+0x3d9/0x550 [ 2154.145022][T26210] __x64_sys_ftruncate+0x59/0x80 [ 2154.149953][T26210] do_syscall_64+0xfd/0x6a0 [ 2154.154456][T26210] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2154.160339][T26210] RIP: 0033:0x459847 [ 2154.164228][T26210] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2154.183821][T26210] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 2154.192700][T26210] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459847 [ 2154.200666][T26210] RDX: 0000000020000228 RSI: 0000000000020000 RDI: 0000000000000004 [ 2154.208631][T26210] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2154.216590][T26210] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 2154.224549][T26210] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:16 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x12000}], 0x0, 0x0) 09:10:16 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:16 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x80350000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:16 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x543, 0x0, 0x5}}}}}}}, 0x0) 09:10:16 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000068000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:16 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x600, 0x0, 0x5}}}}}}}, 0x0) 09:10:16 executing program 5 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:16 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x81000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:16 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2154.484564][T26230] FAULT_INJECTION: forcing a failure. [ 2154.484564][T26230] name failslab, interval 1, probability 0, space 0, times 0 [ 2154.506190][T26230] CPU: 1 PID: 26230 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2154.514264][T26230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2154.524304][T26230] Call Trace: [ 2154.524328][T26230] dump_stack+0x172/0x1f0 [ 2154.524351][T26230] should_fail.cold+0xa/0x15 [ 2154.536525][T26230] ? __kasan_check_read+0x11/0x20 [ 2154.541553][T26230] ? fault_create_debugfs_attr+0x180/0x180 [ 2154.547353][T26230] ? __kasan_check_write+0x14/0x20 [ 2154.552461][T26230] ? lock_downgrade+0x920/0x920 [ 2154.557308][T26230] ? ___might_sleep+0x163/0x280 [ 2154.562158][T26230] __should_failslab+0x121/0x190 [ 2154.567091][T26230] should_failslab+0x9/0x14 [ 2154.571590][T26230] __kmalloc+0x2e0/0x770 [ 2154.575829][T26230] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2154.582068][T26230] ? simple_dname+0xd1/0x1f0 [ 2154.586653][T26230] ? tomoyo_encode2.part.0+0xf5/0x400 [ 2154.592035][T26230] tomoyo_encode2.part.0+0xf5/0x400 [ 2154.597231][T26230] tomoyo_encode+0x2b/0x50 [ 2154.601637][T26230] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 2154.607263][T26230] ? tomoyo_path_perm+0x1cb/0x430 [ 2154.612292][T26230] tomoyo_path_perm+0x230/0x430 [ 2154.617141][T26230] ? tomoyo_path_perm+0x1cb/0x430 [ 2154.622168][T26230] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 2154.628235][T26230] ? __fget+0x35d/0x560 [ 2154.632384][T26230] ? __kasan_check_read+0x11/0x20 [ 2154.637403][T26230] ? __kasan_check_read+0x11/0x20 [ 2154.642423][T26230] ? __fget+0xa3/0x560 [ 2154.646500][T26230] ? lock_acquire+0x190/0x410 [ 2154.651171][T26230] ? do_sys_ftruncate+0x282/0x550 [ 2154.656198][T26230] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2154.662433][T26230] tomoyo_path_truncate+0x1d/0x30 [ 2154.667456][T26230] security_path_truncate+0xf2/0x150 [ 2154.672747][T26230] do_sys_ftruncate+0x3d9/0x550 [ 2154.677599][T26230] __x64_sys_ftruncate+0x59/0x80 [ 2154.682530][T26230] do_syscall_64+0xfd/0x6a0 [ 2154.687059][T26230] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2154.692947][T26230] RIP: 0033:0x459847 [ 2154.696838][T26230] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2154.716447][T26230] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 2154.724867][T26230] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459847 09:10:16 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x86ddffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:16 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x608, 0x0, 0x5}}}}}}}, 0x0) [ 2154.732846][T26230] RDX: 0000000020000228 RSI: 0000000000020000 RDI: 0000000000000004 [ 2154.740808][T26230] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2154.748770][T26230] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 2154.756737][T26230] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 2154.767337][T26230] ERROR: Out of memory at tomoyo_realpath_from_path. 09:10:16 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4788]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:16 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x12010}], 0x0, 0x0) 09:10:16 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d0100000000000000000000006c000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:16 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x88470000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:16 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x689, 0x0, 0x5}}}}}}}, 0x0) 09:10:16 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4888]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:16 executing program 5 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2155.026609][T26255] FAULT_INJECTION: forcing a failure. [ 2155.026609][T26255] name failslab, interval 1, probability 0, space 0, times 0 [ 2155.039342][T26255] CPU: 0 PID: 26255 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2155.047435][T26255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2155.057486][T26255] Call Trace: [ 2155.060789][T26255] dump_stack+0x172/0x1f0 [ 2155.065126][T26255] should_fail.cold+0xa/0x15 [ 2155.069716][T26255] ? fault_create_debugfs_attr+0x180/0x180 [ 2155.075520][T26255] ? ___might_sleep+0x163/0x280 [ 2155.080377][T26255] ? __kasan_check_read+0x11/0x20 [ 2155.085402][T26255] __should_failslab+0x121/0x190 [ 2155.090335][T26255] should_failslab+0x9/0x14 [ 2155.094836][T26255] kmem_cache_alloc+0x47/0x710 [ 2155.099590][T26255] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2155.105305][T26255] xas_alloc+0x346/0x460 [ 2155.109539][T26255] xas_create+0x2cd/0x1060 [ 2155.113958][T26255] xas_create_range+0x198/0x5d0 [ 2155.118811][T26255] shmem_add_to_page_cache+0x8ed/0x14c0 [ 2155.124355][T26255] ? shmem_writepage+0xee0/0xee0 [ 2155.129295][T26255] shmem_getpage_gfp+0xeb0/0x2680 [ 2155.134339][T26255] ? shmem_unuse_inode+0x1010/0x1010 [ 2155.139616][T26255] ? lock_acquire+0x190/0x410 [ 2155.144294][T26255] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2155.150533][T26255] ? iov_iter_fault_in_readable+0x22c/0x450 [ 2155.156425][T26255] shmem_write_begin+0x105/0x1e0 [ 2155.161362][T26255] generic_perform_write+0x23b/0x540 [ 2155.166641][T26255] ? timespec64_trunc+0x180/0x180 [ 2155.171668][T26255] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4b0/0x4b0 [ 2155.179720][T26255] ? current_time+0x140/0x140 [ 2155.184401][T26255] ? __kasan_check_write+0x14/0x20 [ 2155.189506][T26255] ? down_write+0xdf/0x150 [ 2155.193919][T26255] __generic_file_write_iter+0x25e/0x630 [ 2155.199548][T26255] ? rwlock_bug.part.0+0x90/0x90 [ 2155.204480][T26255] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2155.210208][T26255] generic_file_write_iter+0x356/0x620 [ 2155.215661][T26255] ? __generic_file_write_iter+0x630/0x630 [ 2155.221463][T26255] ? inode_has_perm+0x1b0/0x230 [ 2155.226313][T26255] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2155.232545][T26255] ? iov_iter_init+0xee/0x210 [ 2155.237218][T26255] new_sync_write+0x4d3/0x770 [ 2155.241901][T26255] ? new_sync_read+0x800/0x800 [ 2155.246670][T26255] ? mark_held_locks+0xf0/0xf0 [ 2155.251449][T26255] ? vfs_write+0x485/0x5d0 [ 2155.255866][T26255] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2155.262281][T26255] __vfs_write+0xe1/0x110 [ 2155.266610][T26255] vfs_write+0x268/0x5d0 [ 2155.270855][T26255] ksys_pwrite64+0x183/0x1c0 [ 2155.275437][T26255] ? __ia32_sys_pread64+0xf0/0xf0 [ 2155.280457][T26255] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2155.286519][T26255] __x64_sys_pwrite64+0x97/0xf0 [ 2155.291365][T26255] do_syscall_64+0xfd/0x6a0 [ 2155.295867][T26255] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2155.301747][T26255] RIP: 0033:0x4137c7 [ 2155.305639][T26255] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 09:10:16 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x700, 0x0, 0x5}}}}}}}, 0x0) 09:10:17 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6488]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:17 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x88480000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2155.325229][T26255] RSP: 002b:00007f9e2b362a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2155.333632][T26255] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004137c7 [ 2155.341594][T26255] RDX: 0000000000000048 RSI: 0000000020000600 RDI: 0000000000000004 [ 2155.349559][T26255] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2155.357524][T26255] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 2155.365490][T26255] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:17 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x806, 0x0, 0x5}}}}}}}, 0x0) 09:10:17 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x88640000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:17 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800e]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:17 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x12300}], 0x0, 0x0) 09:10:17 executing program 5 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:17 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x88a8ffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:17 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0xd00, 0x0, 0x5}}}}}}}, 0x0) 09:10:17 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000074000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:17 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8035]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2155.832461][T26290] FAULT_INJECTION: forcing a failure. [ 2155.832461][T26290] name failslab, interval 1, probability 0, space 0, times 0 [ 2155.845075][T26290] CPU: 0 PID: 26290 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2155.853132][T26290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2155.863183][T26290] Call Trace: [ 2155.866480][T26290] dump_stack+0x172/0x1f0 [ 2155.870820][T26290] should_fail.cold+0xa/0x15 [ 2155.875416][T26290] ? fault_create_debugfs_attr+0x180/0x180 [ 2155.881218][T26290] ? ___might_sleep+0x163/0x280 [ 2155.886073][T26290] __should_failslab+0x121/0x190 [ 2155.891015][T26290] should_failslab+0x9/0x14 [ 2155.895517][T26290] kmem_cache_alloc+0x47/0x710 [ 2155.900276][T26290] ? percpu_ref_tryget_live+0x290/0x290 [ 2155.905902][T26290] xas_alloc+0x346/0x460 [ 2155.910144][T26290] xas_create+0x2cd/0x1060 [ 2155.914558][T26290] xas_create_range+0x198/0x5d0 [ 2155.919410][T26290] shmem_add_to_page_cache+0x8ed/0x14c0 [ 2155.924952][T26290] ? shmem_writepage+0xee0/0xee0 [ 2155.929891][T26290] shmem_getpage_gfp+0xeb0/0x2680 [ 2155.934914][T26290] ? shmem_unuse_inode+0x1010/0x1010 [ 2155.940191][T26290] ? lock_acquire+0x190/0x410 [ 2155.944866][T26290] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2155.951133][T26290] ? iov_iter_fault_in_readable+0x22c/0x450 [ 2155.957025][T26290] shmem_write_begin+0x105/0x1e0 [ 2155.961963][T26290] generic_perform_write+0x23b/0x540 [ 2155.967240][T26290] ? timespec64_trunc+0x180/0x180 [ 2155.972272][T26290] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4b0/0x4b0 [ 2155.980326][T26290] ? current_time+0x140/0x140 [ 2155.985002][T26290] ? __kasan_check_write+0x14/0x20 [ 2155.990110][T26290] ? down_write+0xdf/0x150 [ 2155.994526][T26290] __generic_file_write_iter+0x25e/0x630 [ 2156.000156][T26290] ? rwlock_bug.part.0+0x90/0x90 [ 2156.005088][T26290] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2156.010803][T26290] generic_file_write_iter+0x356/0x620 [ 2156.016260][T26290] ? __generic_file_write_iter+0x630/0x630 [ 2156.022061][T26290] ? inode_has_perm+0x1b0/0x230 [ 2156.026911][T26290] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2156.033142][T26290] ? iov_iter_init+0xee/0x210 [ 2156.037815][T26290] new_sync_write+0x4d3/0x770 [ 2156.042489][T26290] ? new_sync_read+0x800/0x800 [ 2156.047249][T26290] ? mark_held_locks+0xf0/0xf0 [ 2156.052010][T26290] ? vfs_write+0x485/0x5d0 [ 2156.056424][T26290] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2156.062660][T26290] __vfs_write+0xe1/0x110 [ 2156.066986][T26290] vfs_write+0x268/0x5d0 [ 2156.071223][T26290] ksys_pwrite64+0x183/0x1c0 [ 2156.075805][T26290] ? __ia32_sys_pread64+0xf0/0xf0 [ 2156.080824][T26290] ? fput+0x1b/0x20 [ 2156.084631][T26290] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2156.090694][T26290] __x64_sys_pwrite64+0x97/0xf0 [ 2156.095543][T26290] do_syscall_64+0xfd/0x6a0 [ 2156.100058][T26290] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2156.105944][T26290] RIP: 0033:0x4137c7 [ 2156.109833][T26290] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 09:10:17 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x88caffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:17 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0xe80, 0x0, 0x5}}}}}}}, 0x0) 09:10:17 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:17 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x89060000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2156.129426][T26290] RSP: 002b:00007f9e2b362a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 2156.137828][T26290] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004137c7 [ 2156.145795][T26290] RDX: 0000000000000048 RSI: 0000000020000600 RDI: 0000000000000004 [ 2156.153762][T26290] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 2156.161725][T26290] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 2156.169690][T26290] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:18 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x8dffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:18 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8847]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:18 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x13f00}], 0x0, 0x0) 09:10:18 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x1100, 0x0, 0x5}}}}}}}, 0x0) 09:10:18 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xb2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:18 executing program 5 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:18 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8848]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:18 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d0100000000000000000000007a000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:18 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x2800, 0x0, 0x5}}}}}}}, 0x0) 09:10:18 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xdc050000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2156.648549][T26316] FAULT_INJECTION: forcing a failure. [ 2156.648549][T26316] name failslab, interval 1, probability 0, space 0, times 0 [ 2156.689759][T26316] CPU: 0 PID: 26316 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2156.697837][T26316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2156.697844][T26316] Call Trace: [ 2156.697868][T26316] dump_stack+0x172/0x1f0 [ 2156.697889][T26316] should_fail.cold+0xa/0x15 [ 2156.697907][T26316] ? fault_create_debugfs_attr+0x180/0x180 [ 2156.697922][T26316] ? page_to_nid.part.0+0x20/0x20 [ 2156.697938][T26316] ? ___might_sleep+0x163/0x280 [ 2156.697955][T26316] __should_failslab+0x121/0x190 [ 2156.697971][T26316] should_failslab+0x9/0x14 [ 2156.697984][T26316] kmem_cache_alloc+0x2aa/0x710 [ 2156.698008][T26316] getname_flags+0xd6/0x5b0 [ 2156.731003][T26316] getname+0x1a/0x20 [ 2156.731033][T26316] do_sys_open+0x2c9/0x5d0 [ 2156.731052][T26316] ? filp_open+0x80/0x80 [ 2156.767095][T26316] ? fput+0x1b/0x20 [ 2156.770905][T26316] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2156.776970][T26316] __x64_sys_open+0x7e/0xc0 [ 2156.781478][T26316] do_syscall_64+0xfd/0x6a0 [ 2156.785986][T26316] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2156.791876][T26316] RIP: 0033:0x413761 [ 2156.795767][T26316] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2156.815369][T26316] RSP: 002b:00007f9e2b362a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2156.823783][T26316] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413761 [ 2156.831750][T26316] RDX: 00007f9e2b362b0a RSI: 0000000000000002 RDI: 00007f9e2b362b00 09:10:18 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xf5ffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:18 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xfe800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:18 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xfeffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:18 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8864]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2156.839716][T26316] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2156.847693][T26316] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 2156.855754][T26316] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:18 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x14000}], 0x0, 0x0) 09:10:18 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xff000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:18 executing program 5 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:18 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x3580, 0x0, 0x5}}}}}}}, 0x0) 09:10:18 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8906]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:18 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d0100000000000000000000c0ed000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2157.106323][T26349] FAULT_INJECTION: forcing a failure. [ 2157.106323][T26349] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2157.119540][T26349] CPU: 0 PID: 26349 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2157.119549][T26349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2157.119559][T26349] Call Trace: [ 2157.137654][T26349] dump_stack+0x172/0x1f0 [ 2157.137674][T26349] should_fail.cold+0xa/0x15 [ 2157.137694][T26349] ? fault_create_debugfs_attr+0x180/0x180 [ 2157.155630][T26349] ? __kasan_check_write+0x14/0x20 [ 2157.160743][T26349] ? up_write+0x9d/0x280 [ 2157.165000][T26349] should_fail_alloc_page+0x50/0x60 [ 2157.170218][T26349] __alloc_pages_nodemask+0x1a1/0x900 [ 2157.175592][T26349] ? __generic_file_write_iter+0x630/0x630 [ 2157.181391][T26349] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2157.187103][T26349] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2157.192731][T26349] ? __kasan_check_read+0x11/0x20 [ 2157.197764][T26349] ? fault_create_debugfs_attr+0x180/0x180 09:10:18 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb200]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:18 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:18 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x3f00, 0x0, 0x5}}}}}}}, 0x0) [ 2157.203569][T26349] cache_grow_begin+0x90/0xd20 [ 2157.208327][T26349] ? getname_flags+0xd6/0x5b0 [ 2157.213011][T26349] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2157.219246][T26349] kmem_cache_alloc+0x64e/0x710 [ 2157.224101][T26349] getname_flags+0xd6/0x5b0 [ 2157.228596][T26349] getname+0x1a/0x20 [ 2157.228610][T26349] do_sys_open+0x2c9/0x5d0 [ 2157.228624][T26349] ? filp_open+0x80/0x80 [ 2157.228638][T26349] ? fput+0x1b/0x20 [ 2157.228651][T26349] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2157.228667][T26349] __x64_sys_open+0x7e/0xc0 09:10:19 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xffffa888, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2157.236943][T26349] do_syscall_64+0xfd/0x6a0 [ 2157.236961][T26349] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2157.236971][T26349] RIP: 0033:0x413761 [ 2157.236989][T26349] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2157.244978][T26349] RSP: 002b:00007f9e2b362a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2157.244993][T26349] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413761 09:10:19 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xffffca88, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2157.245006][T26349] RDX: 00007f9e2b362b0a RSI: 0000000000000002 RDI: 00007f9e2b362b00 [ 2157.245014][T26349] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2157.245027][T26349] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 2157.255542][T26349] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:19 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xffffdd86, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2157.397347][ C1] net_ratelimit: 24 callbacks suppressed [ 2157.397355][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2157.408778][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:10:19 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x1ff00}], 0x0, 0x0) 09:10:19 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x4000, 0x0, 0x5}}}}}}}, 0x0) 09:10:19 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:19 executing program 5 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:19 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xfffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:19 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d010000000000000000000000ff000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:19 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x4305, 0x0, 0x5}}}}}}}, 0x0) [ 2157.593873][T26377] FAULT_INJECTION: forcing a failure. [ 2157.593873][T26377] name failslab, interval 1, probability 0, space 0, times 0 09:10:19 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2157.661896][T26377] CPU: 1 PID: 26377 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2157.669984][T26377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2157.669991][T26377] Call Trace: [ 2157.670015][T26377] dump_stack+0x172/0x1f0 [ 2157.670036][T26377] should_fail.cold+0xa/0x15 [ 2157.670050][T26377] ? is_bpf_text_address+0xd3/0x170 [ 2157.670069][T26377] ? fault_create_debugfs_attr+0x180/0x180 [ 2157.703249][T26377] ? page_to_nid.part.0+0x20/0x20 [ 2157.708271][T26377] ? ___might_sleep+0x163/0x280 [ 2157.713125][T26377] __should_failslab+0x121/0x190 [ 2157.718064][T26377] should_failslab+0x9/0x14 [ 2157.722559][T26377] kmem_cache_alloc+0x2aa/0x710 [ 2157.727405][T26377] ? stack_trace_save+0xac/0xe0 [ 2157.732248][T26377] ? stack_trace_consume_entry+0x190/0x190 [ 2157.738052][T26377] __alloc_file+0x27/0x340 [ 2157.742465][T26377] alloc_empty_file+0x72/0x170 [ 2157.747224][T26377] path_openat+0xef/0x4630 [ 2157.751655][T26377] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2157.757544][T26377] ? kasan_slab_alloc+0xf/0x20 [ 2157.762302][T26377] ? kmem_cache_alloc+0x121/0x710 [ 2157.767326][T26377] ? getname_flags+0xd6/0x5b0 [ 2157.771996][T26377] ? getname+0x1a/0x20 [ 2157.776057][T26377] ? do_sys_open+0x2c9/0x5d0 [ 2157.780641][T26377] ? __x64_sys_open+0x7e/0xc0 [ 2157.785315][T26377] ? do_syscall_64+0xfd/0x6a0 [ 2157.789988][T26377] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2157.796050][T26377] ? __isolate_free_page+0x4c0/0x4c0 [ 2157.801351][T26377] ? up_write+0x9d/0x280 [ 2157.805596][T26377] ? __kasan_check_read+0x11/0x20 [ 2157.810628][T26377] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 2157.815993][T26377] ? __kasan_check_read+0x11/0x20 [ 2157.821016][T26377] ? __alloc_pages_nodemask+0x578/0x900 [ 2157.826553][T26377] ? cache_grow_end+0xa4/0x190 [ 2157.831325][T26377] ? __kasan_check_read+0x11/0x20 [ 2157.836347][T26377] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2157.842066][T26377] do_filp_open+0x1a1/0x280 [ 2157.846566][T26377] ? may_open_dev+0x100/0x100 [ 2157.851238][T26377] ? lock_downgrade+0x920/0x920 [ 2157.856098][T26377] ? rwlock_bug.part.0+0x90/0x90 [ 2157.861044][T26377] ? __alloc_fd+0x35/0x620 [ 2157.865459][T26377] ? __kasan_check_read+0x11/0x20 [ 2157.870477][T26377] ? do_raw_spin_unlock+0x57/0x270 [ 2157.875584][T26377] ? _raw_spin_unlock+0x2d/0x50 [ 2157.880434][T26377] ? __alloc_fd+0x487/0x620 [ 2157.884953][T26377] do_sys_open+0x3fe/0x5d0 [ 2157.889365][T26377] ? filp_open+0x80/0x80 [ 2157.893605][T26377] ? fput+0x1b/0x20 [ 2157.897415][T26377] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2157.903479][T26377] __x64_sys_open+0x7e/0xc0 [ 2157.907995][T26377] do_syscall_64+0xfd/0x6a0 [ 2157.912495][T26377] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2157.918380][T26377] RIP: 0033:0x413761 [ 2157.922268][T26377] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2157.941863][T26377] RSP: 002b:00007f9e2b362a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2157.950271][T26377] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413761 09:10:19 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x4788, 0x0, 0x5}}}}}}}, 0x0) 09:10:19 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xffffff8d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2157.958238][T26377] RDX: 00007f9e2b362b0a RSI: 0000000000000002 RDI: 00007f9e2b362b00 [ 2157.966200][T26377] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2157.974170][T26377] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 2157.982134][T26377] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:19 executing program 5 (fault-call:0 fault-nth:14): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:19 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xfffffff5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:19 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x4888, 0x0, 0x5}}}}}}}, 0x0) 09:10:19 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffff]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:19 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x1ff0f}], 0x0, 0x0) 09:10:19 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000fff000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2158.113127][T26400] FAULT_INJECTION: forcing a failure. [ 2158.113127][T26400] name failslab, interval 1, probability 0, space 0, times 0 [ 2158.185246][T26400] CPU: 0 PID: 26400 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2158.193822][T26400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2158.203876][T26400] Call Trace: [ 2158.207173][T26400] dump_stack+0x172/0x1f0 [ 2158.211503][T26400] should_fail.cold+0xa/0x15 [ 2158.218081][T26400] ? fault_create_debugfs_attr+0x180/0x180 [ 2158.227545][T26400] ? page_to_nid.part.0+0x20/0x20 [ 2158.232570][T26400] ? ___might_sleep+0x163/0x280 [ 2158.237418][T26400] __should_failslab+0x121/0x190 [ 2158.242359][T26400] should_failslab+0x9/0x14 [ 2158.246871][T26400] kmem_cache_alloc+0x2aa/0x710 [ 2158.251714][T26400] ? memcg_kmem_put_cache+0x3e/0x50 [ 2158.256909][T26400] ? kmem_cache_alloc+0x314/0x710 [ 2158.261948][T26400] security_file_alloc+0x39/0x170 [ 2158.266969][T26400] __alloc_file+0xde/0x340 [ 2158.271380][T26400] alloc_empty_file+0x72/0x170 [ 2158.276141][T26400] path_openat+0xef/0x4630 [ 2158.280556][T26400] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2158.286359][T26400] ? kasan_slab_alloc+0xf/0x20 [ 2158.291113][T26400] ? kmem_cache_alloc+0x121/0x710 [ 2158.296134][T26400] ? getname_flags+0xd6/0x5b0 [ 2158.300802][T26400] ? getname+0x1a/0x20 [ 2158.304861][T26400] ? do_sys_open+0x2c9/0x5d0 [ 2158.309443][T26400] ? __x64_sys_open+0x7e/0xc0 [ 2158.314243][T26400] ? do_syscall_64+0xfd/0x6a0 [ 2158.318923][T26400] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2158.324983][T26400] ? __isolate_free_page+0x4c0/0x4c0 [ 2158.330264][T26400] ? up_write+0x9d/0x280 [ 2158.334508][T26400] ? __kasan_check_read+0x11/0x20 [ 2158.339532][T26400] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 2158.344897][T26400] ? __kasan_check_read+0x11/0x20 [ 2158.349925][T26400] ? __alloc_pages_nodemask+0x578/0x900 [ 2158.355480][T26400] ? cache_grow_end+0xa4/0x190 [ 2158.360799][T26400] ? __kasan_check_read+0x11/0x20 [ 2158.365825][T26400] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2158.371538][T26400] do_filp_open+0x1a1/0x280 [ 2158.376038][T26400] ? may_open_dev+0x100/0x100 [ 2158.380712][T26400] ? lock_downgrade+0x920/0x920 [ 2158.385557][T26400] ? rwlock_bug.part.0+0x90/0x90 [ 2158.390490][T26400] ? __alloc_fd+0x35/0x620 [ 2158.394912][T26400] ? __kasan_check_read+0x11/0x20 [ 2158.399934][T26400] ? do_raw_spin_unlock+0x57/0x270 [ 2158.405050][T26400] ? _raw_spin_unlock+0x2d/0x50 [ 2158.409894][T26400] ? __alloc_fd+0x487/0x620 [ 2158.414418][T26400] do_sys_open+0x3fe/0x5d0 [ 2158.418925][T26400] ? filp_open+0x80/0x80 [ 2158.423165][T26400] ? fput+0x1b/0x20 [ 2158.426968][T26400] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2158.433028][T26400] __x64_sys_open+0x7e/0xc0 [ 2158.437533][T26400] do_syscall_64+0xfd/0x6a0 [ 2158.442042][T26400] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2158.447928][T26400] RIP: 0033:0x413761 [ 2158.451821][T26400] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2158.471413][T26400] RSP: 002b:00007f9e2b362a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 09:10:20 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:20 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2158.479815][T26400] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413761 [ 2158.487778][T26400] RDX: 00007f9e2b362b0a RSI: 0000000000000002 RDI: 00007f9e2b362b00 [ 2158.495742][T26400] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2158.503708][T26400] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 2158.511671][T26400] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:20 executing program 5 (fault-call:0 fault-nth:15): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:20 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x6000, 0x0, 0x5}}}}}}}, 0x0) 09:10:20 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2158.597346][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2158.603148][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2158.608976][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2158.614725][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:10:20 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xf0ffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:20 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:20 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x6488, 0x0, 0x5}}}}}}}, 0x0) [ 2158.757356][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2158.763169][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2158.768996][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2158.774736][ C0] protocol 88fb is buggy, dev hsr_slave_1 09:10:20 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x1000000}], 0x0, 0x0) 09:10:20 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x800e, 0x0, 0x5}}}}}}}, 0x0) 09:10:20 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:20 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000000040000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:20 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:20 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2158.938595][T26430] FAULT_INJECTION: forcing a failure. [ 2158.938595][T26430] name failslab, interval 1, probability 0, space 0, times 0 [ 2158.967596][T26430] CPU: 0 PID: 26430 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2158.975687][T26430] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2158.985729][T26430] Call Trace: [ 2158.985752][T26430] dump_stack+0x172/0x1f0 [ 2158.985777][T26430] should_fail.cold+0xa/0x15 [ 2158.997920][T26430] ? fault_create_debugfs_attr+0x180/0x180 [ 2158.997935][T26430] ? lock_downgrade+0x920/0x920 [ 2158.997954][T26430] ? ___might_sleep+0x163/0x280 [ 2159.013393][T26430] __should_failslab+0x121/0x190 [ 2159.018326][T26430] should_failslab+0x9/0x14 [ 2159.022823][T26430] __kmalloc+0x2e0/0x770 [ 2159.027066][T26430] ? mark_held_locks+0xf0/0xf0 [ 2159.031824][T26430] ? kmem_cache_alloc+0x121/0x710 [ 2159.036850][T26430] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2159.042563][T26430] tomoyo_realpath_from_path+0xcd/0x7b0 [ 2159.048108][T26430] ? tomoyo_path_number_perm+0x193/0x520 [ 2159.053738][T26430] tomoyo_path_number_perm+0x1dd/0x520 [ 2159.059200][T26430] ? tomoyo_path_number_perm+0x193/0x520 [ 2159.064833][T26430] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2159.070638][T26430] ? __kasan_check_read+0x11/0x20 [ 2159.075664][T26430] ? ___might_sleep+0x163/0x280 [ 2159.080521][T26430] ? selinux_file_mprotect+0x620/0x620 [ 2159.085974][T26430] ? __fget+0x384/0x560 [ 2159.090127][T26430] ? ksys_dup3+0x3e0/0x3e0 [ 2159.094539][T26430] ? do_sys_open+0x31d/0x5d0 [ 2159.099132][T26430] tomoyo_file_ioctl+0x23/0x30 [ 2159.103889][T26430] security_file_ioctl+0x77/0xc0 [ 2159.108823][T26430] ksys_ioctl+0x57/0xd0 [ 2159.112978][T26430] __x64_sys_ioctl+0x73/0xb0 [ 2159.117566][T26430] do_syscall_64+0xfd/0x6a0 [ 2159.122065][T26430] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2159.127947][T26430] RIP: 0033:0x4596e7 [ 2159.131843][T26430] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2159.151438][T26430] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2159.159848][T26430] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 2159.167810][T26430] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2159.175776][T26430] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2159.183742][T26430] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2159.191705][T26430] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 2159.232625][T26430] ERROR: Out of memory at tomoyo_realpath_from_path. 09:10:21 executing program 5 (fault-call:0 fault-nth:16): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:21 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x8035, 0x0, 0x5}}}}}}}, 0x0) 09:10:21 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:21 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:21 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000000400000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:21 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x3000000}], 0x0, 0x0) 09:10:21 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2159.580661][T26460] FAULT_INJECTION: forcing a failure. [ 2159.580661][T26460] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2159.593887][T26460] CPU: 1 PID: 26460 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2159.601944][T26460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2159.612023][T26460] Call Trace: [ 2159.615322][T26460] dump_stack+0x172/0x1f0 [ 2159.619661][T26460] should_fail.cold+0xa/0x15 [ 2159.624260][T26460] ? percpu_ref_put_many+0x94/0x190 [ 2159.629475][T26460] ? fault_create_debugfs_attr+0x180/0x180 [ 2159.635298][T26460] should_fail_alloc_page+0x50/0x60 [ 2159.640499][T26460] __alloc_pages_nodemask+0x1a1/0x900 [ 2159.645873][T26460] ? lock_downgrade+0x920/0x920 [ 2159.650726][T26460] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2159.656452][T26460] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2159.662186][T26460] ? fault_create_debugfs_attr+0x180/0x180 [ 2159.668040][T26460] cache_grow_begin+0x90/0xd20 [ 2159.672807][T26460] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2159.678527][T26460] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2159.684766][T26460] __kmalloc+0x6b2/0x770 [ 2159.689003][T26460] ? __kasan_check_read+0x11/0x20 [ 2159.694026][T26460] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2159.699743][T26460] tomoyo_realpath_from_path+0xcd/0x7b0 [ 2159.705295][T26460] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2159.711539][T26460] tomoyo_check_open_permission+0x2a8/0x3f0 [ 2159.717429][T26460] ? tomoyo_path_number_perm+0x520/0x520 [ 2159.723064][T26460] ? ___might_sleep+0x163/0x280 [ 2159.727932][T26460] ? inode_has_perm+0x230/0x230 [ 2159.732777][T26460] ? spin_dump+0xbc/0xd0 [ 2159.737012][T26460] ? lockref_get+0x16/0x60 [ 2159.741431][T26460] tomoyo_file_open+0xa9/0xd0 [ 2159.746112][T26460] security_file_open+0x71/0x300 [ 2159.751053][T26460] do_dentry_open+0x373/0x1250 [ 2159.755808][T26460] ? match_exception_partial+0x242/0x2d0 [ 2159.761440][T26460] ? chown_common+0x5c0/0x5c0 [ 2159.766112][T26460] ? inode_permission+0xb4/0x560 [ 2159.771044][T26460] vfs_open+0xa0/0xd0 [ 2159.775020][T26460] path_openat+0x10e9/0x4630 09:10:21 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x500000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:21 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2159.779609][T26460] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2159.785409][T26460] ? kasan_slab_alloc+0xf/0x20 [ 2159.790163][T26460] ? kmem_cache_alloc+0x121/0x710 [ 2159.795181][T26460] ? getname_flags+0xd6/0x5b0 [ 2159.799850][T26460] ? getname+0x1a/0x20 [ 2159.803913][T26460] ? do_sys_open+0x2c9/0x5d0 [ 2159.808506][T26460] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 2159.813880][T26460] ? __alloc_pages_nodemask+0x578/0x900 [ 2159.819421][T26460] ? cache_grow_end+0xa4/0x190 [ 2159.824183][T26460] ? __kasan_check_read+0x11/0x20 [ 2159.829205][T26460] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2159.834924][T26460] do_filp_open+0x1a1/0x280 [ 2159.839423][T26460] ? may_open_dev+0x100/0x100 [ 2159.844186][T26460] ? __kasan_check_read+0x11/0x20 [ 2159.849207][T26460] ? do_raw_spin_unlock+0x57/0x270 [ 2159.854313][T26460] ? _raw_spin_unlock+0x2d/0x50 [ 2159.859159][T26460] ? __alloc_fd+0x487/0x620 [ 2159.863669][T26460] do_sys_open+0x3fe/0x5d0 [ 2159.868077][T26460] ? filp_open+0x80/0x80 [ 2159.872314][T26460] ? fput+0x1b/0x20 09:10:21 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x600000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2159.876119][T26460] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2159.882188][T26460] __x64_sys_open+0x7e/0xc0 [ 2159.886690][T26460] do_syscall_64+0xfd/0x6a0 [ 2159.891185][T26460] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2159.897067][T26460] RIP: 0033:0x413761 [ 2159.900996][T26460] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2159.920597][T26460] RSP: 002b:00007f9e2b362a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 09:10:21 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x700000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:21 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x8100, 0x0, 0x5}}}}}}}, 0x0) [ 2159.929007][T26460] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413761 [ 2159.936975][T26460] RDX: 00007f9e2b362b0a RSI: 0000000000000002 RDI: 00007f9e2b362b00 [ 2159.944943][T26460] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2159.953001][T26460] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 2159.960966][T26460] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:21 executing program 5 (fault-call:0 fault-nth:17): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:21 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:21 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:21 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x8847, 0x0, 0x5}}}}}}}, 0x0) 09:10:21 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x4000000}], 0x0, 0x0) 09:10:21 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000000000100fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:22 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x806000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:22 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x8848, 0x0, 0x5}}}}}}}, 0x0) 09:10:22 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2160.313518][T26496] FAULT_INJECTION: forcing a failure. [ 2160.313518][T26496] name failslab, interval 1, probability 0, space 0, times 0 [ 2160.333470][T26496] CPU: 1 PID: 26496 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2160.341639][T26496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2160.351687][T26496] Call Trace: [ 2160.354979][T26496] dump_stack+0x172/0x1f0 [ 2160.359851][T26496] should_fail.cold+0xa/0x15 [ 2160.364445][T26496] ? fault_create_debugfs_attr+0x180/0x180 [ 2160.370251][T26496] ? ___might_sleep+0x163/0x280 [ 2160.375193][T26496] __should_failslab+0x121/0x190 [ 2160.380136][T26496] should_failslab+0x9/0x14 [ 2160.384982][T26496] __kmalloc+0x2e0/0x770 [ 2160.389230][T26496] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2160.395466][T26496] ? d_absolute_path+0x11b/0x170 [ 2160.400407][T26496] ? __d_path+0x140/0x140 [ 2160.404729][T26496] ? tomoyo_encode2.part.0+0xf5/0x400 [ 2160.410097][T26496] tomoyo_encode2.part.0+0xf5/0x400 [ 2160.415289][T26496] tomoyo_encode+0x2b/0x50 [ 2160.419699][T26496] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 2160.425328][T26496] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2160.431571][T26496] tomoyo_check_open_permission+0x2a8/0x3f0 [ 2160.437460][T26496] ? tomoyo_path_number_perm+0x520/0x520 [ 2160.443094][T26496] ? ___might_sleep+0x163/0x280 [ 2160.447952][T26496] ? inode_has_perm+0x230/0x230 [ 2160.452795][T26496] ? spin_dump+0xbc/0xd0 [ 2160.457029][T26496] ? lockref_get+0x16/0x60 [ 2160.461447][T26496] tomoyo_file_open+0xa9/0xd0 [ 2160.466120][T26496] security_file_open+0x71/0x300 [ 2160.471058][T26496] do_dentry_open+0x373/0x1250 [ 2160.475818][T26496] ? match_exception_partial+0x242/0x2d0 [ 2160.481451][T26496] ? chown_common+0x5c0/0x5c0 [ 2160.486123][T26496] ? inode_permission+0xb4/0x560 [ 2160.491057][T26496] vfs_open+0xa0/0xd0 [ 2160.495033][T26496] path_openat+0x10e9/0x4630 [ 2160.499619][T26496] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2160.505418][T26496] ? kasan_slab_alloc+0xf/0x20 [ 2160.510178][T26496] ? kmem_cache_alloc+0x121/0x710 [ 2160.515197][T26496] ? getname_flags+0xd6/0x5b0 [ 2160.519871][T26496] ? getname+0x1a/0x20 [ 2160.523942][T26496] ? do_sys_open+0x2c9/0x5d0 [ 2160.528536][T26496] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 2160.533907][T26496] ? __alloc_pages_nodemask+0x578/0x900 [ 2160.539447][T26496] ? cache_grow_end+0xa4/0x190 [ 2160.544201][T26496] ? __kasan_check_read+0x11/0x20 [ 2160.549233][T26496] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2160.554948][T26496] do_filp_open+0x1a1/0x280 [ 2160.559450][T26496] ? may_open_dev+0x100/0x100 [ 2160.564128][T26496] ? __kasan_check_read+0x11/0x20 [ 2160.569150][T26496] ? do_raw_spin_unlock+0x57/0x270 [ 2160.574255][T26496] ? _raw_spin_unlock+0x2d/0x50 [ 2160.579098][T26496] ? __alloc_fd+0x487/0x620 [ 2160.583600][T26496] do_sys_open+0x3fe/0x5d0 [ 2160.588013][T26496] ? filp_open+0x80/0x80 [ 2160.592256][T26496] ? fput+0x1b/0x20 [ 2160.596066][T26496] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2160.602132][T26496] __x64_sys_open+0x7e/0xc0 [ 2160.606632][T26496] do_syscall_64+0xfd/0x6a0 [ 2160.611134][T26496] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2160.617017][T26496] RIP: 0033:0x413761 [ 2160.620908][T26496] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2160.640501][T26496] RSP: 002b:00007f9e2b362a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2160.648903][T26496] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413761 [ 2160.656872][T26496] RDX: 00007f9e2b362b0a RSI: 0000000000000002 RDI: 00007f9e2b362b00 09:10:22 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x8864, 0x0, 0x5}}}}}}}, 0x0) 09:10:22 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000000000200fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2160.664833][T26496] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2160.672799][T26496] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 2160.680760][T26496] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:22 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x900000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2160.735165][T26496] ERROR: Out of memory at tomoyo_realpath_from_path. 09:10:22 executing program 5 (fault-call:0 fault-nth:18): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:22 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x8000000}], 0x0, 0x0) 09:10:22 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:22 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xa00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:22 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x8906, 0x0, 0x5}}}}}}}, 0x0) 09:10:22 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xd00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:22 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8060000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:22 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000000000300fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:22 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0xb200, 0x0, 0x5}}}}}}}, 0x0) [ 2161.020823][T26523] FAULT_INJECTION: forcing a failure. [ 2161.020823][T26523] name failslab, interval 1, probability 0, space 0, times 0 [ 2161.054302][T26523] CPU: 1 PID: 26523 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2161.062381][T26523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2161.072427][T26523] Call Trace: [ 2161.075724][T26523] dump_stack+0x172/0x1f0 [ 2161.080063][T26523] should_fail.cold+0xa/0x15 [ 2161.084655][T26523] ? fault_create_debugfs_attr+0x180/0x180 [ 2161.090458][T26523] ? lock_downgrade+0x920/0x920 [ 2161.095307][T26523] ? ___might_sleep+0x163/0x280 [ 2161.100161][T26523] __should_failslab+0x121/0x190 [ 2161.105099][T26523] should_failslab+0x9/0x14 [ 2161.109601][T26523] __kmalloc+0x2e0/0x770 [ 2161.113842][T26523] ? mark_held_locks+0xf0/0xf0 [ 2161.118609][T26523] ? kmem_cache_alloc+0x121/0x710 [ 2161.123626][T26523] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2161.129342][T26523] tomoyo_realpath_from_path+0xcd/0x7b0 [ 2161.134886][T26523] ? tomoyo_path_number_perm+0x193/0x520 [ 2161.140517][T26523] tomoyo_path_number_perm+0x1dd/0x520 [ 2161.145968][T26523] ? tomoyo_path_number_perm+0x193/0x520 [ 2161.151592][T26523] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2161.157390][T26523] ? __kasan_check_read+0x11/0x20 [ 2161.162414][T26523] ? ___might_sleep+0x163/0x280 [ 2161.167269][T26523] ? selinux_file_mprotect+0x620/0x620 [ 2161.172722][T26523] ? __fget+0x384/0x560 [ 2161.176874][T26523] ? ksys_dup3+0x3e0/0x3e0 [ 2161.181286][T26523] ? do_sys_open+0x31d/0x5d0 [ 2161.185872][T26523] tomoyo_file_ioctl+0x23/0x30 [ 2161.190634][T26523] security_file_ioctl+0x77/0xc0 [ 2161.195568][T26523] ksys_ioctl+0x57/0xd0 [ 2161.199719][T26523] __x64_sys_ioctl+0x73/0xb0 [ 2161.204308][T26523] do_syscall_64+0xfd/0x6a0 [ 2161.208810][T26523] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2161.214696][T26523] RIP: 0033:0x4596e7 [ 2161.218593][T26523] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2161.238186][T26523] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2161.246594][T26523] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 2161.254558][T26523] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2161.262518][T26523] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 09:10:23 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:23 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2161.270483][T26523] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2161.278443][T26523] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:23 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x64000000}], 0x0, 0x0) [ 2161.336331][T26523] ERROR: Out of memory at tomoyo_realpath_from_path. 09:10:23 executing program 5 (fault-call:0 fault-nth:19): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:23 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0xf000, 0x0, 0x5}}}}}}}, 0x0) 09:10:23 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:23 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x1100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:23 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000000000400fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:23 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:23 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0xff00, 0x0, 0x5}}}}}}}, 0x0) 09:10:23 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x2800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:23 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2161.633366][T26558] FAULT_INJECTION: forcing a failure. [ 2161.633366][T26558] name failslab, interval 1, probability 0, space 0, times 0 [ 2161.657915][T26558] CPU: 1 PID: 26558 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2161.666004][T26558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2161.676141][T26558] Call Trace: [ 2161.679444][T26558] dump_stack+0x172/0x1f0 [ 2161.683782][T26558] should_fail.cold+0xa/0x15 [ 2161.688386][T26558] ? fault_create_debugfs_attr+0x180/0x180 [ 2161.694203][T26558] ? ___might_sleep+0x163/0x280 [ 2161.699065][T26558] __should_failslab+0x121/0x190 [ 2161.704015][T26558] should_failslab+0x9/0x14 [ 2161.708517][T26558] __kmalloc+0x2e0/0x770 [ 2161.712756][T26558] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2161.718988][T26558] ? d_absolute_path+0x11b/0x170 [ 2161.723924][T26558] ? __d_path+0x140/0x140 [ 2161.728249][T26558] ? tomoyo_encode2.part.0+0xf5/0x400 [ 2161.733612][T26558] tomoyo_encode2.part.0+0xf5/0x400 [ 2161.738808][T26558] tomoyo_encode+0x2b/0x50 [ 2161.743217][T26558] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 2161.748855][T26558] tomoyo_path_number_perm+0x1dd/0x520 [ 2161.754319][T26558] ? tomoyo_path_number_perm+0x193/0x520 [ 2161.759948][T26558] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2161.765747][T26558] ? __kasan_check_read+0x11/0x20 [ 2161.770776][T26558] ? ___might_sleep+0x163/0x280 [ 2161.775635][T26558] ? selinux_file_mprotect+0x620/0x620 09:10:23 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x3c00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:23 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x67000000}], 0x0, 0x0) [ 2161.781092][T26558] ? __fget+0x384/0x560 [ 2161.785250][T26558] ? ksys_dup3+0x3e0/0x3e0 [ 2161.789660][T26558] ? do_sys_open+0x31d/0x5d0 [ 2161.794248][T26558] tomoyo_file_ioctl+0x23/0x30 [ 2161.799012][T26558] security_file_ioctl+0x77/0xc0 [ 2161.803954][T26558] ksys_ioctl+0x57/0xd0 [ 2161.808135][T26558] __x64_sys_ioctl+0x73/0xb0 [ 2161.812722][T26558] do_syscall_64+0xfd/0x6a0 [ 2161.817228][T26558] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2161.823123][T26558] RIP: 0033:0x4596e7 [ 2161.827015][T26558] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2161.846613][T26558] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2161.855023][T26558] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 2161.862989][T26558] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2161.870954][T26558] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 09:10:23 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0xf0ffff, 0x0, 0x5}}}}}}}, 0x0) [ 2161.878916][T26558] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2161.886876][T26558] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 2161.957486][T26558] ERROR: Out of memory at tomoyo_realpath_from_path. 09:10:23 executing program 5 (fault-call:0 fault-nth:20): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:23 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:23 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:23 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x1000000, 0x0, 0x5}}}}}}}, 0x0) 09:10:23 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000000000500fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:23 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0xff000000}], 0x0, 0x0) 09:10:24 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x2000000, 0x0, 0x5}}}}}}}, 0x0) 09:10:24 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:24 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:24 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x4305000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:24 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x3000000, 0x0, 0x5}}}}}}}, 0x0) 09:10:24 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000000000600fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2162.400442][T26594] FAULT_INJECTION: forcing a failure. [ 2162.400442][T26594] name failslab, interval 1, probability 0, space 0, times 0 [ 2162.430638][T26594] CPU: 0 PID: 26594 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2162.438715][T26594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2162.448763][T26594] Call Trace: [ 2162.452052][T26594] dump_stack+0x172/0x1f0 [ 2162.456381][T26594] should_fail.cold+0xa/0x15 [ 2162.460972][T26594] ? fault_create_debugfs_attr+0x180/0x180 [ 2162.466770][T26594] ? page_to_nid.part.0+0x20/0x20 [ 2162.471790][T26594] ? ___might_sleep+0x163/0x280 [ 2162.476638][T26594] __should_failslab+0x121/0x190 [ 2162.481571][T26594] should_failslab+0x9/0x14 [ 2162.486070][T26594] kmem_cache_alloc_trace+0x2d3/0x790 [ 2162.491439][T26594] ? lockdep_init_map+0x1be/0x6d0 [ 2162.496463][T26594] ? loop_info64_to_compat+0x6d0/0x6d0 [ 2162.501914][T26594] __kthread_create_on_node+0xf2/0x460 [ 2162.507368][T26594] ? lock_acquire+0x190/0x410 [ 2162.512040][T26594] ? __kthread_parkme+0x1c0/0x1c0 [ 2162.517064][T26594] ? loop_set_fd+0x659/0x1020 [ 2162.521747][T26594] ? do_raw_spin_unlock+0x57/0x270 [ 2162.526853][T26594] ? mutex_lock_io_nested+0x1260/0x1260 [ 2162.532399][T26594] ? loop_info64_to_compat+0x6d0/0x6d0 [ 2162.537855][T26594] kthread_create_on_node+0xbb/0xf0 [ 2162.543044][T26594] ? __kthread_create_on_node+0x460/0x460 [ 2162.548762][T26594] ? lockdep_init_map+0x1be/0x6d0 [ 2162.553777][T26594] ? lockdep_init_map+0x1be/0x6d0 [ 2162.558798][T26594] loop_set_fd+0x312/0x1020 [ 2162.563304][T26594] lo_ioctl+0x1a3/0x1460 [ 2162.567547][T26594] ? trace_hardirqs_on+0x67/0x240 [ 2162.572564][T26594] ? loop_set_fd+0x1020/0x1020 [ 2162.577329][T26594] blkdev_ioctl+0xedb/0x1c1a [ 2162.581913][T26594] ? blkpg_ioctl+0xa90/0xa90 [ 2162.586505][T26594] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2162.592311][T26594] ? __kasan_check_read+0x11/0x20 [ 2162.597337][T26594] ? ___might_sleep+0x163/0x280 [ 2162.602184][T26594] block_ioctl+0xee/0x130 [ 2162.606507][T26594] ? blkdev_fallocate+0x410/0x410 [ 2162.611530][T26594] do_vfs_ioctl+0xdb6/0x13e0 [ 2162.616116][T26594] ? ioctl_preallocate+0x210/0x210 [ 2162.621225][T26594] ? selinux_file_mprotect+0x620/0x620 [ 2162.626673][T26594] ? __fget+0x384/0x560 [ 2162.630829][T26594] ? ksys_dup3+0x3e0/0x3e0 [ 2162.635241][T26594] ? do_sys_open+0x31d/0x5d0 [ 2162.639829][T26594] ? tomoyo_file_ioctl+0x23/0x30 [ 2162.644763][T26594] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2162.650996][T26594] ? security_file_ioctl+0x8d/0xc0 [ 2162.656105][T26594] ksys_ioctl+0xab/0xd0 [ 2162.660255][T26594] __x64_sys_ioctl+0x73/0xb0 [ 2162.664840][T26594] do_syscall_64+0xfd/0x6a0 [ 2162.669340][T26594] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2162.675223][T26594] RIP: 0033:0x4596e7 [ 2162.679118][T26594] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2162.698743][T26594] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2162.707146][T26594] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 2162.715108][T26594] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2162.723072][T26594] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2162.731035][T26594] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2162.738999][T26594] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:24 executing program 5 (fault-call:0 fault-nth:21): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:24 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x4400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:24 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x5000000, 0x0, 0x5}}}}}}}, 0x0) [ 2162.757362][ C1] net_ratelimit: 16 callbacks suppressed [ 2162.757368][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2162.768823][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2162.774643][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2162.780399][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:10:24 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:24 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x2, 0x0) 09:10:24 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x800e000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2162.907760][T26613] FAULT_INJECTION: forcing a failure. [ 2162.907760][T26613] name failslab, interval 1, probability 0, space 0, times 0 [ 2162.920491][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2162.920544][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2162.920623][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2162.920660][ C0] protocol 88fb is buggy, dev hsr_slave_1 09:10:24 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x6000000, 0x0, 0x5}}}}}}}, 0x0) 09:10:24 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000000000700fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:24 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x8035000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2162.954653][T26613] CPU: 1 PID: 26613 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2162.962737][T26613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2162.973132][T26613] Call Trace: [ 2162.976429][T26613] dump_stack+0x172/0x1f0 [ 2162.980758][T26613] should_fail.cold+0xa/0x15 [ 2162.985338][T26613] ? blkdev_ioctl+0xedb/0x1c1a [ 2162.990088][T26613] ? fault_create_debugfs_attr+0x180/0x180 [ 2162.995885][T26613] ? page_to_nid.part.0+0x20/0x20 [ 2163.000915][T26613] ? ___might_sleep+0x163/0x280 [ 2163.005774][T26613] __should_failslab+0x121/0x190 [ 2163.010711][T26613] should_failslab+0x9/0x14 [ 2163.015209][T26613] kmem_cache_alloc+0x2aa/0x710 [ 2163.020058][T26613] ? cpuacct_charge+0x1db/0x360 [ 2163.024904][T26613] ? __kasan_check_read+0x11/0x20 [ 2163.029927][T26613] __kernfs_new_node+0xf0/0x6c0 [ 2163.034770][T26613] ? __kasan_check_read+0x11/0x20 [ 2163.039795][T26613] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2163.045248][T26613] ? lock_downgrade+0x920/0x920 [ 2163.050092][T26613] ? update_curr+0x2e8/0x8d0 [ 2163.054680][T26613] ? __enqueue_entity+0x142/0x390 [ 2163.059702][T26613] ? account_entity_enqueue+0x244/0x390 [ 2163.065247][T26613] kernfs_new_node+0x96/0x120 [ 2163.069926][T26613] kernfs_create_dir_ns+0x52/0x160 [ 2163.075044][T26613] internal_create_group+0x7f4/0xc30 [ 2163.077364][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2163.080324][T26613] ? bd_set_size+0x3f/0xb0 [ 2163.080341][T26613] ? remove_files.isra.0+0x190/0x190 [ 2163.086064][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2163.090424][T26613] ? __down_timeout+0x2d0/0x2d0 [ 2163.090439][T26613] ? __kasan_check_write+0x14/0x20 [ 2163.090456][T26613] ? up_write+0x9d/0x280 [ 2163.115574][T26613] sysfs_create_group+0x20/0x30 [ 2163.120419][T26613] loop_set_fd+0xac1/0x1020 [ 2163.124920][T26613] lo_ioctl+0x1a3/0x1460 [ 2163.129161][T26613] ? trace_hardirqs_on+0x67/0x240 [ 2163.134198][T26613] ? loop_set_fd+0x1020/0x1020 [ 2163.138963][T26613] blkdev_ioctl+0xedb/0x1c1a [ 2163.143648][T26613] ? blkpg_ioctl+0xa90/0xa90 [ 2163.148241][T26613] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2163.154044][T26613] ? __kasan_check_read+0x11/0x20 09:10:24 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x8100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2163.159069][T26613] ? ___might_sleep+0x163/0x280 [ 2163.163918][T26613] block_ioctl+0xee/0x130 [ 2163.168243][T26613] ? blkdev_fallocate+0x410/0x410 [ 2163.173268][T26613] do_vfs_ioctl+0xdb6/0x13e0 [ 2163.177857][T26613] ? ioctl_preallocate+0x210/0x210 [ 2163.182976][T26613] ? selinux_file_mprotect+0x620/0x620 [ 2163.188433][T26613] ? __fget+0x384/0x560 [ 2163.192585][T26613] ? ksys_dup3+0x3e0/0x3e0 [ 2163.197002][T26613] ? do_sys_open+0x31d/0x5d0 [ 2163.201591][T26613] ? tomoyo_file_ioctl+0x23/0x30 [ 2163.206536][T26613] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2163.212772][T26613] ? security_file_ioctl+0x8d/0xc0 [ 2163.218175][T26613] ksys_ioctl+0xab/0xd0 [ 2163.224497][T26613] __x64_sys_ioctl+0x73/0xb0 [ 2163.229089][T26613] do_syscall_64+0xfd/0x6a0 [ 2163.233592][T26613] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2163.239474][T26613] RIP: 0033:0x4596e7 [ 2163.243364][T26613] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2163.262958][T26613] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2163.271371][T26613] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 2163.279342][T26613] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2163.287311][T26613] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2163.295275][T26613] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 09:10:24 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x86ddffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:25 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x8847000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2163.303243][T26613] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:25 executing program 5 (fault-call:0 fault-nth:22): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:25 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x8848000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:25 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x7000000, 0x0, 0x5}}}}}}}, 0x0) 09:10:25 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43050000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:25 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x3, 0x0) 09:10:25 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800e0000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:25 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x8864000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:25 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000000000800fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:25 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x8000000, 0x0, 0x5}}}}}}}, 0x0) 09:10:25 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x88a8ffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2163.764562][T26649] FAULT_INJECTION: forcing a failure. [ 2163.764562][T26649] name failslab, interval 1, probability 0, space 0, times 0 [ 2163.793792][T26649] CPU: 1 PID: 26649 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2163.801880][T26649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2163.811939][T26649] Call Trace: [ 2163.815238][T26649] dump_stack+0x172/0x1f0 [ 2163.819581][T26649] should_fail.cold+0xa/0x15 [ 2163.824181][T26649] ? lock_downgrade+0x920/0x920 [ 2163.829034][T26649] ? fault_create_debugfs_attr+0x180/0x180 [ 2163.834843][T26649] ? page_to_nid.part.0+0x20/0x20 [ 2163.839969][T26649] ? ___might_sleep+0x163/0x280 [ 2163.844816][T26649] __should_failslab+0x121/0x190 [ 2163.849754][T26649] should_failslab+0x9/0x14 [ 2163.854250][T26649] kmem_cache_alloc+0x2aa/0x710 [ 2163.859096][T26649] ? __schedule+0xfa5/0x1580 [ 2163.863679][T26649] ? __kasan_check_read+0x11/0x20 [ 2163.868724][T26649] __kernfs_new_node+0xf0/0x6c0 [ 2163.873573][T26649] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2163.879025][T26649] ? trace_hardirqs_on+0x67/0x240 [ 2163.884044][T26649] ? _raw_spin_unlock_irq+0x5e/0x90 [ 2163.889235][T26649] ? __schedule+0xfa5/0x1580 [ 2163.893823][T26649] ? __sched_text_start+0x8/0x8 [ 2163.898670][T26649] ? account_entity_enqueue+0x244/0x390 [ 2163.904212][T26649] kernfs_new_node+0x96/0x120 [ 2163.908885][T26649] kernfs_create_dir_ns+0x52/0x160 [ 2163.913999][T26649] internal_create_group+0x7f4/0xc30 [ 2163.919278][T26649] ? bd_set_size+0x3f/0xb0 [ 2163.923696][T26649] ? remove_files.isra.0+0x190/0x190 [ 2163.928972][T26649] ? __down_timeout+0x2d0/0x2d0 [ 2163.933818][T26649] ? __kasan_check_write+0x14/0x20 [ 2163.938926][T26649] ? up_write+0x9d/0x280 [ 2163.943166][T26649] sysfs_create_group+0x20/0x30 [ 2163.948010][T26649] loop_set_fd+0xac1/0x1020 [ 2163.952510][T26649] lo_ioctl+0x1a3/0x1460 [ 2163.956746][T26649] ? trace_hardirqs_on+0x67/0x240 [ 2163.961761][T26649] ? loop_set_fd+0x1020/0x1020 [ 2163.966526][T26649] blkdev_ioctl+0xedb/0x1c1a [ 2163.971116][T26649] ? blkpg_ioctl+0xa90/0xa90 [ 2163.975709][T26649] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2163.981511][T26649] ? __kasan_check_read+0x11/0x20 [ 2163.986539][T26649] ? ___might_sleep+0x163/0x280 [ 2163.991385][T26649] block_ioctl+0xee/0x130 [ 2163.995709][T26649] ? blkdev_fallocate+0x410/0x410 [ 2164.000731][T26649] do_vfs_ioctl+0xdb6/0x13e0 [ 2164.005321][T26649] ? ioctl_preallocate+0x210/0x210 09:10:25 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80350000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2164.010429][T26649] ? selinux_file_mprotect+0x620/0x620 [ 2164.015900][T26649] ? __fget+0x384/0x560 [ 2164.020055][T26649] ? ksys_dup3+0x3e0/0x3e0 [ 2164.024466][T26649] ? do_sys_open+0x31d/0x5d0 [ 2164.029054][T26649] ? tomoyo_file_ioctl+0x23/0x30 [ 2164.033989][T26649] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2164.040244][T26649] ? security_file_ioctl+0x8d/0xc0 [ 2164.045352][T26649] ksys_ioctl+0xab/0xd0 [ 2164.049507][T26649] __x64_sys_ioctl+0x73/0xb0 [ 2164.054110][T26649] do_syscall_64+0xfd/0x6a0 [ 2164.058615][T26649] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2164.064502][T26649] RIP: 0033:0x4596e7 [ 2164.068395][T26649] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2164.087990][T26649] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2164.096390][T26649] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 2164.104360][T26649] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 09:10:25 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x8060000, 0x0, 0x5}}}}}}}, 0x0) [ 2164.112325][T26649] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2164.120287][T26649] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2164.128252][T26649] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:26 executing program 5 (fault-call:0 fault-nth:23): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:26 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x88caffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:26 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0xd000000, 0x0, 0x5}}}}}}}, 0x0) 09:10:26 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2164.217231][T26664] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop4 [ 2164.231417][T26658] BTRFS error (device loop3): superblock checksum mismatch [ 2164.249988][T26658] BTRFS error (device loop3): open_ctree failed [ 2164.344800][T26674] FAULT_INJECTION: forcing a failure. [ 2164.344800][T26674] name failslab, interval 1, probability 0, space 0, times 0 [ 2164.366223][T26674] CPU: 1 PID: 26674 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2164.374303][T26674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2164.384351][T26674] Call Trace: [ 2164.387639][T26674] dump_stack+0x172/0x1f0 [ 2164.391972][T26674] should_fail.cold+0xa/0x15 [ 2164.396562][T26674] ? fault_create_debugfs_attr+0x180/0x180 [ 2164.402360][T26674] ? page_to_nid.part.0+0x20/0x20 [ 2164.407382][T26674] ? ___might_sleep+0x163/0x280 [ 2164.412231][T26674] __should_failslab+0x121/0x190 [ 2164.417166][T26674] should_failslab+0x9/0x14 [ 2164.421662][T26674] kmem_cache_alloc+0x2aa/0x710 [ 2164.426504][T26674] ? __mutex_lock+0x45d/0x13c0 [ 2164.431272][T26674] __kernfs_new_node+0xf0/0x6c0 [ 2164.436118][T26674] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2164.441569][T26674] ? wait_for_completion+0x440/0x440 [ 2164.446847][T26674] ? __kasan_check_write+0x14/0x20 [ 2164.451962][T26674] ? mutex_unlock+0xd/0x10 [ 2164.456374][T26674] ? kernfs_activate+0x192/0x1f0 [ 2164.461308][T26674] kernfs_new_node+0x96/0x120 [ 2164.465980][T26674] __kernfs_create_file+0x51/0x33b [ 2164.471089][T26674] sysfs_add_file_mode_ns+0x222/0x560 [ 2164.476463][T26674] internal_create_group+0x359/0xc30 [ 2164.481741][T26674] ? bd_set_size+0x3f/0xb0 [ 2164.486158][T26674] ? remove_files.isra.0+0x190/0x190 [ 2164.491438][T26674] ? __down_timeout+0x2d0/0x2d0 [ 2164.496285][T26674] ? __kasan_check_write+0x14/0x20 [ 2164.501391][T26674] ? up_write+0x9d/0x280 [ 2164.505630][T26674] sysfs_create_group+0x20/0x30 [ 2164.510476][T26674] loop_set_fd+0xac1/0x1020 [ 2164.514980][T26674] lo_ioctl+0x1a3/0x1460 [ 2164.519220][T26674] ? trace_hardirqs_on+0x67/0x240 [ 2164.524243][T26674] ? loop_set_fd+0x1020/0x1020 [ 2164.529002][T26674] blkdev_ioctl+0xedb/0x1c1a [ 2164.533588][T26674] ? blkpg_ioctl+0xa90/0xa90 [ 2164.538177][T26674] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2164.543976][T26674] ? __kasan_check_read+0x11/0x20 [ 2164.549003][T26674] ? ___might_sleep+0x163/0x280 [ 2164.553857][T26674] block_ioctl+0xee/0x130 [ 2164.558189][T26674] ? blkdev_fallocate+0x410/0x410 [ 2164.563212][T26674] do_vfs_ioctl+0xdb6/0x13e0 [ 2164.567797][T26674] ? ioctl_preallocate+0x210/0x210 [ 2164.572903][T26674] ? selinux_file_mprotect+0x620/0x620 [ 2164.578359][T26674] ? __fget+0x384/0x560 [ 2164.582512][T26674] ? ksys_dup3+0x3e0/0x3e0 [ 2164.586919][T26674] ? do_sys_open+0x31d/0x5d0 [ 2164.591515][T26674] ? tomoyo_file_ioctl+0x23/0x30 [ 2164.596452][T26674] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2164.602685][T26674] ? security_file_ioctl+0x8d/0xc0 [ 2164.607801][T26674] ksys_ioctl+0xab/0xd0 [ 2164.611954][T26674] __x64_sys_ioctl+0x73/0xb0 [ 2164.616577][T26674] do_syscall_64+0xfd/0x6a0 [ 2164.621076][T26674] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2164.626961][T26674] RIP: 0033:0x4596e7 [ 2164.630874][T26674] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2164.650471][T26674] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2164.658873][T26674] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 2164.666832][T26674] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2164.674801][T26674] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2164.682765][T26674] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2164.690727][T26674] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 2164.769049][T26678] BTRFS error (device loop3): superblock checksum mismatch [ 2164.830784][T26674] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop5 [ 2164.849145][T26664] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop4 09:10:26 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x4, 0x0) 09:10:26 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x8906000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:26 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x11000000, 0x0, 0x5}}}}}}}, 0x0) 09:10:26 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:26 executing program 5 (fault-call:0 fault-nth:24): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:26 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000000000900fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2165.029678][T26678] BTRFS error (device loop3): open_ctree failed 09:10:26 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x8dffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:26 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x28000000, 0x0, 0x5}}}}}}}, 0x0) [ 2165.116202][T26691] FAULT_INJECTION: forcing a failure. [ 2165.116202][T26691] name failslab, interval 1, probability 0, space 0, times 0 [ 2165.147400][T26691] CPU: 0 PID: 26691 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2165.155482][T26691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2165.165545][T26691] Call Trace: [ 2165.168855][T26691] dump_stack+0x172/0x1f0 [ 2165.173186][T26691] should_fail.cold+0xa/0x15 [ 2165.177783][T26691] ? fault_create_debugfs_attr+0x180/0x180 [ 2165.183597][T26691] ? page_to_nid.part.0+0x20/0x20 [ 2165.188623][T26691] ? ___might_sleep+0x163/0x280 [ 2165.193477][T26691] __should_failslab+0x121/0x190 [ 2165.198416][T26691] should_failslab+0x9/0x14 [ 2165.202917][T26691] kmem_cache_alloc+0x2aa/0x710 [ 2165.207764][T26691] ? __mutex_lock+0x45d/0x13c0 [ 2165.212528][T26691] __kernfs_new_node+0xf0/0x6c0 [ 2165.217398][T26691] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2165.230059][T26691] ? wait_for_completion+0x440/0x440 [ 2165.235342][T26691] ? __kasan_check_write+0x14/0x20 [ 2165.240448][T26691] ? mutex_unlock+0xd/0x10 [ 2165.244857][T26691] ? kernfs_activate+0x192/0x1f0 [ 2165.249788][T26691] kernfs_new_node+0x96/0x120 [ 2165.254465][T26691] __kernfs_create_file+0x51/0x33b [ 2165.259573][T26691] sysfs_add_file_mode_ns+0x222/0x560 [ 2165.264944][T26691] internal_create_group+0x359/0xc30 [ 2165.270223][T26691] ? bd_set_size+0x3f/0xb0 [ 2165.274640][T26691] ? remove_files.isra.0+0x190/0x190 [ 2165.279917][T26691] ? __down_timeout+0x2d0/0x2d0 [ 2165.284762][T26691] ? __kasan_check_write+0x14/0x20 [ 2165.289866][T26691] ? up_write+0x9d/0x280 [ 2165.294107][T26691] sysfs_create_group+0x20/0x30 [ 2165.298950][T26691] loop_set_fd+0xac1/0x1020 [ 2165.303453][T26691] lo_ioctl+0x1a3/0x1460 [ 2165.307692][T26691] ? trace_hardirqs_on+0x67/0x240 [ 2165.312711][T26691] ? loop_set_fd+0x1020/0x1020 [ 2165.317474][T26691] blkdev_ioctl+0xedb/0x1c1a [ 2165.322063][T26691] ? blkpg_ioctl+0xa90/0xa90 [ 2165.326654][T26691] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2165.332472][T26691] ? __kasan_check_read+0x11/0x20 [ 2165.337497][T26691] ? ___might_sleep+0x163/0x280 [ 2165.342350][T26691] block_ioctl+0xee/0x130 [ 2165.346671][T26691] ? blkdev_fallocate+0x410/0x410 [ 2165.351700][T26691] do_vfs_ioctl+0xdb6/0x13e0 [ 2165.356288][T26691] ? ioctl_preallocate+0x210/0x210 [ 2165.361394][T26691] ? selinux_file_mprotect+0x620/0x620 [ 2165.366847][T26691] ? __fget+0x384/0x560 [ 2165.371003][T26691] ? ksys_dup3+0x3e0/0x3e0 [ 2165.375414][T26691] ? do_sys_open+0x31d/0x5d0 [ 2165.380000][T26691] ? tomoyo_file_ioctl+0x23/0x30 [ 2165.384932][T26691] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2165.391167][T26691] ? security_file_ioctl+0x8d/0xc0 [ 2165.396280][T26691] ksys_ioctl+0xab/0xd0 [ 2165.400433][T26691] __x64_sys_ioctl+0x73/0xb0 [ 2165.405017][T26691] do_syscall_64+0xfd/0x6a0 [ 2165.409517][T26691] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2165.415398][T26691] RIP: 0033:0x4596e7 [ 2165.419293][T26691] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2165.438892][T26691] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2165.447395][T26691] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 2165.455362][T26691] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 09:10:26 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88470000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:26 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xb200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:27 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xdc05000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2165.463328][T26691] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2165.471289][T26691] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2165.479256][T26691] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:27 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xf5ffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:27 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x5, 0x0) 09:10:27 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88480000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:27 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x3f000000, 0x0, 0x5}}}}}}}, 0x0) 09:10:27 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xfe80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:27 executing program 5 (fault-call:0 fault-nth:25): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:27 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000000000a00fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:27 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x40000000, 0x0, 0x5}}}}}}}, 0x0) 09:10:27 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xfeffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:27 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88640000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:27 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xff00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2165.974716][T26718] FAULT_INJECTION: forcing a failure. [ 2165.974716][T26718] name failslab, interval 1, probability 0, space 0, times 0 [ 2166.010040][T26718] CPU: 1 PID: 26718 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2166.018286][T26718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2166.028340][T26718] Call Trace: [ 2166.031737][T26718] dump_stack+0x172/0x1f0 [ 2166.036076][T26718] should_fail.cold+0xa/0x15 [ 2166.040675][T26718] ? fault_create_debugfs_attr+0x180/0x180 [ 2166.046479][T26718] ? page_to_nid.part.0+0x20/0x20 [ 2166.051504][T26718] ? ___might_sleep+0x163/0x280 [ 2166.056354][T26718] __should_failslab+0x121/0x190 [ 2166.061289][T26718] should_failslab+0x9/0x14 [ 2166.065873][T26718] kmem_cache_alloc+0x2aa/0x710 [ 2166.070724][T26718] ? __mutex_lock+0x45d/0x13c0 [ 2166.075490][T26718] __kernfs_new_node+0xf0/0x6c0 [ 2166.080337][T26718] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2166.085790][T26718] ? wait_for_completion+0x440/0x440 [ 2166.091067][T26718] ? __kasan_check_write+0x14/0x20 [ 2166.096177][T26718] ? mutex_unlock+0xd/0x10 [ 2166.100588][T26718] ? kernfs_activate+0x192/0x1f0 [ 2166.105522][T26718] kernfs_new_node+0x96/0x120 [ 2166.110196][T26718] __kernfs_create_file+0x51/0x33b [ 2166.115305][T26718] sysfs_add_file_mode_ns+0x222/0x560 [ 2166.120679][T26718] internal_create_group+0x359/0xc30 [ 2166.125971][T26718] ? bd_set_size+0x3f/0xb0 [ 2166.130389][T26718] ? remove_files.isra.0+0x190/0x190 [ 2166.135672][T26718] ? __down_timeout+0x2d0/0x2d0 [ 2166.140521][T26718] ? __kasan_check_write+0x14/0x20 [ 2166.145625][T26718] ? up_write+0x9d/0x280 [ 2166.149862][T26718] sysfs_create_group+0x20/0x30 [ 2166.154716][T26718] loop_set_fd+0xac1/0x1020 [ 2166.159219][T26718] lo_ioctl+0x1a3/0x1460 [ 2166.163456][T26718] ? trace_hardirqs_on+0x67/0x240 [ 2166.168477][T26718] ? loop_set_fd+0x1020/0x1020 [ 2166.173241][T26718] blkdev_ioctl+0xedb/0x1c1a [ 2166.177831][T26718] ? blkpg_ioctl+0xa90/0xa90 [ 2166.182422][T26718] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2166.188223][T26718] ? __kasan_check_read+0x11/0x20 [ 2166.193971][T26718] ? ___might_sleep+0x163/0x280 [ 2166.198819][T26718] block_ioctl+0xee/0x130 [ 2166.203143][T26718] ? blkdev_fallocate+0x410/0x410 [ 2166.208164][T26718] do_vfs_ioctl+0xdb6/0x13e0 [ 2166.212748][T26718] ? ioctl_preallocate+0x210/0x210 [ 2166.217853][T26718] ? selinux_file_mprotect+0x620/0x620 [ 2166.223304][T26718] ? __fget+0x384/0x560 [ 2166.227456][T26718] ? ksys_dup3+0x3e0/0x3e0 [ 2166.231864][T26718] ? do_sys_open+0x31d/0x5d0 [ 2166.236450][T26718] ? tomoyo_file_ioctl+0x23/0x30 [ 2166.241393][T26718] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2166.247720][T26718] ? security_file_ioctl+0x8d/0xc0 [ 2166.252827][T26718] ksys_ioctl+0xab/0xd0 [ 2166.256978][T26718] __x64_sys_ioctl+0x73/0xb0 [ 2166.261562][T26718] do_syscall_64+0xfd/0x6a0 [ 2166.266068][T26718] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2166.271952][T26718] RIP: 0033:0x4596e7 [ 2166.275841][T26718] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2166.295434][T26718] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2166.303840][T26718] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 2166.311804][T26718] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 09:10:28 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2166.319766][T26718] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2166.327726][T26718] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2166.335695][T26718] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:28 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2166.524450][T26742] BTRFS error (device loop3): superblock checksum mismatch [ 2166.535376][T26726] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop4 [ 2166.600553][T26742] BTRFS error (device loop3): open_ctree failed [ 2166.676624][T26742] BTRFS error (device loop3): superblock checksum mismatch [ 2166.687494][T26742] BTRFS error (device loop3): open_ctree failed 09:10:28 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x6, 0x0) 09:10:28 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x43050000, 0x0, 0x5}}}}}}}, 0x0) 09:10:28 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:28 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:28 executing program 5 (fault-call:0 fault-nth:26): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:28 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000000000b00fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2166.787819][T26751] FAULT_INJECTION: forcing a failure. [ 2166.787819][T26751] name failslab, interval 1, probability 0, space 0, times 0 [ 2166.806913][T26751] CPU: 1 PID: 26751 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2166.814983][T26751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2166.825029][T26751] Call Trace: [ 2166.828331][T26751] dump_stack+0x172/0x1f0 [ 2166.832690][T26751] should_fail.cold+0xa/0x15 [ 2166.837295][T26751] ? fault_create_debugfs_attr+0x180/0x180 [ 2166.843101][T26751] ? page_to_nid.part.0+0x20/0x20 [ 2166.848129][T26751] ? ___might_sleep+0x163/0x280 [ 2166.852979][T26751] __should_failslab+0x121/0x190 [ 2166.857913][T26751] should_failslab+0x9/0x14 [ 2166.862413][T26751] kmem_cache_alloc+0x2aa/0x710 [ 2166.867257][T26751] ? __mutex_lock+0x45d/0x13c0 [ 2166.872021][T26751] __kernfs_new_node+0xf0/0x6c0 [ 2166.876870][T26751] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2166.882337][T26751] ? wait_for_completion+0x440/0x440 [ 2166.887614][T26751] ? __kasan_check_write+0x14/0x20 [ 2166.892724][T26751] ? mutex_unlock+0xd/0x10 [ 2166.897134][T26751] ? kernfs_activate+0x192/0x1f0 [ 2166.902067][T26751] kernfs_new_node+0x96/0x120 [ 2166.906739][T26751] __kernfs_create_file+0x51/0x33b [ 2166.911848][T26751] sysfs_add_file_mode_ns+0x222/0x560 [ 2166.917221][T26751] internal_create_group+0x359/0xc30 [ 2166.922501][T26751] ? bd_set_size+0x3f/0xb0 [ 2166.926916][T26751] ? remove_files.isra.0+0x190/0x190 [ 2166.932193][T26751] ? __down_timeout+0x2d0/0x2d0 [ 2166.937040][T26751] ? __kasan_check_write+0x14/0x20 [ 2166.942143][T26751] ? up_write+0x9d/0x280 [ 2166.946385][T26751] sysfs_create_group+0x20/0x30 [ 2166.951233][T26751] loop_set_fd+0xac1/0x1020 [ 2166.955734][T26751] lo_ioctl+0x1a3/0x1460 [ 2166.959973][T26751] ? trace_hardirqs_on+0x67/0x240 [ 2166.964993][T26751] ? loop_set_fd+0x1020/0x1020 [ 2166.969754][T26751] blkdev_ioctl+0xedb/0x1c1a [ 2166.974342][T26751] ? blkpg_ioctl+0xa90/0xa90 [ 2166.978929][T26751] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2166.984740][T26751] ? __kasan_check_read+0x11/0x20 [ 2166.989763][T26751] ? ___might_sleep+0x163/0x280 [ 2166.994611][T26751] block_ioctl+0xee/0x130 [ 2166.998939][T26751] ? blkdev_fallocate+0x410/0x410 [ 2167.003959][T26751] do_vfs_ioctl+0xdb6/0x13e0 [ 2167.008547][T26751] ? ioctl_preallocate+0x210/0x210 [ 2167.013657][T26751] ? selinux_file_mprotect+0x620/0x620 [ 2167.019108][T26751] ? __fget+0x384/0x560 [ 2167.023264][T26751] ? ksys_dup3+0x3e0/0x3e0 [ 2167.027675][T26751] ? do_sys_open+0x31d/0x5d0 [ 2167.032262][T26751] ? tomoyo_file_ioctl+0x23/0x30 [ 2167.037199][T26751] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2167.043431][T26751] ? security_file_ioctl+0x8d/0xc0 [ 2167.048538][T26751] ksys_ioctl+0xab/0xd0 [ 2167.052686][T26751] __x64_sys_ioctl+0x73/0xb0 [ 2167.057271][T26751] do_syscall_64+0xfd/0x6a0 [ 2167.061769][T26751] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2167.067649][T26751] RIP: 0033:0x4596e7 09:10:28 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:28 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2167.071543][T26751] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2167.091138][T26751] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2167.099542][T26751] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 2167.107506][T26751] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2167.115469][T26751] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2167.123431][T26751] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2167.131393][T26751] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:28 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x60000000, 0x0, 0x5}}}}}}}, 0x0) 09:10:28 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:28 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x800e0000, 0x0, 0x5}}}}}}}, 0x0) 09:10:28 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89060000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:29 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x7, 0x0) 09:10:29 executing program 5 (fault-call:0 fault-nth:27): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:29 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x80350000, 0x0, 0x5}}}}}}}, 0x0) 09:10:29 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:29 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:29 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000000001000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:29 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb2000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2167.483025][T26780] FAULT_INJECTION: forcing a failure. [ 2167.483025][T26780] name failslab, interval 1, probability 0, space 0, times 0 [ 2167.495805][T26780] CPU: 1 PID: 26780 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2167.503867][T26780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2167.513914][T26780] Call Trace: [ 2167.517216][T26780] dump_stack+0x172/0x1f0 [ 2167.521554][T26780] should_fail.cold+0xa/0x15 [ 2167.526145][T26780] ? fault_create_debugfs_attr+0x180/0x180 [ 2167.531951][T26780] ? page_to_nid.part.0+0x20/0x20 [ 2167.537067][T26780] ? ___might_sleep+0x163/0x280 [ 2167.541921][T26780] __should_failslab+0x121/0x190 [ 2167.546858][T26780] should_failslab+0x9/0x14 [ 2167.551358][T26780] kmem_cache_alloc+0x2aa/0x710 [ 2167.556205][T26780] ? __mutex_lock+0x45d/0x13c0 [ 2167.560987][T26780] __kernfs_new_node+0xf0/0x6c0 [ 2167.565835][T26780] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2167.571304][T26780] ? wait_for_completion+0x440/0x440 [ 2167.576591][T26780] ? __kasan_check_write+0x14/0x20 [ 2167.581702][T26780] ? mutex_unlock+0xd/0x10 [ 2167.586115][T26780] ? kernfs_activate+0x192/0x1f0 [ 2167.591047][T26780] kernfs_new_node+0x96/0x120 [ 2167.595716][T26780] __kernfs_create_file+0x51/0x33b [ 2167.600825][T26780] sysfs_add_file_mode_ns+0x222/0x560 [ 2167.606200][T26780] internal_create_group+0x359/0xc30 [ 2167.611478][T26780] ? bd_set_size+0x3f/0xb0 [ 2167.615894][T26780] ? remove_files.isra.0+0x190/0x190 [ 2167.621170][T26780] ? __down_timeout+0x2d0/0x2d0 [ 2167.626020][T26780] ? __kasan_check_write+0x14/0x20 [ 2167.631126][T26780] ? up_write+0x9d/0x280 [ 2167.635367][T26780] sysfs_create_group+0x20/0x30 [ 2167.640214][T26780] loop_set_fd+0xac1/0x1020 [ 2167.644714][T26780] lo_ioctl+0x1a3/0x1460 [ 2167.648953][T26780] ? trace_hardirqs_on+0x67/0x240 [ 2167.653971][T26780] ? loop_set_fd+0x1020/0x1020 [ 2167.658731][T26780] blkdev_ioctl+0xedb/0x1c1a [ 2167.663319][T26780] ? blkpg_ioctl+0xa90/0xa90 [ 2167.667907][T26780] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2167.673702][T26780] ? __kasan_check_read+0x11/0x20 [ 2167.678727][T26780] ? ___might_sleep+0x163/0x280 [ 2167.683577][T26780] block_ioctl+0xee/0x130 [ 2167.687906][T26780] ? blkdev_fallocate+0x410/0x410 [ 2167.692924][T26780] do_vfs_ioctl+0xdb6/0x13e0 [ 2167.697507][T26780] ? ioctl_preallocate+0x210/0x210 [ 2167.702615][T26780] ? selinux_file_mprotect+0x620/0x620 [ 2167.708062][T26780] ? __fget+0x384/0x560 [ 2167.712219][T26780] ? ksys_dup3+0x3e0/0x3e0 [ 2167.716628][T26780] ? do_sys_open+0x31d/0x5d0 [ 2167.721213][T26780] ? tomoyo_file_ioctl+0x23/0x30 [ 2167.726150][T26780] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2167.732385][T26780] ? security_file_ioctl+0x8d/0xc0 [ 2167.737492][T26780] ksys_ioctl+0xab/0xd0 [ 2167.741661][T26780] __x64_sys_ioctl+0x73/0xb0 [ 2167.746261][T26780] do_syscall_64+0xfd/0x6a0 [ 2167.750769][T26780] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2167.756652][T26780] RIP: 0033:0x4596e7 [ 2167.760545][T26780] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2167.780230][T26780] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2167.788632][T26780] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 2167.796600][T26780] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2167.804570][T26780] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2167.812534][T26780] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2167.820503][T26780] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:29 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2167.829011][ C1] net_ratelimit: 24 callbacks suppressed [ 2167.829022][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2167.840436][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:10:29 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x81000000, 0x0, 0x5}}}}}}}, 0x0) 09:10:29 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:29 executing program 5 (fault-call:0 fault-nth:28): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:29 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2167.972717][T26794] BTRFS error (device loop3): superblock checksum mismatch [ 2167.987929][T26789] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop4 [ 2168.062895][T26809] FAULT_INJECTION: forcing a failure. [ 2168.062895][T26809] name failslab, interval 1, probability 0, space 0, times 0 [ 2168.082636][T26809] CPU: 1 PID: 26809 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2168.090809][T26809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2168.100854][T26809] Call Trace: [ 2168.104149][T26809] dump_stack+0x172/0x1f0 [ 2168.108484][T26809] should_fail.cold+0xa/0x15 [ 2168.113074][T26809] ? fault_create_debugfs_attr+0x180/0x180 [ 2168.118879][T26809] ? page_to_nid.part.0+0x20/0x20 [ 2168.123898][T26809] ? ___might_sleep+0x163/0x280 [ 2168.128748][T26809] __should_failslab+0x121/0x190 [ 2168.133687][T26809] should_failslab+0x9/0x14 [ 2168.138183][T26809] kmem_cache_alloc+0x2aa/0x710 [ 2168.143027][T26809] ? __mutex_lock+0x45d/0x13c0 [ 2168.147810][T26809] __kernfs_new_node+0xf0/0x6c0 [ 2168.152657][T26809] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2168.158108][T26809] ? wait_for_completion+0x440/0x440 [ 2168.163386][T26809] ? __kasan_check_write+0x14/0x20 [ 2168.168492][T26809] ? mutex_unlock+0xd/0x10 [ 2168.172905][T26809] ? kernfs_activate+0x192/0x1f0 [ 2168.177834][T26809] kernfs_new_node+0x96/0x120 [ 2168.182510][T26809] __kernfs_create_file+0x51/0x33b [ 2168.187622][T26809] sysfs_add_file_mode_ns+0x222/0x560 [ 2168.193532][T26809] internal_create_group+0x359/0xc30 [ 2168.198826][T26809] ? bd_set_size+0x3f/0xb0 [ 2168.203242][T26809] ? remove_files.isra.0+0x190/0x190 [ 2168.208527][T26809] ? __down_timeout+0x2d0/0x2d0 [ 2168.213567][T26809] ? __kasan_check_write+0x14/0x20 [ 2168.218682][T26809] ? up_write+0x9d/0x280 [ 2168.223264][T26809] sysfs_create_group+0x20/0x30 [ 2168.228108][T26809] loop_set_fd+0xac1/0x1020 [ 2168.232605][T26809] lo_ioctl+0x1a3/0x1460 [ 2168.236841][T26809] ? trace_hardirqs_on+0x67/0x240 [ 2168.241863][T26809] ? loop_set_fd+0x1020/0x1020 [ 2168.246626][T26809] blkdev_ioctl+0xedb/0x1c1a [ 2168.251211][T26809] ? blkpg_ioctl+0xa90/0xa90 [ 2168.255801][T26809] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2168.261598][T26809] ? __kasan_check_read+0x11/0x20 [ 2168.266621][T26809] ? ___might_sleep+0x163/0x280 [ 2168.271471][T26809] block_ioctl+0xee/0x130 [ 2168.275795][T26809] ? blkdev_fallocate+0x410/0x410 [ 2168.280810][T26809] do_vfs_ioctl+0xdb6/0x13e0 [ 2168.285416][T26809] ? ioctl_preallocate+0x210/0x210 [ 2168.290528][T26809] ? selinux_file_mprotect+0x620/0x620 [ 2168.295976][T26809] ? __fget+0x384/0x560 [ 2168.300128][T26809] ? ksys_dup3+0x3e0/0x3e0 [ 2168.304544][T26809] ? do_sys_open+0x31d/0x5d0 [ 2168.309129][T26809] ? tomoyo_file_ioctl+0x23/0x30 [ 2168.314065][T26809] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2168.320299][T26809] ? security_file_ioctl+0x8d/0xc0 [ 2168.325404][T26809] ksys_ioctl+0xab/0xd0 [ 2168.329556][T26809] __x64_sys_ioctl+0x73/0xb0 [ 2168.334147][T26809] do_syscall_64+0xfd/0x6a0 [ 2168.338651][T26809] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2168.344541][T26809] RIP: 0033:0x4596e7 [ 2168.348434][T26809] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2168.368557][T26809] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2168.376958][T26809] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 2168.384918][T26809] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2168.392882][T26809] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2168.400848][T26809] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2168.408814][T26809] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 2168.417644][T26794] BTRFS error (device loop3): open_ctree failed [ 2168.541146][T26794] BTRFS error (device loop3): superblock checksum mismatch 09:10:30 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x8, 0x0) 09:10:30 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x86ddffff, 0x0, 0x5}}}}}}}, 0x0) 09:10:30 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:30 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000000001f00fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:30 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:30 executing program 5 (fault-call:0 fault-nth:29): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2168.619686][T26794] BTRFS error (device loop3): open_ctree failed 09:10:30 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x88470000, 0x0, 0x5}}}}}}}, 0x0) 09:10:30 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffa888]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2168.699992][T26820] FAULT_INJECTION: forcing a failure. [ 2168.699992][T26820] name failslab, interval 1, probability 0, space 0, times 0 [ 2168.721063][T26820] CPU: 1 PID: 26820 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2168.729139][T26820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2168.739189][T26820] Call Trace: [ 2168.742489][T26820] dump_stack+0x172/0x1f0 [ 2168.746818][T26820] should_fail.cold+0xa/0x15 [ 2168.751408][T26820] ? fault_create_debugfs_attr+0x180/0x180 [ 2168.757211][T26820] ? page_to_nid.part.0+0x20/0x20 [ 2168.762234][T26820] ? ___might_sleep+0x163/0x280 [ 2168.767086][T26820] __should_failslab+0x121/0x190 [ 2168.772023][T26820] should_failslab+0x9/0x14 [ 2168.776523][T26820] kmem_cache_alloc_trace+0x2d3/0x790 [ 2168.781900][T26820] kobject_uevent_env+0x387/0x101d [ 2168.787008][T26820] ? __kasan_check_write+0x14/0x20 [ 2168.792116][T26820] ? up_write+0x9d/0x280 [ 2168.796368][T26820] kobject_uevent+0x20/0x26 [ 2168.800869][T26820] loop_set_fd+0xb52/0x1020 [ 2168.805371][T26820] lo_ioctl+0x1a3/0x1460 [ 2168.809612][T26820] ? trace_hardirqs_on+0x67/0x240 [ 2168.814631][T26820] ? loop_set_fd+0x1020/0x1020 [ 2168.819393][T26820] blkdev_ioctl+0xedb/0x1c1a [ 2168.823979][T26820] ? blkpg_ioctl+0xa90/0xa90 [ 2168.828563][T26820] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2168.834445][T26820] ? __kasan_check_read+0x11/0x20 [ 2168.839482][T26820] ? ___might_sleep+0x163/0x280 [ 2168.844335][T26820] block_ioctl+0xee/0x130 [ 2168.848656][T26820] ? blkdev_fallocate+0x410/0x410 [ 2168.853684][T26820] do_vfs_ioctl+0xdb6/0x13e0 [ 2168.858270][T26820] ? ioctl_preallocate+0x210/0x210 [ 2168.863380][T26820] ? selinux_file_mprotect+0x620/0x620 [ 2168.868833][T26820] ? __fget+0x384/0x560 [ 2168.872989][T26820] ? ksys_dup3+0x3e0/0x3e0 [ 2168.877397][T26820] ? do_sys_open+0x31d/0x5d0 [ 2168.881980][T26820] ? tomoyo_file_ioctl+0x23/0x30 [ 2168.886915][T26820] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2168.893156][T26820] ? security_file_ioctl+0x8d/0xc0 [ 2168.898267][T26820] ksys_ioctl+0xab/0xd0 [ 2168.902423][T26820] __x64_sys_ioctl+0x73/0xb0 [ 2168.907016][T26820] do_syscall_64+0xfd/0x6a0 [ 2168.911545][T26820] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2168.917428][T26820] RIP: 0033:0x4596e7 [ 2168.921321][T26820] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2168.940917][T26820] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 09:10:30 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:30 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2168.949324][T26820] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 2168.957285][T26820] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2168.965249][T26820] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2168.973216][T26820] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2168.981179][T26820] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:30 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:30 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x88480000, 0x0, 0x5}}}}}}}, 0x0) [ 2169.157356][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2169.157383][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2169.163150][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2169.168899][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2169.174604][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2169.180256][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2169.185943][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:10:31 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x9, 0x0) 09:10:31 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:31 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffca88]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:31 executing program 5 (fault-call:0 fault-nth:30): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:31 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000000002000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:31 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x88640000, 0x0, 0x5}}}}}}}, 0x0) 09:10:31 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2169.502053][T26850] FAULT_INJECTION: forcing a failure. [ 2169.502053][T26850] name failslab, interval 1, probability 0, space 0, times 0 [ 2169.514735][T26850] CPU: 0 PID: 26850 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2169.522802][T26850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2169.532853][T26850] Call Trace: [ 2169.536145][T26850] dump_stack+0x172/0x1f0 [ 2169.540481][T26850] should_fail.cold+0xa/0x15 [ 2169.545089][T26850] ? fault_create_debugfs_attr+0x180/0x180 [ 2169.550904][T26850] ? stack_trace_save+0xac/0xe0 [ 2169.555765][T26850] __should_failslab+0x121/0x190 [ 2169.560710][T26850] should_failslab+0x9/0x14 [ 2169.565217][T26850] kmem_cache_alloc+0x47/0x710 [ 2169.569984][T26850] ? save_stack+0x5c/0x90 [ 2169.574312][T26850] ? save_stack+0x23/0x90 [ 2169.578640][T26850] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2169.584436][T26850] ? kasan_slab_alloc+0xf/0x20 [ 2169.589202][T26850] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 2169.595527][T26850] idr_get_free+0x48e/0x8c0 [ 2169.600035][T26850] idr_alloc_u32+0x19e/0x330 [ 2169.604620][T26850] ? __fprop_inc_percpu_max+0x230/0x230 [ 2169.610162][T26850] ? fault_create_debugfs_attr+0x180/0x180 [ 2169.615967][T26850] ? mark_held_locks+0xf0/0xf0 [ 2169.620723][T26850] ? page_to_nid.part.0+0x20/0x20 [ 2169.625743][T26850] idr_alloc_cyclic+0x132/0x270 [ 2169.630584][T26850] ? idr_alloc+0x150/0x150 [ 2169.635002][T26850] __kernfs_new_node+0x172/0x6c0 [ 2169.639934][T26850] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2169.645388][T26850] ? wait_for_completion+0x440/0x440 [ 2169.650667][T26850] ? __kasan_check_write+0x14/0x20 [ 2169.655779][T26850] ? mutex_unlock+0xd/0x10 [ 2169.660184][T26850] ? kernfs_activate+0x192/0x1f0 [ 2169.665115][T26850] kernfs_new_node+0x96/0x120 [ 2169.669789][T26850] __kernfs_create_file+0x51/0x33b [ 2169.674904][T26850] sysfs_add_file_mode_ns+0x222/0x560 [ 2169.680276][T26850] internal_create_group+0x359/0xc30 [ 2169.685555][T26850] ? bd_set_size+0x3f/0xb0 [ 2169.689971][T26850] ? remove_files.isra.0+0x190/0x190 [ 2169.695251][T26850] ? __down_timeout+0x2d0/0x2d0 [ 2169.700096][T26850] ? __kasan_check_write+0x14/0x20 [ 2169.705218][T26850] ? up_write+0x9d/0x280 [ 2169.709458][T26850] sysfs_create_group+0x20/0x30 [ 2169.714305][T26850] loop_set_fd+0xac1/0x1020 [ 2169.718809][T26850] lo_ioctl+0x1a3/0x1460 [ 2169.723049][T26850] ? trace_hardirqs_on+0x67/0x240 [ 2169.728069][T26850] ? loop_set_fd+0x1020/0x1020 [ 2169.732831][T26850] blkdev_ioctl+0xedb/0x1c1a [ 2169.737417][T26850] ? blkpg_ioctl+0xa90/0xa90 [ 2169.742099][T26850] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2169.747900][T26850] ? __kasan_check_read+0x11/0x20 [ 2169.752921][T26850] ? ___might_sleep+0x163/0x280 [ 2169.757765][T26850] block_ioctl+0xee/0x130 [ 2169.762086][T26850] ? blkdev_fallocate+0x410/0x410 [ 2169.767109][T26850] do_vfs_ioctl+0xdb6/0x13e0 [ 2169.771696][T26850] ? ioctl_preallocate+0x210/0x210 [ 2169.776803][T26850] ? selinux_file_mprotect+0x620/0x620 [ 2169.782252][T26850] ? __fget+0x384/0x560 [ 2169.786403][T26850] ? ksys_dup3+0x3e0/0x3e0 [ 2169.790816][T26850] ? do_sys_open+0x31d/0x5d0 [ 2169.795402][T26850] ? tomoyo_file_ioctl+0x23/0x30 [ 2169.800334][T26850] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2169.806569][T26850] ? security_file_ioctl+0x8d/0xc0 [ 2169.811785][T26850] ksys_ioctl+0xab/0xd0 [ 2169.815937][T26850] __x64_sys_ioctl+0x73/0xb0 [ 2169.820529][T26850] do_syscall_64+0xfd/0x6a0 [ 2169.825028][T26850] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2169.830913][T26850] RIP: 0033:0x4596e7 [ 2169.834804][T26850] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2169.854397][T26850] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2169.862800][T26850] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 2169.870761][T26850] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2169.878722][T26850] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2169.886693][T26850] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2169.894659][T26850] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:31 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:31 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x88a8ffff, 0x0, 0x5}}}}}}}, 0x0) 09:10:31 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffdd86]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2169.902806][ C0] protocol 88fb is buggy, dev hsr_slave_0 09:10:31 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x88caffff, 0x0, 0x5}}}}}}}, 0x0) 09:10:31 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2170.060270][T26858] BTRFS error (device loop3): superblock checksum mismatch [ 2170.070473][T26853] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop4 [ 2170.151398][T26858] BTRFS error (device loop3): open_ctree failed 09:10:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xa, 0x0) 09:10:32 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:32 executing program 5 (fault-call:0 fault-nth:31): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:32 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:32 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x89060000, 0x0, 0x5}}}}}}}, 0x0) 09:10:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000000102000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:32 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x8dffffff, 0x0, 0x5}}}}}}}, 0x0) 09:10:32 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8d]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2170.350666][T26882] FAULT_INJECTION: forcing a failure. [ 2170.350666][T26882] name failslab, interval 1, probability 0, space 0, times 0 [ 2170.377387][T26882] CPU: 0 PID: 26882 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2170.385716][T26882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2170.395768][T26882] Call Trace: [ 2170.399066][T26882] dump_stack+0x172/0x1f0 [ 2170.403414][T26882] should_fail.cold+0xa/0x15 [ 2170.408002][T26882] ? fault_create_debugfs_attr+0x180/0x180 [ 2170.413802][T26882] ? page_to_nid.part.0+0x20/0x20 [ 2170.418835][T26882] ? ___might_sleep+0x163/0x280 [ 2170.423684][T26882] __should_failslab+0x121/0x190 [ 2170.428621][T26882] should_failslab+0x9/0x14 [ 2170.433117][T26882] kmem_cache_alloc_node+0x268/0x740 [ 2170.438398][T26882] ? vprintk_default+0x28/0x30 [ 2170.443157][T26882] ? netlink_has_listeners+0x23b/0x3f0 [ 2170.448606][T26882] ? __kasan_check_read+0x11/0x20 [ 2170.453626][T26882] __alloc_skb+0xd5/0x5e0 [ 2170.457951][T26882] ? netdev_alloc_frag+0x1b0/0x1b0 [ 2170.463147][T26882] ? netlink_has_listeners+0x6e/0x3f0 [ 2170.468517][T26882] alloc_uevent_skb+0x83/0x1e2 [ 2170.473275][T26882] kobject_uevent_env+0xaa3/0x101d [ 2170.478388][T26882] kobject_uevent+0x20/0x26 [ 2170.482892][T26882] loop_set_fd+0xb52/0x1020 [ 2170.487389][T26882] lo_ioctl+0x1a3/0x1460 [ 2170.491623][T26882] ? trace_hardirqs_on+0x67/0x240 [ 2170.496642][T26882] ? loop_set_fd+0x1020/0x1020 [ 2170.501414][T26882] blkdev_ioctl+0xedb/0x1c1a [ 2170.506004][T26882] ? blkpg_ioctl+0xa90/0xa90 [ 2170.510607][T26882] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2170.516441][T26882] ? __kasan_check_read+0x11/0x20 [ 2170.521465][T26882] ? ___might_sleep+0x163/0x280 [ 2170.526313][T26882] block_ioctl+0xee/0x130 [ 2170.530636][T26882] ? blkdev_fallocate+0x410/0x410 [ 2170.535669][T26882] do_vfs_ioctl+0xdb6/0x13e0 [ 2170.540255][T26882] ? ioctl_preallocate+0x210/0x210 [ 2170.545362][T26882] ? selinux_file_mprotect+0x620/0x620 [ 2170.550817][T26882] ? __fget+0x384/0x560 [ 2170.554968][T26882] ? ksys_dup3+0x3e0/0x3e0 [ 2170.559383][T26882] ? do_sys_open+0x31d/0x5d0 [ 2170.563967][T26882] ? tomoyo_file_ioctl+0x23/0x30 [ 2170.568902][T26882] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2170.575134][T26882] ? security_file_ioctl+0x8d/0xc0 [ 2170.580238][T26882] ksys_ioctl+0xab/0xd0 [ 2170.584392][T26882] __x64_sys_ioctl+0x73/0xb0 [ 2170.588978][T26882] do_syscall_64+0xfd/0x6a0 [ 2170.593482][T26882] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2170.599374][T26882] RIP: 0033:0x4596e7 [ 2170.603262][T26882] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2170.622856][T26882] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2170.631262][T26882] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 2170.639230][T26882] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 09:10:32 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xb2, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2170.647193][T26882] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2170.655153][T26882] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2170.663113][T26882] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:32 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xf0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:32 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0xb2000000, 0x0, 0x5}}}}}}}, 0x0) 09:10:32 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:32 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xb, 0x0) 09:10:32 executing program 5 (fault-call:0 fault-nth:32): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:32 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:32 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0xf5ffffff, 0x0, 0x5}}}}}}}, 0x0) 09:10:32 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:32 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000000002300fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2170.978235][T26910] FAULT_INJECTION: forcing a failure. [ 2170.978235][T26910] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2170.991450][T26910] CPU: 0 PID: 26910 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2170.999511][T26910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2171.009561][T26910] Call Trace: [ 2171.012885][T26910] dump_stack+0x172/0x1f0 [ 2171.017214][T26910] should_fail.cold+0xa/0x15 [ 2171.021804][T26910] ? rwlock_bug.part.0+0x90/0x90 [ 2171.026741][T26910] ? fault_create_debugfs_attr+0x180/0x180 [ 2171.032551][T26910] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2171.038791][T26910] ? debug_smp_processor_id+0x3c/0x214 [ 2171.044253][T26910] should_fail_alloc_page+0x50/0x60 [ 2171.049533][T26910] __alloc_pages_nodemask+0x1a1/0x900 [ 2171.054975][T26910] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2171.061211][T26910] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2171.066920][T26910] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2171.072544][T26910] ? __kasan_check_read+0x11/0x20 [ 2171.077570][T26910] ? fault_create_debugfs_attr+0x180/0x180 [ 2171.083372][T26910] cache_grow_begin+0x90/0xd20 [ 2171.088133][T26910] ? kobject_uevent_env+0x387/0x101d [ 2171.093417][T26910] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2171.099658][T26910] kmem_cache_alloc_trace+0x6b3/0x790 [ 2171.105032][T26910] kobject_uevent_env+0x387/0x101d [ 2171.110137][T26910] ? __kasan_check_write+0x14/0x20 [ 2171.115245][T26910] ? up_write+0x9d/0x280 [ 2171.119482][T26910] kobject_uevent+0x20/0x26 [ 2171.123981][T26910] loop_set_fd+0xb52/0x1020 [ 2171.128481][T26910] lo_ioctl+0x1a3/0x1460 [ 2171.132721][T26910] ? trace_hardirqs_on+0x67/0x240 [ 2171.137747][T26910] ? loop_set_fd+0x1020/0x1020 [ 2171.142508][T26910] blkdev_ioctl+0xedb/0x1c1a [ 2171.147097][T26910] ? blkpg_ioctl+0xa90/0xa90 [ 2171.151683][T26910] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2171.157483][T26910] ? __kasan_check_read+0x11/0x20 [ 2171.162511][T26910] ? ___might_sleep+0x163/0x280 [ 2171.167360][T26910] block_ioctl+0xee/0x130 [ 2171.171683][T26910] ? blkdev_fallocate+0x410/0x410 [ 2171.176706][T26910] do_vfs_ioctl+0xdb6/0x13e0 [ 2171.181295][T26910] ? ioctl_preallocate+0x210/0x210 [ 2171.186402][T26910] ? selinux_file_mprotect+0x620/0x620 [ 2171.191854][T26910] ? __fget+0x384/0x560 [ 2171.196009][T26910] ? ksys_dup3+0x3e0/0x3e0 [ 2171.200424][T26910] ? do_sys_open+0x31d/0x5d0 [ 2171.205013][T26910] ? tomoyo_file_ioctl+0x23/0x30 [ 2171.209948][T26910] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2171.216186][T26910] ? security_file_ioctl+0x8d/0xc0 [ 2171.221379][T26910] ksys_ioctl+0xab/0xd0 [ 2171.225533][T26910] __x64_sys_ioctl+0x73/0xb0 [ 2171.230119][T26910] do_syscall_64+0xfd/0x6a0 [ 2171.234619][T26910] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2171.240500][T26910] RIP: 0033:0x4596e7 [ 2171.244392][T26910] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2171.263990][T26910] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 09:10:33 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0xff000000, 0x0, 0x5}}}}}}}, 0x0) 09:10:33 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffffffffff]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:33 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2171.272393][T26910] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 2171.280357][T26910] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2171.288389][T26910] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2171.296352][T26910] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2171.304313][T26910] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:33 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0xffffa888, 0x0, 0x5}}}}}}}, 0x0) 09:10:33 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x543, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:33 executing program 5 (fault-call:0 fault-nth:33): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2171.472282][T26917] BTRFS error (device loop3): superblock checksum mismatch [ 2171.489188][T26916] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop4 [ 2171.507550][T26933] FAULT_INJECTION: forcing a failure. [ 2171.507550][T26933] name failslab, interval 1, probability 0, space 0, times 0 [ 2171.524485][T26933] CPU: 1 PID: 26933 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2171.532573][T26933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2171.542625][T26933] Call Trace: [ 2171.545918][T26933] dump_stack+0x172/0x1f0 [ 2171.550238][T26933] should_fail.cold+0xa/0x15 [ 2171.554809][T26933] ? fault_create_debugfs_attr+0x180/0x180 [ 2171.560594][T26933] ? page_to_nid.part.0+0x20/0x20 [ 2171.565593][T26933] ? ___might_sleep+0x163/0x280 [ 2171.570418][T26933] __should_failslab+0x121/0x190 [ 2171.575331][T26933] should_failslab+0x9/0x14 [ 2171.579806][T26933] kmem_cache_alloc_node_trace+0x274/0x750 [ 2171.585583][T26933] ? kasan_unpoison_shadow+0x35/0x50 [ 2171.590861][T26933] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2171.596651][T26933] __kmalloc_node_track_caller+0x3d/0x70 [ 2171.602260][T26933] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2171.607618][T26933] __alloc_skb+0x10b/0x5e0 [ 2171.612007][T26933] ? netdev_alloc_frag+0x1b0/0x1b0 [ 2171.617093][T26933] ? netlink_has_listeners+0x6e/0x3f0 [ 2171.622454][T26933] alloc_uevent_skb+0x83/0x1e2 [ 2171.627195][T26933] kobject_uevent_env+0xaa3/0x101d [ 2171.632287][T26933] kobject_uevent+0x20/0x26 [ 2171.636764][T26933] loop_set_fd+0xb52/0x1020 [ 2171.641241][T26933] lo_ioctl+0x1a3/0x1460 [ 2171.645470][T26933] ? trace_hardirqs_on+0x67/0x240 [ 2171.650472][T26933] ? loop_set_fd+0x1020/0x1020 [ 2171.655215][T26933] blkdev_ioctl+0xedb/0x1c1a [ 2171.659778][T26933] ? blkpg_ioctl+0xa90/0xa90 [ 2171.664341][T26933] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2171.670120][T26933] ? __kasan_check_read+0x11/0x20 [ 2171.675142][T26933] ? ___might_sleep+0x163/0x280 [ 2171.679970][T26933] block_ioctl+0xee/0x130 [ 2171.684275][T26933] ? blkdev_fallocate+0x410/0x410 [ 2171.689275][T26933] do_vfs_ioctl+0xdb6/0x13e0 [ 2171.693840][T26933] ? ioctl_preallocate+0x210/0x210 [ 2171.698924][T26933] ? selinux_file_mprotect+0x620/0x620 [ 2171.704357][T26933] ? __fget+0x384/0x560 [ 2171.708486][T26933] ? ksys_dup3+0x3e0/0x3e0 [ 2171.712876][T26933] ? do_sys_open+0x31d/0x5d0 [ 2171.717443][T26933] ? tomoyo_file_ioctl+0x23/0x30 [ 2171.722375][T26933] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2171.728605][T26933] ? security_file_ioctl+0x8d/0xc0 [ 2171.733692][T26933] ksys_ioctl+0xab/0xd0 [ 2171.737826][T26933] __x64_sys_ioctl+0x73/0xb0 [ 2171.742395][T26933] do_syscall_64+0xfd/0x6a0 [ 2171.746872][T26933] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2171.752736][T26933] RIP: 0033:0x4596e7 [ 2171.756608][T26933] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2171.776182][T26933] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2171.784570][T26933] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 2171.792515][T26933] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2171.800472][T26933] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2171.808417][T26933] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2171.816363][T26933] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 2171.917647][T26917] BTRFS error (device loop3): open_ctree failed 09:10:33 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x10, 0x0) 09:10:33 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:33 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x5dc, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:33 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0xffffca88, 0x0, 0x5}}}}}}}, 0x0) 09:10:33 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000000003f00fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:33 executing program 5 (fault-call:0 fault-nth:34): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:33 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0xffffdd86, 0x0, 0x5}}}}}}}, 0x0) 09:10:33 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:33 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x600, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2172.194297][T26952] FAULT_INJECTION: forcing a failure. [ 2172.194297][T26952] name failslab, interval 1, probability 0, space 0, times 0 [ 2172.215611][T26952] CPU: 0 PID: 26952 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2172.223697][T26952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2172.233739][T26952] Call Trace: [ 2172.237030][T26952] dump_stack+0x172/0x1f0 09:10:33 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0xfffff000, 0x0, 0x5}}}}}}}, 0x0) 09:10:34 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2172.241355][T26952] should_fail.cold+0xa/0x15 [ 2172.245943][T26952] ? fault_create_debugfs_attr+0x180/0x180 [ 2172.251749][T26952] ? page_to_nid.part.0+0x20/0x20 [ 2172.256772][T26952] ? ___might_sleep+0x163/0x280 [ 2172.261631][T26952] __should_failslab+0x121/0x190 [ 2172.266567][T26952] should_failslab+0x9/0x14 [ 2172.271067][T26952] kmem_cache_alloc+0x2aa/0x710 [ 2172.275908][T26952] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 2172.281704][T26952] ? netlink_broadcast_filtered+0x78/0xb80 [ 2172.287496][T26952] ? __kmalloc_node_track_caller+0x4e/0x70 [ 2172.293289][T26952] skb_clone+0x154/0x3d0 [ 2172.297518][T26952] netlink_broadcast_filtered+0x8d7/0xb80 [ 2172.303212][T26952] netlink_broadcast+0x3a/0x50 [ 2172.308773][T26952] kobject_uevent_env+0xad4/0x101d [ 2172.313863][T26952] kobject_uevent+0x20/0x26 [ 2172.318342][T26952] loop_set_fd+0xb52/0x1020 [ 2172.322828][T26952] lo_ioctl+0x1a3/0x1460 [ 2172.327043][T26952] ? trace_hardirqs_on+0x67/0x240 [ 2172.332039][T26952] ? loop_set_fd+0x1020/0x1020 [ 2172.336779][T26952] blkdev_ioctl+0xedb/0x1c1a [ 2172.341352][T26952] ? blkpg_ioctl+0xa90/0xa90 [ 2172.345921][T26952] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2172.351700][T26952] ? __kasan_check_read+0x11/0x20 [ 2172.356702][T26952] ? ___might_sleep+0x163/0x280 [ 2172.361980][T26952] block_ioctl+0xee/0x130 [ 2172.366281][T26952] ? blkdev_fallocate+0x410/0x410 [ 2172.371279][T26952] do_vfs_ioctl+0xdb6/0x13e0 [ 2172.375843][T26952] ? ioctl_preallocate+0x210/0x210 [ 2172.380927][T26952] ? selinux_file_mprotect+0x620/0x620 [ 2172.386357][T26952] ? __fget+0x384/0x560 [ 2172.390490][T26952] ? ksys_dup3+0x3e0/0x3e0 [ 2172.394879][T26952] ? do_sys_open+0x31d/0x5d0 [ 2172.399444][T26952] ? tomoyo_file_ioctl+0x23/0x30 [ 2172.404357][T26952] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2172.410569][T26952] ? security_file_ioctl+0x8d/0xc0 [ 2172.415657][T26952] ksys_ioctl+0xab/0xd0 [ 2172.419789][T26952] __x64_sys_ioctl+0x73/0xb0 [ 2172.424356][T26952] do_syscall_64+0xfd/0x6a0 [ 2172.428833][T26952] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2172.434701][T26952] RIP: 0033:0x4596e7 [ 2172.438776][T26952] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2172.458351][T26952] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2172.466733][T26952] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 2172.474676][T26952] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2172.482617][T26952] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 09:10:34 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x608, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2172.490566][T26952] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2172.498511][T26952] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x23, 0x0) 09:10:34 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x689, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000000004000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:34 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0xffffff8d, 0x0, 0x5}}}}}}}, 0x0) 09:10:34 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:34 executing program 5 (fault-call:0 fault-nth:35): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:34 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:34 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:34 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0xfffffff5, 0x0, 0x5}}}}}}}, 0x0) 09:10:34 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x300, 0x0) [ 2172.911462][T26983] FAULT_INJECTION: forcing a failure. [ 2172.911462][T26983] name failslab, interval 1, probability 0, space 0, times 0 [ 2172.927446][T26983] CPU: 0 PID: 26983 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2172.935520][T26983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2172.945604][T26983] Call Trace: [ 2172.948900][T26983] dump_stack+0x172/0x1f0 [ 2172.953234][T26983] should_fail.cold+0xa/0x15 09:10:34 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x806, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:34 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0xf0ffffffffffff, 0x0, 0x5}}}}}}}, 0x0) 09:10:34 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x900, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2172.957829][T26983] ? ___might_sleep+0x163/0x280 [ 2172.962684][T26983] ? fault_create_debugfs_attr+0x180/0x180 [ 2172.968485][T26983] ? page_to_nid.part.0+0x20/0x20 [ 2172.973504][T26983] ? ___might_sleep+0x163/0x280 [ 2172.978360][T26983] __should_failslab+0x121/0x190 [ 2172.983302][T26983] should_failslab+0x9/0x14 [ 2172.987803][T26983] kmem_cache_alloc+0x2aa/0x710 [ 2172.992645][T26983] ? __fget+0x384/0x560 [ 2172.996805][T26983] getname_flags+0xd6/0x5b0 [ 2173.001301][T26983] do_mkdirat+0xa0/0x2a0 [ 2173.005541][T26983] ? __ia32_sys_mknod+0xb0/0xb0 09:10:34 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2173.010392][T26983] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2173.016455][T26983] ? trace_hardirqs_off_caller+0x65/0x230 [ 2173.022174][T26983] __x64_sys_mkdir+0x5c/0x80 [ 2173.026766][T26983] do_syscall_64+0xfd/0x6a0 [ 2173.031271][T26983] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2173.037152][T26983] RIP: 0033:0x458c97 [ 2173.041049][T26983] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2173.060641][T26983] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2173.060656][T26983] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 2173.060669][T26983] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2173.084972][T26983] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2173.084981][T26983] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2173.084987][T26983] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:34 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d010000000000000000000000000f4200fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:34 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:34 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xd00, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:34 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x100000000000000, 0x0, 0x5}}}}}}}, 0x0) 09:10:34 executing program 5 (fault-call:0 fault-nth:36): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:35 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:35 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xe80, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2173.317348][ C0] net_ratelimit: 15 callbacks suppressed [ 2173.317356][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2173.323065][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2173.334516][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2173.340271][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2173.362647][T27013] FAULT_INJECTION: forcing a failure. [ 2173.362647][T27013] name failslab, interval 1, probability 0, space 0, times 0 [ 2173.397376][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2173.403160][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2173.408996][ C1] protocol 88fb is buggy, dev hsr_slave_0 09:10:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x500, 0x0) 09:10:35 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x200000000000000, 0x0, 0x5}}}}}}}, 0x0) [ 2173.412560][T27013] CPU: 0 PID: 27013 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2173.414741][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2173.422748][T27013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2173.422754][T27013] Call Trace: [ 2173.422777][T27013] dump_stack+0x172/0x1f0 [ 2173.422799][T27013] should_fail.cold+0xa/0x15 [ 2173.450686][T27013] ? fault_create_debugfs_attr+0x180/0x180 [ 2173.456486][T27013] ? page_to_nid.part.0+0x20/0x20 [ 2173.461505][T27013] ? ___might_sleep+0x163/0x280 [ 2173.466355][T27013] __should_failslab+0x121/0x190 [ 2173.471297][T27013] should_failslab+0x9/0x14 [ 2173.475796][T27013] kmem_cache_alloc+0x2aa/0x710 [ 2173.480641][T27013] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 2173.486443][T27013] ? netlink_broadcast_filtered+0x78/0xb80 [ 2173.492244][T27013] ? __kmalloc_node_track_caller+0x4e/0x70 [ 2173.498047][T27013] skb_clone+0x154/0x3d0 [ 2173.502289][T27013] netlink_broadcast_filtered+0x8d7/0xb80 [ 2173.508013][T27013] netlink_broadcast+0x3a/0x50 [ 2173.512776][T27013] kobject_uevent_env+0xad4/0x101d [ 2173.517888][T27013] kobject_uevent+0x20/0x26 [ 2173.522387][T27013] loop_set_fd+0xb52/0x1020 [ 2173.526886][T27013] lo_ioctl+0x1a3/0x1460 [ 2173.531124][T27013] ? trace_hardirqs_on+0x67/0x240 [ 2173.536146][T27013] ? loop_set_fd+0x1020/0x1020 [ 2173.540907][T27013] blkdev_ioctl+0xedb/0x1c1a [ 2173.545495][T27013] ? blkpg_ioctl+0xa90/0xa90 [ 2173.550085][T27013] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2173.555887][T27013] ? __kasan_check_read+0x11/0x20 [ 2173.560912][T27013] ? ___might_sleep+0x163/0x280 [ 2173.565761][T27013] block_ioctl+0xee/0x130 [ 2173.570085][T27013] ? blkdev_fallocate+0x410/0x410 [ 2173.575103][T27013] do_vfs_ioctl+0xdb6/0x13e0 [ 2173.579690][T27013] ? ioctl_preallocate+0x210/0x210 [ 2173.584797][T27013] ? selinux_file_mprotect+0x620/0x620 [ 2173.590248][T27013] ? __fget+0x384/0x560 [ 2173.594403][T27013] ? ksys_dup3+0x3e0/0x3e0 [ 2173.598812][T27013] ? do_sys_open+0x31d/0x5d0 [ 2173.603395][T27013] ? tomoyo_file_ioctl+0x23/0x30 [ 2173.608327][T27013] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2173.614567][T27013] ? security_file_ioctl+0x8d/0xc0 [ 2173.619670][T27013] ksys_ioctl+0xab/0xd0 [ 2173.623823][T27013] __x64_sys_ioctl+0x73/0xb0 [ 2173.628406][T27013] do_syscall_64+0xfd/0x6a0 [ 2173.632911][T27013] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2173.638794][T27013] RIP: 0033:0x4596e7 [ 2173.642687][T27013] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 09:10:35 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:35 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x1100, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2173.662281][T27013] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2173.671032][T27013] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004596e7 [ 2173.678998][T27013] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2173.686962][T27013] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2173.694923][T27013] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2173.702887][T27013] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:35 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x2800, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:35 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000000004800fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:35 executing program 5 (fault-call:0 fault-nth:37): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:35 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x300000000000000, 0x0, 0x5}}}}}}}, 0x0) 09:10:35 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x806000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:35 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3580, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:35 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x600, 0x0) [ 2174.037365][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2174.037370][ C1] protocol 88fb is buggy, dev hsr_slave_0 09:10:35 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x500000000000000, 0x0, 0x5}}}}}}}, 0x0) 09:10:35 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3c00, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2174.104806][T27040] FAULT_INJECTION: forcing a failure. [ 2174.104806][T27040] name failslab, interval 1, probability 0, space 0, times 0 [ 2174.127067][T27040] CPU: 1 PID: 27040 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2174.135145][T27040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2174.145195][T27040] Call Trace: [ 2174.148499][T27040] dump_stack+0x172/0x1f0 09:10:35 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2174.152836][T27040] should_fail.cold+0xa/0x15 [ 2174.157430][T27040] ? ___might_sleep+0x163/0x280 [ 2174.162288][T27040] ? fault_create_debugfs_attr+0x180/0x180 [ 2174.168098][T27040] ? page_to_nid.part.0+0x20/0x20 [ 2174.173126][T27040] ? ___might_sleep+0x163/0x280 [ 2174.177989][T27040] __should_failslab+0x121/0x190 [ 2174.182934][T27040] should_failslab+0x9/0x14 [ 2174.187440][T27040] kmem_cache_alloc+0x2aa/0x710 [ 2174.193080][T27040] ? __fget+0x384/0x560 [ 2174.197242][T27040] getname_flags+0xd6/0x5b0 09:10:35 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3f00, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2174.201745][T27040] do_mkdirat+0xa0/0x2a0 [ 2174.205997][T27040] ? __ia32_sys_mknod+0xb0/0xb0 [ 2174.210852][T27040] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2174.216920][T27040] ? trace_hardirqs_off_caller+0x65/0x230 [ 2174.222653][T27040] __x64_sys_mkdir+0x5c/0x80 [ 2174.227247][T27040] do_syscall_64+0xfd/0x6a0 [ 2174.231751][T27040] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2174.237643][T27040] RIP: 0033:0x458c97 09:10:36 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2174.241538][T27040] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2174.261218][T27040] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2174.261234][T27040] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 2174.261242][T27040] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2174.261248][T27040] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2174.261261][T27040] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2174.301476][T27040] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:36 executing program 5 (fault-call:0 fault-nth:38): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2174.444103][T27065] FAULT_INJECTION: forcing a failure. [ 2174.444103][T27065] name failslab, interval 1, probability 0, space 0, times 0 [ 2174.457466][T27065] CPU: 1 PID: 27065 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2174.465531][T27065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2174.475572][T27065] Call Trace: [ 2174.475594][T27065] dump_stack+0x172/0x1f0 [ 2174.475614][T27065] should_fail.cold+0xa/0x15 [ 2174.475630][T27065] ? fault_create_debugfs_attr+0x180/0x180 [ 2174.475642][T27065] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2174.475657][T27065] ? ___might_sleep+0x163/0x280 [ 2174.475675][T27065] __should_failslab+0x121/0x190 [ 2174.475688][T27065] should_failslab+0x9/0x14 [ 2174.475704][T27065] kmem_cache_alloc+0x2aa/0x710 [ 2174.483285][T27065] ? __put_user_ns+0x70/0x70 [ 2174.493619][T27065] ? memcg_kmem_put_cache+0x3e/0x50 [ 2174.504340][T27065] security_inode_alloc+0x39/0x160 [ 2174.513720][T27065] inode_init_always+0x56e/0xb50 [ 2174.538288][T27065] alloc_inode+0x89/0x1e0 [ 2174.542612][T27065] new_inode_pseudo+0x19/0xf0 [ 2174.547277][T27065] new_inode+0x1f/0x40 [ 2174.551340][T27065] __ext4_new_inode+0x3d5/0x4e50 [ 2174.556285][T27065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2174.562518][T27065] ? __dquot_initialize+0x525/0xd80 [ 2174.567709][T27065] ? ext4_free_inode+0x1490/0x1490 [ 2174.572816][T27065] ? dqget+0x10d0/0x10d0 [ 2174.577055][T27065] ? security_transition_sid+0xf1/0x190 [ 2174.582599][T27065] ? selinux_determine_inode_label+0x1b1/0x390 [ 2174.588753][T27065] ext4_mkdir+0x3df/0xe20 [ 2174.593082][T27065] ? ext4_init_dot_dotdot+0x520/0x520 [ 2174.598458][T27065] ? selinux_inode_mkdir+0x23/0x30 [ 2174.603567][T27065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2174.609806][T27065] ? security_inode_mkdir+0xe4/0x120 [ 2174.615090][T27065] vfs_mkdir+0x42e/0x670 [ 2174.619325][T27065] do_mkdirat+0x234/0x2a0 [ 2174.623652][T27065] ? __ia32_sys_mknod+0xb0/0xb0 [ 2174.628503][T27065] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2174.634562][T27065] ? trace_hardirqs_off_caller+0x65/0x230 [ 2174.640276][T27065] __x64_sys_mkdir+0x5c/0x80 [ 2174.644862][T27065] do_syscall_64+0xfd/0x6a0 [ 2174.649365][T27065] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2174.655243][T27065] RIP: 0033:0x458c97 [ 2174.659133][T27065] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2174.678731][T27065] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2174.687135][T27065] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 2174.695097][T27065] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2174.703063][T27065] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2174.711025][T27065] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2174.718987][T27065] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:36 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000000004c00fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:36 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x4305, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:36 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x600000000000000, 0x0, 0x5}}}}}}}, 0x0) 09:10:36 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:36 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x700, 0x0) 09:10:36 executing program 5 (fault-call:0 fault-nth:39): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:36 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x700000000000000, 0x0, 0x5}}}}}}}, 0x0) 09:10:36 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x4400, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:36 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2174.995027][T27075] FAULT_INJECTION: forcing a failure. [ 2174.995027][T27075] name failslab, interval 1, probability 0, space 0, times 0 [ 2175.054330][T27075] CPU: 0 PID: 27075 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2175.062437][T27075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2175.072485][T27075] Call Trace: [ 2175.075780][T27075] dump_stack+0x172/0x1f0 [ 2175.080111][T27075] should_fail.cold+0xa/0x15 [ 2175.084794][T27075] ? fault_create_debugfs_attr+0x180/0x180 [ 2175.090715][T27075] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2175.096518][T27075] ? ___might_sleep+0x163/0x280 [ 2175.101372][T27075] __should_failslab+0x121/0x190 [ 2175.106308][T27075] should_failslab+0x9/0x14 [ 2175.110806][T27075] kmem_cache_alloc+0x2aa/0x710 [ 2175.115651][T27075] ? __put_user_ns+0x70/0x70 [ 2175.120235][T27075] ? memcg_kmem_put_cache+0x3e/0x50 [ 2175.125448][T27075] security_inode_alloc+0x39/0x160 [ 2175.130555][T27075] inode_init_always+0x56e/0xb50 [ 2175.135492][T27075] alloc_inode+0x89/0x1e0 [ 2175.139819][T27075] new_inode_pseudo+0x19/0xf0 [ 2175.144489][T27075] new_inode+0x1f/0x40 [ 2175.148553][T27075] __ext4_new_inode+0x3d5/0x4e50 [ 2175.153492][T27075] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2175.159730][T27075] ? __dquot_initialize+0x525/0xd80 [ 2175.164926][T27075] ? ext4_free_inode+0x1490/0x1490 [ 2175.170030][T27075] ? dqget+0x10d0/0x10d0 [ 2175.174269][T27075] ? security_transition_sid+0xf1/0x190 [ 2175.179810][T27075] ? selinux_determine_inode_label+0x1b1/0x390 [ 2175.185961][T27075] ext4_mkdir+0x3df/0xe20 [ 2175.190297][T27075] ? ext4_init_dot_dotdot+0x520/0x520 [ 2175.195664][T27075] ? selinux_inode_mkdir+0x23/0x30 [ 2175.200773][T27075] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2175.207007][T27075] ? security_inode_mkdir+0xe4/0x120 [ 2175.212294][T27075] vfs_mkdir+0x42e/0x670 [ 2175.216533][T27075] do_mkdirat+0x234/0x2a0 [ 2175.220857][T27075] ? __ia32_sys_mknod+0xb0/0xb0 [ 2175.225706][T27075] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2175.231763][T27075] ? trace_hardirqs_off_caller+0x65/0x230 [ 2175.237495][T27075] __x64_sys_mkdir+0x5c/0x80 [ 2175.242091][T27075] do_syscall_64+0xfd/0x6a0 [ 2175.246589][T27075] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2175.252474][T27075] RIP: 0033:0x458c97 [ 2175.256369][T27075] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2175.275968][T27075] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2175.284376][T27075] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 2175.292343][T27075] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2175.300308][T27075] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2175.308274][T27075] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2175.316235][T27075] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:37 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x4788, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:37 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x4888, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:37 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x800000000000000, 0x0, 0x5}}}}}}}, 0x0) 09:10:37 executing program 5 (fault-call:0 fault-nth:40): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:37 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2800000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:37 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x806000000000000, 0x0, 0x5}}}}}}}, 0x0) 09:10:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000000006800fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x900, 0x0) 09:10:37 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x6488, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2175.665356][T27104] FAULT_INJECTION: forcing a failure. [ 2175.665356][T27104] name failslab, interval 1, probability 0, space 0, times 0 [ 2175.690015][T27104] CPU: 0 PID: 27104 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2175.698084][T27104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2175.708130][T27104] Call Trace: [ 2175.711421][T27104] dump_stack+0x172/0x1f0 [ 2175.715754][T27104] should_fail.cold+0xa/0x15 [ 2175.720358][T27104] ? fault_create_debugfs_attr+0x180/0x180 [ 2175.726173][T27104] ? ___might_sleep+0x163/0x280 [ 2175.731049][T27104] __should_failslab+0x121/0x190 [ 2175.735996][T27104] should_failslab+0x9/0x14 [ 2175.740492][T27104] __kmalloc+0x2e0/0x770 [ 2175.744730][T27104] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2175.750963][T27104] ? d_absolute_path+0x11b/0x170 [ 2175.755896][T27104] ? __d_path+0x140/0x140 [ 2175.760219][T27104] ? tomoyo_encode2.part.0+0xf5/0x400 09:10:37 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c00000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:37 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0xd00000000000000, 0x0, 0x5}}}}}}}, 0x0) 09:10:37 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x800e, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2175.765587][T27104] tomoyo_encode2.part.0+0xf5/0x400 [ 2175.770783][T27104] tomoyo_encode+0x2b/0x50 [ 2175.775192][T27104] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 2175.780847][T27104] tomoyo_path_number_perm+0x1dd/0x520 [ 2175.786305][T27104] ? tomoyo_path_number_perm+0x193/0x520 [ 2175.791943][T27104] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 2175.797755][T27104] ? __kasan_check_write+0x14/0x20 [ 2175.802871][T27104] ? quarantine_put+0x11c/0x1c0 [ 2175.807722][T27104] ? trace_hardirqs_on+0x67/0x240 [ 2175.812744][T27104] ? putname+0xef/0x130 [ 2175.816894][T27104] ? kmem_cache_free+0x1a7/0x320 [ 2175.821826][T27104] tomoyo_path_mkdir+0xaa/0xf0 [ 2175.826581][T27104] ? tomoyo_file_ioctl+0x30/0x30 [ 2175.831516][T27104] ? kern_path_mountpoint+0x40/0x40 [ 2175.836709][T27104] ? strncpy_from_user+0x2b4/0x400 [ 2175.841816][T27104] security_path_mkdir+0x113/0x170 [ 2175.846919][T27104] do_mkdirat+0x160/0x2a0 [ 2175.851244][T27104] ? __ia32_sys_mknod+0xb0/0xb0 [ 2175.856098][T27104] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe 09:10:37 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8035, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2175.862160][T27104] ? trace_hardirqs_off_caller+0x65/0x230 [ 2175.867873][T27104] __x64_sys_mkdir+0x5c/0x80 [ 2175.872464][T27104] do_syscall_64+0xfd/0x6a0 [ 2175.876980][T27104] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2175.882890][T27104] RIP: 0033:0x458c97 [ 2175.886786][T27104] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2175.906384][T27104] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 09:10:37 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x80fe, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2175.914799][T27104] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 2175.922770][T27104] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2175.930735][T27104] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2175.938708][T27104] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2175.946679][T27104] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:37 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8100, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2175.970002][T27104] ERROR: Out of memory at tomoyo_realpath_from_path. 09:10:37 executing program 5 (fault-call:0 fault-nth:41): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:37 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x1100000000000000, 0x0, 0x5}}}}}}}, 0x0) 09:10:37 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:37 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000000006c00fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:37 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8847, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:37 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xa00, 0x0) [ 2176.246468][T27134] FAULT_INJECTION: forcing a failure. [ 2176.246468][T27134] name failslab, interval 1, probability 0, space 0, times 0 [ 2176.259363][T27134] CPU: 0 PID: 27134 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2176.267418][T27134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2176.267424][T27134] Call Trace: [ 2176.267447][T27134] dump_stack+0x172/0x1f0 [ 2176.267470][T27134] should_fail.cold+0xa/0x15 [ 2176.289643][T27134] ? __kasan_check_read+0x11/0x20 [ 2176.289663][T27134] ? fault_create_debugfs_attr+0x180/0x180 [ 2176.300449][T27134] ? __es_tree_search.isra.0+0x1bf/0x230 [ 2176.306161][T27134] ? save_stack+0x5c/0x90 [ 2176.310476][T27134] __should_failslab+0x121/0x190 [ 2176.315393][T27134] should_failslab+0x9/0x14 [ 2176.319875][T27134] kmem_cache_alloc+0x47/0x710 [ 2176.324618][T27134] ? __es_shrink+0xad0/0xad0 [ 2176.329185][T27134] ? do_raw_write_lock+0x124/0x290 [ 2176.334272][T27134] __es_insert_extent+0x2cc/0xf20 [ 2176.339282][T27134] ext4_es_insert_extent+0x2d0/0xa70 [ 2176.344550][T27134] ? ext4_es_scan_clu+0x50/0x50 [ 2176.349376][T27134] ? __es_find_extent_range+0x361/0x490 [ 2176.354901][T27134] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2176.361591][T27134] ? ext4_es_find_extent_range+0x131/0x660 [ 2176.367377][T27134] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 2176.372897][T27134] ? ext4_rereserve_cluster+0x240/0x240 [ 2176.378418][T27134] ? ext4_find_extent+0x76e/0x9d0 [ 2176.383419][T27134] ? ext4_find_extent+0x6a6/0x9d0 [ 2176.388423][T27134] ext4_ext_map_blocks+0x20c4/0x5040 [ 2176.393705][T27134] ? ext4_ext_release+0x10/0x10 [ 2176.398539][T27134] ? __kasan_check_write+0x14/0x20 [ 2176.403624][T27134] ? down_read+0x10a/0x3f0 [ 2176.408017][T27134] ? down_read_killable+0x460/0x460 [ 2176.413193][T27134] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2176.419409][T27134] ? ext4_es_lookup_extent+0x3fd/0xbf0 [ 2176.424862][T27134] ext4_map_blocks+0xdc5/0x17f0 [ 2176.429689][T27134] ? ext4_issue_zeroout+0x190/0x190 [ 2176.434863][T27134] ? ext4_set_acl+0x4f0/0x4f0 [ 2176.439520][T27134] ? __kasan_check_write+0x14/0x20 [ 2176.444618][T27134] ext4_getblk+0xc4/0x570 [ 2176.448922][T27134] ? ext4_iomap_begin+0x1000/0x1000 [ 2176.454097][T27134] ext4_bread+0x93/0x270 [ 2176.458315][T27134] ? ext4_getblk+0x570/0x570 [ 2176.462884][T27134] ext4_append+0x155/0x370 [ 2176.467286][T27134] ext4_mkdir+0x632/0xe20 [ 2176.471600][T27134] ? ext4_init_dot_dotdot+0x520/0x520 [ 2176.476959][T27134] ? selinux_inode_mkdir+0x23/0x30 [ 2176.482048][T27134] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2176.488263][T27134] ? security_inode_mkdir+0xe4/0x120 [ 2176.493530][T27134] vfs_mkdir+0x42e/0x670 [ 2176.497754][T27134] do_mkdirat+0x234/0x2a0 [ 2176.502064][T27134] ? __ia32_sys_mknod+0xb0/0xb0 [ 2176.506891][T27134] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2176.513196][T27134] ? trace_hardirqs_off_caller+0x65/0x230 [ 2176.518890][T27134] __x64_sys_mkdir+0x5c/0x80 [ 2176.523459][T27134] do_syscall_64+0xfd/0x6a0 [ 2176.527938][T27134] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2176.533813][T27134] RIP: 0033:0x458c97 [ 2176.537686][T27134] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2176.557269][T27134] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2176.565662][T27134] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 2176.573610][T27134] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2176.581555][T27134] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2176.589503][T27134] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 09:10:38 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x2800000000000000, 0x0, 0x5}}}}}}}, 0x0) 09:10:38 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2176.597447][T27134] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:38 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x3f00000000000000, 0x0, 0x5}}}}}}}, 0x0) 09:10:38 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8848, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:38 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:38 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8864, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:38 executing program 5 (fault-call:0 fault-nth:42): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:38 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x4000000000000000, 0x0, 0x5}}}}}}}, 0x0) 09:10:38 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8906, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:38 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000000007400fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:38 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800e000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2176.894887][T27163] FAULT_INJECTION: forcing a failure. [ 2176.894887][T27163] name failslab, interval 1, probability 0, space 0, times 0 [ 2176.947271][T27163] CPU: 0 PID: 27163 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2176.955359][T27163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2176.965407][T27163] Call Trace: [ 2176.965428][T27163] dump_stack+0x172/0x1f0 [ 2176.965446][T27163] should_fail.cold+0xa/0x15 [ 2176.965460][T27163] ? fault_create_debugfs_attr+0x180/0x180 [ 2176.965477][T27163] ? lock_downgrade+0x920/0x920 [ 2176.965490][T27163] ? ___might_sleep+0x163/0x280 [ 2176.965506][T27163] __should_failslab+0x121/0x190 [ 2176.965519][T27163] should_failslab+0x9/0x14 [ 2176.965530][T27163] kmem_cache_alloc+0x2aa/0x710 [ 2176.965546][T27163] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2176.965558][T27163] ? __mark_inode_dirty+0x3d1/0x1390 [ 2176.965573][T27163] ext4_mb_new_blocks+0x5b9/0x3870 [ 2176.965590][T27163] ? quarantine_put+0x11c/0x1c0 [ 2176.977743][T27163] ? ext4_find_extent+0x76e/0x9d0 [ 2176.977763][T27163] ext4_ext_map_blocks+0x2b34/0x5040 [ 2176.977784][T27163] ? ext4_ext_release+0x10/0x10 [ 2176.988405][T27163] ? lock_acquire+0x190/0x410 [ 2176.988418][T27163] ? ext4_map_blocks+0x4b1/0x17f0 [ 2176.988436][T27163] ? ext4_es_lookup_extent+0x3fd/0xbf0 [ 2176.988451][T27163] ext4_map_blocks+0x529/0x17f0 [ 2176.998194][T27163] ? ext4_issue_zeroout+0x190/0x190 [ 2176.998211][T27163] ? ext4_set_acl+0x4f0/0x4f0 [ 2176.998234][T27163] ? __kasan_check_write+0x14/0x20 [ 2176.998248][T27163] ext4_getblk+0xc4/0x570 [ 2176.998261][T27163] ? ext4_iomap_begin+0x1000/0x1000 [ 2176.998278][T27163] ext4_bread+0x93/0x270 [ 2177.007583][T27163] ? ext4_getblk+0x570/0x570 [ 2177.007608][T27163] ext4_append+0x155/0x370 [ 2177.019083][T27163] ext4_mkdir+0x632/0xe20 [ 2177.019103][T27163] ? ext4_init_dot_dotdot+0x520/0x520 [ 2177.019125][T27163] ? selinux_inode_mkdir+0x23/0x30 [ 2177.116496][T27163] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2177.122854][T27163] ? security_inode_mkdir+0xe4/0x120 [ 2177.128134][T27163] vfs_mkdir+0x42e/0x670 [ 2177.132389][T27163] do_mkdirat+0x234/0x2a0 [ 2177.136712][T27163] ? __ia32_sys_mknod+0xb0/0xb0 [ 2177.141560][T27163] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2177.147622][T27163] ? trace_hardirqs_off_caller+0x65/0x230 [ 2177.153338][T27163] __x64_sys_mkdir+0x5c/0x80 [ 2177.157927][T27163] do_syscall_64+0xfd/0x6a0 [ 2177.162426][T27163] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2177.168310][T27163] RIP: 0033:0x458c97 [ 2177.172205][T27163] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 09:10:38 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xb00, 0x0) 09:10:38 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xb200, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:38 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x4305000000000000, 0x0, 0x5}}}}}}}, 0x0) 09:10:38 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8035000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:39 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xdc05, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2177.191803][T27163] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2177.191817][T27163] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 2177.191825][T27163] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2177.191831][T27163] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2177.191838][T27163] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2177.191846][T27163] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:39 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x6000000000000000, 0x0, 0x5}}}}}}}, 0x0) 09:10:39 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:39 executing program 5 (fault-call:0 fault-nth:43): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:39 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:39 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xfe80, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2177.466841][T27195] FAULT_INJECTION: forcing a failure. [ 2177.466841][T27195] name failslab, interval 1, probability 0, space 0, times 0 [ 2177.479531][T27195] CPU: 1 PID: 27195 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2177.479540][T27195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2177.479545][T27195] Call Trace: [ 2177.479566][T27195] dump_stack+0x172/0x1f0 [ 2177.479584][T27195] should_fail.cold+0xa/0x15 [ 2177.479601][T27195] ? fault_create_debugfs_attr+0x180/0x180 [ 2177.479617][T27195] ? security_compute_sid.part.0+0xc04/0x1600 [ 2177.479635][T27195] __should_failslab+0x121/0x190 [ 2177.479650][T27195] should_failslab+0x9/0x14 [ 2177.479662][T27195] __kmalloc+0x71/0x770 [ 2177.479677][T27195] ? context_struct_to_string+0x368/0x950 [ 2177.479696][T27195] context_struct_to_string+0x368/0x950 [ 2177.479713][T27195] ? security_load_policycaps+0x540/0x540 [ 2177.479732][T27195] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2177.479746][T27195] ? sidtab_search_core+0x164/0x210 [ 2177.479763][T27195] security_sid_to_context_core.isra.0+0x2fb/0x390 [ 2177.505432][T27195] security_sid_to_context_force+0x3a/0x50 [ 2177.505452][T27195] selinux_inode_init_security+0x555/0x7b0 [ 2177.515801][T27195] ? selinux_inode_create+0x30/0x30 [ 2177.515819][T27195] ? get_cached_acl+0x171/0x390 [ 2177.591848][T27195] security_inode_init_security+0x1ad/0x3b0 [ 2177.597737][T27195] ? ext4_init_acl+0x290/0x290 [ 2177.602498][T27195] ? security_skb_classify_flow+0xb0/0xb0 [ 2177.608211][T27195] ? posix_acl_create+0x11a/0x430 [ 2177.613236][T27195] ? ext4_set_acl+0x4f0/0x4f0 [ 2177.617906][T27195] ? _raw_spin_unlock+0x2d/0x50 [ 2177.622753][T27195] ext4_init_security+0x34/0x40 [ 2177.627599][T27195] __ext4_new_inode+0x3b88/0x4e50 [ 2177.632627][T27195] ? ext4_free_inode+0x1490/0x1490 [ 2177.637732][T27195] ? dqget+0x10d0/0x10d0 [ 2177.642060][T27195] ? selinux_determine_inode_label+0x1b1/0x390 [ 2177.648214][T27195] ext4_mkdir+0x3df/0xe20 [ 2177.652543][T27195] ? ext4_init_dot_dotdot+0x520/0x520 [ 2177.657912][T27195] ? selinux_inode_mkdir+0x23/0x30 [ 2177.663019][T27195] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2177.669251][T27195] ? security_inode_mkdir+0xe4/0x120 [ 2177.674536][T27195] vfs_mkdir+0x42e/0x670 [ 2177.678777][T27195] do_mkdirat+0x234/0x2a0 [ 2177.683103][T27195] ? __ia32_sys_mknod+0xb0/0xb0 [ 2177.687953][T27195] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2177.694013][T27195] ? trace_hardirqs_off_caller+0x65/0x230 [ 2177.699730][T27195] __x64_sys_mkdir+0x5c/0x80 [ 2177.704323][T27195] do_syscall_64+0xfd/0x6a0 [ 2177.708821][T27195] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2177.714709][T27195] RIP: 0033:0x458c97 [ 2177.718601][T27195] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2177.738214][T27195] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2177.746614][T27195] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 2177.754576][T27195] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 09:10:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000000007a00fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:39 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x800e000000000000, 0x0, 0x5}}}}}}}, 0x0) [ 2177.762538][T27195] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2177.770523][T27195] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2177.778485][T27195] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:39 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1020, 0x0) 09:10:39 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xff00, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:39 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:39 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x8035000000000000, 0x0, 0x5}}}}}}}, 0x0) 09:10:39 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8847000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:39 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:39 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x8100000000000000, 0x0, 0x5}}}}}}}, 0x0) 09:10:39 executing program 5 (fault-call:0 fault-nth:44): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:39 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xf0ffff, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:39 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8848000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:39 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d0100000000000000000000ffffff8c00fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:39 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x86ddffff00000000, 0x0, 0x5}}}}}}}, 0x0) [ 2178.054235][T27220] FAULT_INJECTION: forcing a failure. [ 2178.054235][T27220] name failslab, interval 1, probability 0, space 0, times 0 [ 2178.066927][T27220] CPU: 0 PID: 27220 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2178.074990][T27220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2178.085043][T27220] Call Trace: [ 2178.088342][T27220] dump_stack+0x172/0x1f0 [ 2178.092676][T27220] should_fail.cold+0xa/0x15 [ 2178.097265][T27220] ? __kasan_check_read+0x11/0x20 [ 2178.102283][T27220] ? fault_create_debugfs_attr+0x180/0x180 [ 2178.108083][T27220] ? __es_tree_search.isra.0+0x1bf/0x230 [ 2178.113708][T27220] ? save_stack+0x5c/0x90 [ 2178.118046][T27220] __should_failslab+0x121/0x190 [ 2178.122996][T27220] should_failslab+0x9/0x14 [ 2178.127495][T27220] kmem_cache_alloc+0x47/0x710 [ 2178.132259][T27220] ? __es_shrink+0xad0/0xad0 [ 2178.136945][T27220] ? do_raw_write_lock+0x124/0x290 [ 2178.142058][T27220] __es_insert_extent+0x2cc/0xf20 [ 2178.147082][T27220] ext4_es_insert_extent+0x2d0/0xa70 [ 2178.152364][T27220] ? ext4_es_scan_clu+0x50/0x50 [ 2178.157209][T27220] ? __es_find_extent_range+0x361/0x490 [ 2178.162754][T27220] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2178.168984][T27220] ? ext4_es_find_extent_range+0x131/0x660 [ 2178.174782][T27220] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 2178.180327][T27220] ? ext4_rereserve_cluster+0x240/0x240 [ 2178.185869][T27220] ? ext4_find_extent+0x76e/0x9d0 [ 2178.192427][T27220] ? ext4_find_extent+0x6a6/0x9d0 [ 2178.197448][T27220] ext4_ext_map_blocks+0x20c4/0x5040 [ 2178.202724][T27220] ? ext4_ext_release+0x10/0x10 [ 2178.202745][T27220] ? __kasan_check_write+0x14/0x20 [ 2178.202763][T27220] ? down_read+0x10a/0x3f0 [ 2178.224894][T27220] ? down_read_killable+0x460/0x460 [ 2178.224910][T27220] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2178.224924][T27220] ? ext4_es_lookup_extent+0x3fd/0xbf0 [ 2178.224940][T27220] ext4_map_blocks+0xdc5/0x17f0 [ 2178.224955][T27220] ? ext4_issue_zeroout+0x190/0x190 [ 2178.224974][T27220] ? ext4_set_acl+0x4f0/0x4f0 [ 2178.256485][T27220] ? __kasan_check_write+0x14/0x20 [ 2178.261598][T27220] ext4_getblk+0xc4/0x570 [ 2178.265930][T27220] ? ext4_iomap_begin+0x1000/0x1000 [ 2178.271136][T27220] ext4_bread+0x93/0x270 [ 2178.275378][T27220] ? ext4_getblk+0x570/0x570 [ 2178.279965][T27220] ext4_append+0x155/0x370 [ 2178.279983][T27220] ext4_mkdir+0x632/0xe20 [ 2178.280001][T27220] ? ext4_init_dot_dotdot+0x520/0x520 [ 2178.294058][T27220] ? selinux_inode_mkdir+0x23/0x30 [ 2178.294074][T27220] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2178.294091][T27220] ? security_inode_mkdir+0xe4/0x120 [ 2178.310668][T27220] vfs_mkdir+0x42e/0x670 [ 2178.314915][T27220] do_mkdirat+0x234/0x2a0 [ 2178.319242][T27220] ? __ia32_sys_mknod+0xb0/0xb0 [ 2178.324089][T27220] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2178.324105][T27220] ? trace_hardirqs_off_caller+0x65/0x230 [ 2178.324126][T27220] __x64_sys_mkdir+0x5c/0x80 [ 2178.340447][T27220] do_syscall_64+0xfd/0x6a0 [ 2178.344954][T27220] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2178.350839][T27220] RIP: 0033:0x458c97 [ 2178.354726][T27220] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2178.374872][T27220] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2178.374887][T27220] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 2178.374895][T27220] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2178.374903][T27220] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2178.374910][T27220] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2178.374917][T27220] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 2178.375042][ C0] net_ratelimit: 24 callbacks suppressed [ 2178.375048][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2178.434967][ C0] protocol 88fb is buggy, dev hsr_slave_1 09:10:40 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x2000, 0x0) 09:10:40 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8864000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:40 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x8847000000000000, 0x0, 0x5}}}}}}}, 0x0) 09:10:40 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:40 executing program 5 (fault-call:0 fault-nth:45): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:40 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff00000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:40 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:40 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x8848000000000000, 0x0, 0x5}}}}}}}, 0x0) 09:10:40 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:40 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x8864000000000000, 0x0, 0x5}}}}}}}, 0x0) [ 2178.703364][T27253] FAULT_INJECTION: forcing a failure. [ 2178.703364][T27253] name failslab, interval 1, probability 0, space 0, times 0 [ 2178.716195][T27253] CPU: 1 PID: 27253 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2178.724256][T27253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2178.734306][T27253] Call Trace: [ 2178.737608][T27253] dump_stack+0x172/0x1f0 [ 2178.741938][T27253] should_fail.cold+0xa/0x15 [ 2178.746529][T27253] ? fault_create_debugfs_attr+0x180/0x180 [ 2178.752337][T27253] ? security_compute_sid.part.0+0xc04/0x1600 [ 2178.758411][T27253] __should_failslab+0x121/0x190 [ 2178.763353][T27253] should_failslab+0x9/0x14 [ 2178.767859][T27253] __kmalloc+0x71/0x770 [ 2178.772013][T27253] ? context_struct_to_string+0x368/0x950 [ 2178.777740][T27253] context_struct_to_string+0x368/0x950 [ 2178.783296][T27253] ? security_load_policycaps+0x540/0x540 [ 2178.789011][T27253] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2178.795246][T27253] ? sidtab_search_core+0x164/0x210 09:10:40 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000000edc000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:40 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x2010, 0x0) 09:10:40 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff00000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:40 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8906000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2178.800444][T27253] security_sid_to_context_core.isra.0+0x2fb/0x390 [ 2178.806935][T27253] security_sid_to_context_force+0x3a/0x50 [ 2178.806953][T27253] selinux_inode_init_security+0x555/0x7b0 [ 2178.806983][T27253] ? selinux_inode_create+0x30/0x30 [ 2178.823779][T27253] ? get_cached_acl+0x171/0x390 [ 2178.823801][T27253] security_inode_init_security+0x1ad/0x3b0 [ 2178.823815][T27253] ? ext4_init_acl+0x290/0x290 [ 2178.823833][T27253] ? security_skb_classify_flow+0xb0/0xb0 [ 2178.834524][T27253] ? posix_acl_create+0x11a/0x430 09:10:40 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2178.834545][T27253] ? ext4_set_acl+0x4f0/0x4f0 [ 2178.834558][T27253] ? _raw_spin_unlock+0x2d/0x50 [ 2178.834599][T27253] ext4_init_security+0x34/0x40 [ 2178.845011][T27253] __ext4_new_inode+0x3b88/0x4e50 [ 2178.845032][T27253] ? ext4_free_inode+0x1490/0x1490 [ 2178.845050][T27253] ? dqget+0x10d0/0x10d0 [ 2178.874479][T27253] ? selinux_determine_inode_label+0x1b1/0x390 [ 2178.874502][T27253] ext4_mkdir+0x3df/0xe20 [ 2178.884853][T27253] ? ext4_init_dot_dotdot+0x520/0x520 [ 2178.884870][T27253] ? selinux_inode_mkdir+0x23/0x30 [ 2178.884891][T27253] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2178.894535][T27253] ? security_inode_mkdir+0xe4/0x120 [ 2178.894555][T27253] vfs_mkdir+0x42e/0x670 [ 2178.894581][T27253] do_mkdirat+0x234/0x2a0 [ 2178.915363][T27253] ? __ia32_sys_mknod+0xb0/0xb0 [ 2178.915380][T27253] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2178.915397][T27253] ? trace_hardirqs_off_caller+0x65/0x230 [ 2178.936263][T27253] __x64_sys_mkdir+0x5c/0x80 [ 2178.940838][T27253] do_syscall_64+0xfd/0x6a0 [ 2178.945327][T27253] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2178.951194][T27253] RIP: 0033:0x458c97 [ 2178.955069][T27253] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2178.974651][T27253] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2178.983039][T27253] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 2178.990985][T27253] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 09:10:40 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x88a8ffff00000000, 0x0, 0x5}}}}}}}, 0x0) [ 2178.998932][T27253] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2179.006882][T27253] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2179.014832][T27253] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:40 executing program 5 (fault-call:0 fault-nth:46): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:40 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff00000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:40 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x5000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:40 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x88caffff00000000, 0x0, 0x5}}}}}}}, 0x0) 09:10:40 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x2300, 0x0) [ 2179.212517][T27283] FAULT_INJECTION: forcing a failure. [ 2179.212517][T27283] name failslab, interval 1, probability 0, space 0, times 0 [ 2179.225134][T27283] CPU: 1 PID: 27283 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2179.233191][T27283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2179.243236][T27283] Call Trace: [ 2179.246532][T27283] dump_stack+0x172/0x1f0 [ 2179.250865][T27283] should_fail.cold+0xa/0x15 [ 2179.255459][T27283] ? fault_create_debugfs_attr+0x180/0x180 [ 2179.261259][T27283] ? __sigqueue_alloc+0x173/0x4d0 [ 2179.266288][T27283] ? __kasan_check_read+0x11/0x20 [ 2179.271313][T27283] __should_failslab+0x121/0x190 [ 2179.276260][T27283] should_failslab+0x9/0x14 [ 2179.280759][T27283] kmem_cache_alloc+0x47/0x710 [ 2179.285516][T27283] ? trace_event_raw_event_signal_deliver+0x4f0/0x4f0 [ 2179.292276][T27283] __sigqueue_alloc+0x268/0x4d0 [ 2179.297125][T27283] __send_signal+0x863/0x1090 [ 2179.301799][T27283] send_signal+0x4c1/0x7d0 [ 2179.306211][T27283] force_sig_info_to_task+0x278/0x340 [ 2179.311578][T27283] force_sig_fault+0xbe/0x100 [ 2179.316256][T27283] ? force_sig_fault_to_task+0xf0/0xf0 [ 2179.321714][T27283] ? trace_hardirqs_on+0x67/0x240 [ 2179.326739][T27283] __bad_area_nosemaphore+0x32e/0x420 [ 2179.332104][T27283] ? vmacache_find+0x65/0x310 [ 2179.336779][T27283] bad_area+0x69/0x80 [ 2179.340756][T27283] __do_page_fault+0xa28/0xdd0 [ 2179.345523][T27283] ? page_fault+0x16/0x40 [ 2179.349853][T27283] do_page_fault+0x38/0x590 [ 2179.354352][T27283] page_fault+0x39/0x40 [ 2179.358957][T27283] RIP: 0033:0x45347f [ 2179.362848][T27283] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 2179.382445][T27283] RSP: 002b:00007f9e2b362a88 EFLAGS: 00010283 [ 2179.388521][T27283] RAX: 00007f9e2b362b40 RBX: 0000000020000228 RCX: 0000000000000000 [ 2179.396483][T27283] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007f9e2b362b40 [ 2179.404451][T27283] RBP: 0000000000000001 R08: 00000000000000e0 R09: 000000000000000a 09:10:41 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x6000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2179.412412][T27283] R10: 0000000000000075 R11: 00000000004e5320 R12: 0000000000000004 [ 2179.420371][T27283] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:41 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d0100000000000000000000fffffff400fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:41 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb200000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:41 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x8906000000000000, 0x0, 0x5}}}}}}}, 0x0) 09:10:41 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x7000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:41 executing program 5 (fault-call:0 fault-nth:47): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2179.557523][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2179.563330][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2179.569145][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2179.574896][ C0] protocol 88fb is buggy, dev hsr_slave_1 09:10:41 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:41 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x3f00, 0x0) 09:10:41 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x8dffffff00000000, 0x0, 0x5}}}}}}}, 0x0) 09:10:41 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:41 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:41 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8060000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:41 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d0100000000000000000000fffffff500fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:41 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0xb200000000000000, 0x0, 0x5}}}}}}}, 0x0) [ 2179.797369][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2179.803166][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2179.808979][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2179.814715][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:10:41 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x9000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2179.851345][T27313] FAULT_INJECTION: forcing a failure. [ 2179.851345][T27313] name failslab, interval 1, probability 0, space 0, times 0 09:10:41 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2179.894456][T27313] CPU: 0 PID: 27313 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2179.902523][T27313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2179.912570][T27313] Call Trace: [ 2179.915869][T27313] dump_stack+0x172/0x1f0 [ 2179.920197][T27313] should_fail.cold+0xa/0x15 [ 2179.924783][T27313] ? fault_create_debugfs_attr+0x180/0x180 [ 2179.930589][T27313] ? lock_downgrade+0x920/0x920 [ 2179.935439][T27313] ? ___might_sleep+0x163/0x280 [ 2179.940294][T27313] __should_failslab+0x121/0x190 [ 2179.945313][T27313] should_failslab+0x9/0x14 [ 2179.949811][T27313] kmem_cache_alloc+0x2aa/0x710 [ 2179.954659][T27313] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2179.960895][T27313] ? __mark_inode_dirty+0x3d1/0x1390 [ 2179.966182][T27313] ext4_mb_new_blocks+0x5b9/0x3870 [ 2179.971292][T27313] ? quarantine_put+0x11c/0x1c0 [ 2179.976145][T27313] ? ext4_find_extent+0x76e/0x9d0 [ 2179.981172][T27313] ext4_ext_map_blocks+0x2b34/0x5040 [ 2179.986456][T27313] ? ext4_ext_release+0x10/0x10 [ 2179.991298][T27313] ? lock_acquire+0x190/0x410 [ 2179.995991][T27313] ? ext4_map_blocks+0x4b1/0x17f0 [ 2180.001020][T27313] ? ext4_es_lookup_extent+0x3fd/0xbf0 [ 2180.006474][T27313] ext4_map_blocks+0x529/0x17f0 [ 2180.011325][T27313] ? ext4_issue_zeroout+0x190/0x190 [ 2180.016517][T27313] ? ext4_set_acl+0x4f0/0x4f0 [ 2180.021191][T27313] ? __kasan_check_write+0x14/0x20 [ 2180.021205][T27313] ext4_getblk+0xc4/0x570 [ 2180.021219][T27313] ? ext4_iomap_begin+0x1000/0x1000 [ 2180.021237][T27313] ext4_bread+0x93/0x270 [ 2180.035805][T27313] ? ext4_getblk+0x570/0x570 [ 2180.035825][T27313] ext4_append+0x155/0x370 [ 2180.035845][T27313] ext4_mkdir+0x632/0xe20 [ 2180.053350][T27313] ? ext4_init_dot_dotdot+0x520/0x520 [ 2180.058726][T27313] ? selinux_inode_mkdir+0x23/0x30 [ 2180.063835][T27313] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2180.070075][T27313] ? security_inode_mkdir+0xe4/0x120 [ 2180.075363][T27313] vfs_mkdir+0x42e/0x670 [ 2180.079600][T27313] do_mkdirat+0x234/0x2a0 [ 2180.083925][T27313] ? __ia32_sys_mknod+0xb0/0xb0 [ 2180.088775][T27313] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2180.094836][T27313] ? trace_hardirqs_off_caller+0x65/0x230 [ 2180.100551][T27313] __x64_sys_mkdir+0x5c/0x80 [ 2180.105140][T27313] do_syscall_64+0xfd/0x6a0 [ 2180.109640][T27313] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2180.115527][T27313] RIP: 0033:0x458c97 [ 2180.119419][T27313] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2180.139018][T27313] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2180.147426][T27313] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 2180.155390][T27313] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2180.163354][T27313] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2180.171318][T27313] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2180.179290][T27313] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:41 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xa000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:42 executing program 5 (fault-call:0 fault-nth:48): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:42 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0xf5ffffff00000000, 0x0, 0x5}}}}}}}, 0x0) 09:10:42 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x4000, 0x0) 09:10:42 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x2, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:42 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xd000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:42 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0xff00000000000000, 0x0, 0x5}}}}}}}, 0x0) 09:10:42 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x3, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2180.415078][T27345] FAULT_INJECTION: forcing a failure. [ 2180.415078][T27345] name failslab, interval 1, probability 0, space 0, times 0 [ 2180.447410][T27345] CPU: 1 PID: 27345 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2180.455485][T27345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2180.455491][T27345] Call Trace: [ 2180.455513][T27345] dump_stack+0x172/0x1f0 [ 2180.455536][T27345] should_fail.cold+0xa/0x15 [ 2180.477896][T27345] ? fault_create_debugfs_attr+0x180/0x180 [ 2180.483704][T27345] ? ___might_sleep+0x163/0x280 [ 2180.488556][T27345] __should_failslab+0x121/0x190 [ 2180.488573][T27345] should_failslab+0x9/0x14 [ 2180.488590][T27345] __kmalloc+0x2e0/0x770 [ 2180.502214][T27345] ? save_stack+0x5c/0x90 [ 2180.506534][T27345] ? save_stack+0x23/0x90 [ 2180.510857][T27345] ? tomoyo_encode2.part.0+0xf5/0x400 [ 2180.516227][T27345] tomoyo_encode2.part.0+0xf5/0x400 [ 2180.521426][T27345] ? do_syscall_64+0xfd/0x6a0 [ 2180.526100][T27345] tomoyo_encode+0x2b/0x50 [ 2180.530513][T27345] tomoyo_mount_acl+0xe0/0x840 [ 2180.535272][T27345] ? __kasan_check_read+0x11/0x20 [ 2180.540296][T27345] ? __kasan_check_write+0x14/0x20 [ 2180.545404][T27345] ? avc_has_perm+0x376/0x600 [ 2180.550080][T27345] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 2180.555618][T27345] ? debug_check_no_obj_freed+0xc0/0x43f [ 2180.561246][T27345] ? lock_downgrade+0x920/0x920 [ 2180.566096][T27345] ? avc_has_perm+0xcc/0x600 [ 2180.570696][T27345] ? lock_acquire+0x190/0x410 [ 2180.575366][T27345] ? tomoyo_mount_permission+0x10a/0x410 [ 2180.580997][T27345] tomoyo_mount_permission+0x16a/0x410 [ 2180.586449][T27345] ? tomoyo_mount_permission+0x10a/0x410 [ 2180.592079][T27345] ? tomoyo_mount_acl+0x840/0x840 [ 2180.597097][T27345] ? inode_has_perm+0x1b0/0x230 [ 2180.601950][T27345] ? selinux_inode_setxattr+0x8b0/0x8b0 [ 2180.607490][T27345] ? strncpy_from_user+0x2b4/0x400 [ 2180.612593][T27345] tomoyo_sb_mount+0x35/0x40 [ 2180.617188][T27345] security_sb_mount+0x87/0xd0 [ 2180.622560][T27345] do_mount+0x1d4/0x1c30 [ 2180.626806][T27345] ? kasan_kmalloc+0x9/0x10 [ 2180.631309][T27345] ? copy_mount_string+0x40/0x40 [ 2180.636245][T27345] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2180.642480][T27345] ? _copy_from_user+0x12c/0x1a0 [ 2180.647418][T27345] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2180.653652][T27345] ? copy_mount_options+0x2e8/0x3f0 [ 2180.658849][T27345] ksys_mount+0xdb/0x150 [ 2180.663087][T27345] __x64_sys_mount+0xbe/0x150 [ 2180.667764][T27345] do_syscall_64+0xfd/0x6a0 [ 2180.672268][T27345] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2180.678153][T27345] RIP: 0033:0x45c2ca [ 2180.682142][T27345] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2180.701737][T27345] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 09:10:42 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d0100000000000000000000fffffff600fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:42 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2180.710144][T27345] RAX: ffffffffffffffda RBX: 00007f9e2b362b40 RCX: 000000000045c2ca [ 2180.718106][T27345] RDX: 00007f9e2b362ae0 RSI: 0000000020000100 RDI: 00007f9e2b362b00 [ 2180.726069][T27345] RBP: 0000000000000001 R08: 00007f9e2b362b40 R09: 00007f9e2b362ae0 [ 2180.734035][T27345] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2180.742000][T27345] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:42 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0xfffffffffffff000, 0x0, 0x5}}}}}}}, 0x0) 09:10:42 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x4, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:42 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x11000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:42 executing program 5 (fault-call:0 fault-nth:49): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:42 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xedc0, 0x0) 09:10:42 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x28000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:42 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x2, 0x5}}}}}}}, 0x0) 09:10:42 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d0100000000000000000000fffffdf900fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:42 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x5, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2180.989803][T27371] FAULT_INJECTION: forcing a failure. [ 2180.989803][T27371] name failslab, interval 1, probability 0, space 0, times 0 09:10:42 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x3, 0x5}}}}}}}, 0x0) 09:10:42 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3c000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2181.036235][T27371] CPU: 1 PID: 27371 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2181.044324][T27371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2181.054389][T27371] Call Trace: [ 2181.057688][T27371] dump_stack+0x172/0x1f0 [ 2181.062030][T27371] should_fail.cold+0xa/0x15 [ 2181.066619][T27371] ? fault_create_debugfs_attr+0x180/0x180 [ 2181.072422][T27371] ? lock_downgrade+0x920/0x920 [ 2181.077272][T27371] ? ___might_sleep+0x163/0x280 09:10:42 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3f000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2181.082125][T27371] __should_failslab+0x121/0x190 [ 2181.087058][T27371] should_failslab+0x9/0x14 [ 2181.091562][T27371] kmem_cache_alloc+0x2aa/0x710 [ 2181.096413][T27371] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2181.102656][T27371] ? __mark_inode_dirty+0x3d1/0x1390 [ 2181.107939][T27371] ext4_mb_new_blocks+0x5b9/0x3870 [ 2181.113057][T27371] ? quarantine_put+0x11c/0x1c0 [ 2181.117907][T27371] ? ext4_find_extent+0x76e/0x9d0 [ 2181.122936][T27371] ext4_ext_map_blocks+0x2b34/0x5040 [ 2181.128231][T27371] ? ext4_ext_release+0x10/0x10 09:10:42 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:42 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x43050000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2181.133077][T27371] ? lock_acquire+0x190/0x410 [ 2181.137743][T27371] ? ext4_map_blocks+0x4b1/0x17f0 [ 2181.142767][T27371] ? ext4_es_lookup_extent+0x3fd/0xbf0 [ 2181.148224][T27371] ext4_map_blocks+0x529/0x17f0 [ 2181.153117][T27371] ? ext4_issue_zeroout+0x190/0x190 [ 2181.158313][T27371] ? ext4_set_acl+0x4f0/0x4f0 [ 2181.162995][T27371] ? __kasan_check_write+0x14/0x20 [ 2181.168105][T27371] ext4_getblk+0xc4/0x570 [ 2181.172431][T27371] ? ext4_iomap_begin+0x1000/0x1000 [ 2181.177636][T27371] ext4_bread+0x93/0x270 [ 2181.181879][T27371] ? ext4_getblk+0x570/0x570 09:10:42 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x44000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2181.186468][T27371] ext4_append+0x155/0x370 [ 2181.190889][T27371] ext4_mkdir+0x632/0xe20 [ 2181.195227][T27371] ? ext4_init_dot_dotdot+0x520/0x520 [ 2181.200602][T27371] ? selinux_inode_mkdir+0x23/0x30 [ 2181.205713][T27371] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2181.211953][T27371] ? security_inode_mkdir+0xe4/0x120 [ 2181.217240][T27371] vfs_mkdir+0x42e/0x670 [ 2181.221495][T27371] do_mkdirat+0x234/0x2a0 [ 2181.225826][T27371] ? __ia32_sys_mknod+0xb0/0xb0 [ 2181.230671][T27371] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2181.236744][T27371] ? trace_hardirqs_off_caller+0x65/0x230 [ 2181.242463][T27371] __x64_sys_mkdir+0x5c/0x80 [ 2181.247033][T27371] do_syscall_64+0xfd/0x6a0 [ 2181.251533][T27371] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2181.257409][T27371] RIP: 0033:0x458c97 [ 2181.261290][T27371] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2181.280865][T27371] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2181.289252][T27371] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458c97 [ 2181.297197][T27371] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000100 [ 2181.305139][T27371] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 2181.313095][T27371] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 2181.321141][T27371] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:43 executing program 5 (fault-call:0 fault-nth:50): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:43 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x800e0000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:43 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xff00, 0x0) 09:10:43 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x5, 0x5}}}}}}}, 0x0) [ 2181.592810][T27406] FAULT_INJECTION: forcing a failure. [ 2181.592810][T27406] name failslab, interval 1, probability 0, space 0, times 0 [ 2181.615984][T27406] CPU: 1 PID: 27406 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2181.624061][T27406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2181.634114][T27406] Call Trace: [ 2181.637400][T27406] dump_stack+0x172/0x1f0 [ 2181.641726][T27406] should_fail.cold+0xa/0x15 [ 2181.646318][T27406] ? fault_create_debugfs_attr+0x180/0x180 [ 2181.652116][T27406] ? page_to_nid.part.0+0x20/0x20 [ 2181.657137][T27406] ? ___might_sleep+0x163/0x280 [ 2181.661988][T27406] __should_failslab+0x121/0x190 [ 2181.666922][T27406] should_failslab+0x9/0x14 [ 2181.671424][T27406] __kmalloc_track_caller+0x2dc/0x760 [ 2181.676790][T27406] ? setup_sigcontext+0x7d0/0x7d0 [ 2181.681810][T27406] ? __bad_area_nosemaphore+0xb3/0x420 [ 2181.687265][T27406] ? strndup_user+0x77/0xd0 [ 2181.691763][T27406] memdup_user+0x26/0xb0 [ 2181.696004][T27406] strndup_user+0x77/0xd0 [ 2181.700335][T27406] ksys_mount+0x3c/0x150 [ 2181.704573][T27406] __x64_sys_mount+0xbe/0x150 [ 2181.709247][T27406] do_syscall_64+0xfd/0x6a0 [ 2181.713765][T27406] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2181.719651][T27406] RIP: 0033:0x45c2ca [ 2181.723545][T27406] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2181.743138][T27406] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2181.751544][T27406] RAX: ffffffffffffffda RBX: 00007f9e2b362b40 RCX: 000000000045c2ca [ 2181.759505][T27406] RDX: 00007f9e2b362ae0 RSI: 0000000020000100 RDI: 00007f9e2b362b00 [ 2181.767472][T27406] RBP: 0000000000000001 R08: 00007f9e2b362b40 R09: 00007f9e2b362ae0 [ 2181.775433][T27406] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2181.783398][T27406] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:43 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d0100000000000000000000fffffffb00fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:43 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x80350000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:43 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x6, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:43 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}}, 0x0) 09:10:43 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xff0f, 0x0) 09:10:43 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x7, 0x5}}}}}}}, 0x0) 09:10:43 executing program 5 (fault-call:0 fault-nth:51): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:43 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x7, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:43 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x81000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:43 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x8, 0x5}}}}}}}, 0x0) [ 2181.994534][T27428] FAULT_INJECTION: forcing a failure. [ 2181.994534][T27428] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2182.007746][T27428] CPU: 0 PID: 27428 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2182.015791][T27428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2182.025821][T27428] Call Trace: [ 2182.029095][T27428] dump_stack+0x172/0x1f0 [ 2182.033404][T27428] should_fail.cold+0xa/0x15 [ 2182.038095][T27428] ? do_syscall_64+0xfd/0x6a0 [ 2182.042751][T27428] ? fault_create_debugfs_attr+0x180/0x180 [ 2182.048537][T27428] ? __kasan_check_read+0x11/0x20 [ 2182.053545][T27428] should_fail_alloc_page+0x50/0x60 [ 2182.058718][T27428] __alloc_pages_nodemask+0x1a1/0x900 [ 2182.064068][T27428] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2182.069764][T27428] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2182.075377][T27428] ? __kasan_check_read+0x11/0x20 [ 2182.080379][T27428] ? fault_create_debugfs_attr+0x180/0x180 [ 2182.086160][T27428] cache_grow_begin+0x90/0xd20 [ 2182.090902][T27428] ? copy_mount_options+0x5c/0x3f0 [ 2182.095999][T27428] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2182.102214][T27428] kmem_cache_alloc_trace+0x6b3/0x790 [ 2182.107567][T27428] copy_mount_options+0x5c/0x3f0 [ 2182.112491][T27428] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2182.118712][T27428] ksys_mount+0xa7/0x150 [ 2182.122932][T27428] __x64_sys_mount+0xbe/0x150 [ 2182.127586][T27428] do_syscall_64+0xfd/0x6a0 [ 2182.132068][T27428] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2182.137933][T27428] RIP: 0033:0x45c2ca [ 2182.141896][T27428] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2182.161476][T27428] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2182.169862][T27428] RAX: ffffffffffffffda RBX: 00007f9e2b362b40 RCX: 000000000045c2ca [ 2182.177809][T27428] RDX: 00007f9e2b362ae0 RSI: 0000000020000100 RDI: 00007f9e2b362b00 [ 2182.185771][T27428] RBP: 0000000000000001 R08: 00007f9e2b362b40 R09: 00007f9e2b362ae0 09:10:43 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x11000, 0x0) 09:10:43 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x86ddffff, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2182.194255][T27428] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2182.202206][T27428] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d0100000000000000000000fffffdfc00fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:44 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0xd, 0x5}}}}}}}, 0x0) 09:10:44 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x8, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:44 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x88470000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:44 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x88480000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:44 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x11, 0x5}}}}}}}, 0x0) 09:10:44 executing program 5 (fault-call:0 fault-nth:52): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:44 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0xa, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x40000, 0x0) 09:10:44 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x88640000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:44 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x28, 0x5}}}}}}}, 0x0) 09:10:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d0100000000000000000000fffffdfd00fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:44 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0xd, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:44 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x88a8ffff, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:44 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x60, 0x5}}}}}}}, 0x0) 09:10:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x100100, 0x0) 09:10:44 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x88caffff, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:44 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x11, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2182.829699][T27458] FAULT_INJECTION: forcing a failure. [ 2182.829699][T27458] name failslab, interval 1, probability 0, space 0, times 0 [ 2182.857452][T27458] CPU: 1 PID: 27458 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2182.865536][T27458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2182.875597][T27458] Call Trace: [ 2182.878888][T27458] dump_stack+0x172/0x1f0 [ 2182.883230][T27458] should_fail.cold+0xa/0x15 [ 2182.887815][T27458] ? fault_create_debugfs_attr+0x180/0x180 [ 2182.893616][T27458] ? page_to_nid.part.0+0x20/0x20 [ 2182.898638][T27458] ? ___might_sleep+0x163/0x280 [ 2182.903492][T27458] __should_failslab+0x121/0x190 [ 2182.908426][T27458] should_failslab+0x9/0x14 [ 2182.912925][T27458] kmem_cache_alloc_trace+0x2d3/0x790 [ 2182.918295][T27458] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2182.924524][T27458] ? _copy_from_user+0x12c/0x1a0 [ 2182.929460][T27458] copy_mount_options+0x5c/0x3f0 [ 2182.934391][T27458] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2182.940627][T27458] ksys_mount+0xa7/0x150 [ 2182.944866][T27458] __x64_sys_mount+0xbe/0x150 [ 2182.949539][T27458] do_syscall_64+0xfd/0x6a0 [ 2182.954043][T27458] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2182.959925][T27458] RIP: 0033:0x45c2ca [ 2182.963814][T27458] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2182.983412][T27458] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2182.991820][T27458] RAX: ffffffffffffffda RBX: 00007f9e2b362b40 RCX: 000000000045c2ca [ 2182.999781][T27458] RDX: 00007f9e2b362ae0 RSI: 0000000020000100 RDI: 00007f9e2b362b00 [ 2183.007745][T27458] RBP: 0000000000000001 R08: 00007f9e2b362b40 R09: 00007f9e2b362ae0 [ 2183.015705][T27458] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2183.023668][T27458] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:44 executing program 5 (fault-call:0 fault-nth:53): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:44 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0xb2, 0x5}}}}}}}, 0x0) 09:10:44 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d0100000000000000000000000000ff00fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:44 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x89060000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:44 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x28, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:44 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xfeffff, 0x0) 09:10:45 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8dffffff, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:45 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0xf0, 0x5}}}}}}}, 0x0) 09:10:45 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x3c, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:45 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xb2000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2183.289156][T27505] FAULT_INJECTION: forcing a failure. [ 2183.289156][T27505] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2183.302372][T27505] CPU: 0 PID: 27505 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2183.310424][T27505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2183.320558][T27505] Call Trace: [ 2183.323859][T27505] dump_stack+0x172/0x1f0 [ 2183.328198][T27505] should_fail.cold+0xa/0x15 [ 2183.332789][T27505] ? do_syscall_64+0xfd/0x6a0 09:10:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d010000000000000000000000000fff00fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2183.337474][T27505] ? fault_create_debugfs_attr+0x180/0x180 [ 2183.343280][T27505] ? __kasan_check_read+0x11/0x20 [ 2183.348307][T27505] should_fail_alloc_page+0x50/0x60 [ 2183.353502][T27505] __alloc_pages_nodemask+0x1a1/0x900 [ 2183.358877][T27505] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2183.364587][T27505] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2183.370216][T27505] ? __kasan_check_read+0x11/0x20 [ 2183.375246][T27505] ? fault_create_debugfs_attr+0x180/0x180 [ 2183.381046][T27505] cache_grow_begin+0x90/0xd20 09:10:45 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xdc050000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2183.385815][T27505] ? copy_mount_options+0x5c/0x3f0 [ 2183.390925][T27505] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2183.397197][T27505] kmem_cache_alloc_trace+0x6b3/0x790 [ 2183.402571][T27505] copy_mount_options+0x5c/0x3f0 [ 2183.407509][T27505] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2183.413753][T27505] ksys_mount+0xa7/0x150 [ 2183.417996][T27505] __x64_sys_mount+0xbe/0x150 [ 2183.422680][T27505] do_syscall_64+0xfd/0x6a0 [ 2183.427191][T27505] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2183.433088][T27505] RIP: 0033:0x45c2ca [ 2183.436980][T27505] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2183.456577][T27505] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2183.464985][T27505] RAX: ffffffffffffffda RBX: 00007f9e2b362b40 RCX: 000000000045c2ca [ 2183.472958][T27505] RDX: 00007f9e2b362ae0 RSI: 0000000020000100 RDI: 00007f9e2b362b00 [ 2183.480924][T27505] RBP: 0000000000000001 R08: 00007f9e2b362b40 R09: 00007f9e2b362ae0 [ 2183.488887][T27505] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2183.496852][T27505] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:45 executing program 5 (fault-call:0 fault-nth:54): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:45 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xf5ffffff, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:45 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0xb2, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:45 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x300, 0x5}}}}}}}, 0x0) 09:10:45 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x1000000, 0x0) 09:10:45 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d0100000000000000000000ffffefff00fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:45 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0xf0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:45 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xfe800000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:45 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x500, 0x5}}}}}}}, 0x0) [ 2183.783470][T27534] FAULT_INJECTION: forcing a failure. [ 2183.783470][T27534] name failslab, interval 1, probability 0, space 0, times 0 [ 2183.820840][T27534] CPU: 0 PID: 27534 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 09:10:45 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x300, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2183.828917][T27534] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2183.828923][T27534] Call Trace: [ 2183.828947][T27534] dump_stack+0x172/0x1f0 [ 2183.828968][T27534] should_fail.cold+0xa/0x15 [ 2183.828982][T27534] ? debug_check_no_obj_freed+0xc0/0x43f [ 2183.828998][T27534] ? fault_create_debugfs_attr+0x180/0x180 [ 2183.829015][T27534] ? page_to_nid.part.0+0x20/0x20 [ 2183.851206][T27534] ? ___might_sleep+0x163/0x280 [ 2183.851223][T27534] __should_failslab+0x121/0x190 [ 2183.851242][T27534] should_failslab+0x9/0x14 [ 2183.881889][T27534] kmem_cache_alloc+0x2aa/0x710 [ 2183.886738][T27534] ? __kasan_check_write+0x14/0x20 [ 2183.886755][T27534] getname_kernel+0x53/0x370 [ 2183.886772][T27534] kern_path+0x20/0x40 [ 2183.896430][T27534] tomoyo_mount_acl+0x28c/0x840 [ 2183.896444][T27534] ? __kasan_check_read+0x11/0x20 [ 2183.896463][T27534] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 2183.915863][T27534] ? debug_check_no_obj_freed+0xc0/0x43f [ 2183.921497][T27534] ? avc_has_perm+0xcc/0x600 [ 2183.926099][T27534] ? lock_acquire+0x190/0x410 [ 2183.930772][T27534] ? tomoyo_mount_permission+0x10a/0x410 [ 2183.936402][T27534] tomoyo_mount_permission+0x16a/0x410 [ 2183.941860][T27534] ? tomoyo_mount_permission+0x10a/0x410 [ 2183.947485][T27534] ? tomoyo_mount_acl+0x840/0x840 [ 2183.952502][T27534] ? inode_has_perm+0x1b0/0x230 [ 2183.957348][T27534] ? selinux_inode_setxattr+0x8b0/0x8b0 [ 2183.957354][ C1] net_ratelimit: 16 callbacks suppressed [ 2183.957365][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2183.962880][T27534] ? strncpy_from_user+0x2b4/0x400 [ 2183.962895][T27534] tomoyo_sb_mount+0x35/0x40 [ 2183.962913][T27534] security_sb_mount+0x87/0xd0 [ 2183.968742][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2183.974393][T27534] do_mount+0x1d4/0x1c30 [ 2183.979560][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2183.984045][T27534] ? kasan_kmalloc+0x9/0x10 [ 2183.988800][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2183.994464][T27534] ? copy_mount_string+0x40/0x40 [ 2184.019492][T27534] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2184.025728][T27534] ? _copy_from_user+0x12c/0x1a0 [ 2184.030663][T27534] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2184.036898][T27534] ? copy_mount_options+0x2e8/0x3f0 [ 2184.042102][T27534] ksys_mount+0xdb/0x150 [ 2184.046345][T27534] __x64_sys_mount+0xbe/0x150 [ 2184.051022][T27534] do_syscall_64+0xfd/0x6a0 [ 2184.055526][T27534] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2184.061413][T27534] RIP: 0033:0x45c2ca [ 2184.065306][T27534] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2184.084900][T27534] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2184.093309][T27534] RAX: ffffffffffffffda RBX: 00007f9e2b362b40 RCX: 000000000045c2ca [ 2184.101271][T27534] RDX: 00007f9e2b362ae0 RSI: 0000000020000100 RDI: 00007f9e2b362b00 [ 2184.109238][T27534] RBP: 0000000000000001 R08: 00007f9e2b362b40 R09: 00007f9e2b362ae0 [ 2184.117203][T27534] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2184.125250][T27534] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 2184.133377][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2184.139155][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2184.144953][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2184.150741][ C0] protocol 88fb is buggy, dev hsr_slave_1 09:10:45 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xfeffffff, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:45 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x2000000, 0x0) 09:10:46 executing program 5 (fault-call:0 fault-nth:55): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:46 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x500, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:46 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x543, 0x5}}}}}}}, 0x0) 09:10:46 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xff000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:46 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d0100000000000000000000ffefffff00fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:46 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x543, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2184.400725][T27556] FAULT_INJECTION: forcing a failure. [ 2184.400725][T27556] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2184.413937][T27556] CPU: 0 PID: 27556 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2184.421990][T27556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2184.432034][T27556] Call Trace: [ 2184.435333][T27556] dump_stack+0x172/0x1f0 [ 2184.437421][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2184.439668][T27556] should_fail.cold+0xa/0x15 [ 2184.439687][T27556] ? __kmalloc+0x163/0x770 [ 2184.445404][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2184.449947][T27556] ? fault_create_debugfs_attr+0x180/0x180 [ 2184.449960][T27556] ? do_mount+0x1d4/0x1c30 [ 2184.449977][T27556] ? ksys_mount+0xdb/0x150 [ 2184.474644][T27556] ? __x64_sys_mount+0xbe/0x150 [ 2184.479495][T27556] ? do_syscall_64+0xfd/0x6a0 [ 2184.484166][T27556] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2184.490227][T27556] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2184.495948][T27556] ? bpf_prog_kallsyms_find+0x50/0x2c0 [ 2184.501407][T27556] should_fail_alloc_page+0x50/0x60 [ 2184.506599][T27556] __alloc_pages_nodemask+0x1a1/0x900 [ 2184.511968][T27556] ? kernel_text_address+0x73/0xf0 [ 2184.517077][T27556] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2184.522793][T27556] ? unwind_get_return_address+0x61/0xa0 [ 2184.528418][T27556] ? profile_setup.cold+0xbb/0xbb [ 2184.533443][T27556] ? should_fail+0x1de/0x852 [ 2184.538033][T27556] ? fault_create_debugfs_attr+0x180/0x180 [ 2184.543832][T27556] cache_grow_begin+0x90/0xd20 [ 2184.548590][T27556] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2184.554302][T27556] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2184.560538][T27556] __kmalloc+0x6b2/0x770 [ 2184.564783][T27556] ? kasan_kmalloc+0x9/0x10 [ 2184.569278][T27556] ? __kmalloc+0x351/0x770 [ 2184.573693][T27556] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2184.579405][T27556] tomoyo_realpath_from_path+0xcd/0x7b0 [ 2184.584944][T27556] tomoyo_mount_acl+0x149/0x840 [ 2184.589788][T27556] ? __kasan_check_read+0x11/0x20 [ 2184.594808][T27556] ? __kasan_check_write+0x14/0x20 [ 2184.599916][T27556] ? avc_has_perm+0x376/0x600 [ 2184.604590][T27556] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 2184.610138][T27556] ? debug_check_no_obj_freed+0xc0/0x43f [ 2184.615769][T27556] ? avc_has_perm+0xcc/0x600 [ 2184.620366][T27556] ? lock_acquire+0x190/0x410 [ 2184.625038][T27556] ? tomoyo_mount_permission+0x10a/0x410 [ 2184.630665][T27556] tomoyo_mount_permission+0x16a/0x410 [ 2184.636118][T27556] ? tomoyo_mount_permission+0x10a/0x410 [ 2184.641747][T27556] ? tomoyo_mount_acl+0x840/0x840 [ 2184.646766][T27556] ? inode_has_perm+0x1b0/0x230 [ 2184.651620][T27556] ? selinux_inode_setxattr+0x8b0/0x8b0 [ 2184.657162][T27556] ? strncpy_from_user+0x2b4/0x400 [ 2184.662268][T27556] tomoyo_sb_mount+0x35/0x40 [ 2184.666859][T27556] security_sb_mount+0x87/0xd0 [ 2184.671619][T27556] do_mount+0x1d4/0x1c30 [ 2184.675859][T27556] ? retint_kernel+0x2b/0x2b [ 2184.680450][T27556] ? copy_mount_string+0x40/0x40 [ 2184.685381][T27556] ? copy_mount_options+0x270/0x3f0 [ 2184.690572][T27556] ? copy_mount_options+0x1fb/0x3f0 [ 2184.695769][T27556] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2184.702000][T27556] ? copy_mount_options+0x2e8/0x3f0 [ 2184.707198][T27556] ksys_mount+0xdb/0x150 [ 2184.711443][T27556] __x64_sys_mount+0xbe/0x150 [ 2184.716116][T27556] do_syscall_64+0xfd/0x6a0 [ 2184.720704][T27556] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2184.726650][T27556] RIP: 0033:0x45c2ca [ 2184.730546][T27556] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 09:10:46 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xffffa888, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2184.750138][T27556] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2184.758547][T27556] RAX: ffffffffffffffda RBX: 00007f9e2b362b40 RCX: 000000000045c2ca [ 2184.766510][T27556] RDX: 00007f9e2b362ae0 RSI: 0000000020000100 RDI: 00007f9e2b362b00 [ 2184.774474][T27556] RBP: 0000000000000001 R08: 00007f9e2b362b40 R09: 00007f9e2b362ae0 [ 2184.782446][T27556] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2184.790407][T27556] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:46 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xffffca88, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:46 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x600, 0x5}}}}}}}, 0x0) 09:10:46 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xffffdd86, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:46 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x600, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:46 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x3000000, 0x0) 09:10:46 executing program 5 (fault-call:0 fault-nth:56): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:46 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xfffff000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:46 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x608, 0x5}}}}}}}, 0x0) 09:10:46 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xffffff8d, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2185.082541][T27588] FAULT_INJECTION: forcing a failure. [ 2185.082541][T27588] name failslab, interval 1, probability 0, space 0, times 0 [ 2185.099240][T27588] CPU: 0 PID: 27588 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2185.107312][T27588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2185.117440][T27588] Call Trace: [ 2185.117465][T27588] dump_stack+0x172/0x1f0 [ 2185.117487][T27588] should_fail.cold+0xa/0x15 [ 2185.117510][T27588] ? fault_create_debugfs_attr+0x180/0x180 [ 2185.117533][T27588] ? ___might_sleep+0x163/0x280 [ 2185.129680][T27588] __should_failslab+0x121/0x190 [ 2185.129700][T27588] should_failslab+0x9/0x14 [ 2185.140311][T27588] __kmalloc+0x2e0/0x770 [ 2185.140327][T27588] ? save_stack+0x5c/0x90 [ 2185.140338][T27588] ? save_stack+0x23/0x90 [ 2185.140351][T27588] ? tomoyo_encode2.part.0+0xf5/0x400 [ 2185.140364][T27588] tomoyo_encode2.part.0+0xf5/0x400 [ 2185.140377][T27588] ? do_syscall_64+0xfd/0x6a0 [ 2185.140393][T27588] tomoyo_encode+0x2b/0x50 [ 2185.149789][T27588] tomoyo_mount_acl+0xe0/0x840 [ 2185.186944][T27588] ? __kasan_check_read+0x11/0x20 [ 2185.192430][T27588] ? __kasan_check_write+0x14/0x20 [ 2185.197548][T27588] ? avc_has_perm+0x376/0x600 [ 2185.202220][T27588] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 2185.207756][T27588] ? debug_check_no_obj_freed+0xc0/0x43f [ 2185.213479][T27588] ? lock_downgrade+0x920/0x920 [ 2185.218326][T27588] ? avc_has_perm+0xcc/0x600 [ 2185.222919][T27588] ? lock_acquire+0x190/0x410 [ 2185.227589][T27588] ? tomoyo_mount_permission+0x10a/0x410 [ 2185.233213][T27588] tomoyo_mount_permission+0x16a/0x410 [ 2185.238664][T27588] ? tomoyo_mount_permission+0x10a/0x410 [ 2185.244291][T27588] ? tomoyo_mount_acl+0x840/0x840 [ 2185.249311][T27588] ? inode_has_perm+0x1b0/0x230 [ 2185.254159][T27588] ? selinux_inode_setxattr+0x8b0/0x8b0 [ 2185.259700][T27588] ? strncpy_from_user+0x2b4/0x400 [ 2185.264810][T27588] tomoyo_sb_mount+0x35/0x40 [ 2185.269393][T27588] security_sb_mount+0x87/0xd0 [ 2185.274139][T27588] do_mount+0x1d4/0x1c30 [ 2185.278364][T27588] ? kasan_kmalloc+0x9/0x10 [ 2185.282847][T27588] ? copy_mount_string+0x40/0x40 [ 2185.287765][T27588] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2185.293983][T27588] ? copy_mount_options+0x2e8/0x3f0 [ 2185.299160][T27588] ksys_mount+0xdb/0x150 [ 2185.303385][T27588] __x64_sys_mount+0xbe/0x150 [ 2185.308042][T27588] do_syscall_64+0xfd/0x6a0 [ 2185.312523][T27588] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2185.318391][T27588] RIP: 0033:0x45c2ca [ 2185.322262][T27588] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2185.341925][T27588] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2185.350311][T27588] RAX: ffffffffffffffda RBX: 00007f9e2b362b40 RCX: 000000000045c2ca [ 2185.358256][T27588] RDX: 00007f9e2b362ae0 RSI: 0000000020000100 RDI: 00007f9e2b362b00 [ 2185.366376][T27588] RBP: 0000000000000001 R08: 00007f9e2b362b40 R09: 00007f9e2b362ae0 [ 2185.374324][T27588] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2185.382274][T27588] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d0100000000000000000000f9fdffff00fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:47 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x608, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:47 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xfffffff5, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:47 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x689, 0x5}}}}}}}, 0x0) 09:10:47 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:47 executing program 5 (fault-call:0 fault-nth:57): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:47 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x700, 0x5}}}}}}}, 0x0) [ 2185.650115][T27611] FAULT_INJECTION: forcing a failure. [ 2185.650115][T27611] name failslab, interval 1, probability 0, space 0, times 0 [ 2185.668434][T27611] CPU: 1 PID: 27611 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2185.676511][T27611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2185.686558][T27611] Call Trace: [ 2185.689846][T27611] dump_stack+0x172/0x1f0 [ 2185.694170][T27611] should_fail.cold+0xa/0x15 [ 2185.698755][T27611] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2185.704993][T27611] ? fault_create_debugfs_attr+0x180/0x180 [ 2185.710792][T27611] ? fault_create_debugfs_attr+0x180/0x180 [ 2185.716592][T27611] ? ___might_sleep+0x163/0x280 [ 2185.721441][T27611] __should_failslab+0x121/0x190 [ 2185.726372][T27611] should_failslab+0x9/0x14 [ 2185.730864][T27611] __kmalloc+0x2e0/0x770 [ 2185.735099][T27611] ? kasan_kmalloc+0x9/0x10 [ 2185.739591][T27611] ? __kmalloc+0x351/0x770 [ 2185.743999][T27611] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2185.749708][T27611] tomoyo_realpath_from_path+0xcd/0x7b0 [ 2185.755255][T27611] tomoyo_mount_acl+0x149/0x840 [ 2185.760099][T27611] ? __kasan_check_read+0x11/0x20 [ 2185.765120][T27611] ? __kasan_check_write+0x14/0x20 [ 2185.770229][T27611] ? avc_has_perm+0x376/0x600 [ 2185.774899][T27611] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 2185.780438][T27611] ? debug_check_no_obj_freed+0xc0/0x43f [ 2185.786064][T27611] ? avc_has_perm+0xcc/0x600 [ 2185.790681][T27611] ? lock_acquire+0x190/0x410 [ 2185.795346][T27611] ? tomoyo_mount_permission+0x10a/0x410 [ 2185.800971][T27611] tomoyo_mount_permission+0x16a/0x410 [ 2185.806419][T27611] ? tomoyo_mount_permission+0x10a/0x410 [ 2185.812039][T27611] ? tomoyo_mount_acl+0x840/0x840 [ 2185.817056][T27611] ? inode_has_perm+0x1b0/0x230 [ 2185.821902][T27611] ? selinux_inode_setxattr+0x8b0/0x8b0 [ 2185.827440][T27611] ? strncpy_from_user+0x2b4/0x400 [ 2185.832546][T27611] tomoyo_sb_mount+0x35/0x40 [ 2185.837130][T27611] security_sb_mount+0x87/0xd0 [ 2185.841891][T27611] do_mount+0x1d4/0x1c30 [ 2185.846130][T27611] ? retint_kernel+0x2b/0x2b [ 2185.850719][T27611] ? copy_mount_string+0x40/0x40 [ 2185.855649][T27611] ? copy_mount_options+0x252/0x3f0 [ 2185.860841][T27611] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 2185.866378][T27611] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2185.872610][T27611] ? copy_mount_options+0x2e8/0x3f0 [ 2185.877806][T27611] ksys_mount+0xdb/0x150 [ 2185.882045][T27611] __x64_sys_mount+0xbe/0x150 [ 2185.886716][T27611] do_syscall_64+0xfd/0x6a0 [ 2185.891212][T27611] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2185.897108][T27611] RIP: 0033:0x45c2ca [ 2185.900997][T27611] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2185.920589][T27611] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2185.928989][T27611] RAX: ffffffffffffffda RBX: 00007f9e2b362b40 RCX: 000000000045c2ca [ 2185.936953][T27611] RDX: 00007f9e2b362ae0 RSI: 0000000020000100 RDI: 00007f9e2b362b00 09:10:47 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x4000000, 0x0) 09:10:47 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x689, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:47 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:47 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x806, 0x5}}}}}}}, 0x0) [ 2185.944918][T27611] RBP: 0000000000000001 R08: 00007f9e2b362b40 R09: 00007f9e2b362ae0 [ 2185.952882][T27611] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2185.960861][T27611] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 2185.974950][T27611] ERROR: Out of memory at tomoyo_realpath_from_path. 09:10:47 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0xd00, 0x5}}}}}}}, 0x0) 09:10:47 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d0100000000000000000000fcfdffff00fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:47 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x700, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:47 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xf0ffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:47 executing program 5 (fault-call:0 fault-nth:58): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:47 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:47 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0xe80, 0x5}}}}}}}, 0x0) 09:10:47 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x806, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2186.249978][T27634] FAULT_INJECTION: forcing a failure. [ 2186.249978][T27634] name failslab, interval 1, probability 0, space 0, times 0 [ 2186.274696][T27634] CPU: 1 PID: 27634 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2186.282769][T27634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2186.282775][T27634] Call Trace: [ 2186.282799][T27634] dump_stack+0x172/0x1f0 [ 2186.282820][T27634] should_fail.cold+0xa/0x15 [ 2186.282839][T27634] ? fault_create_debugfs_attr+0x180/0x180 [ 2186.282852][T27634] ? page_to_nid.part.0+0x20/0x20 [ 2186.282867][T27634] ? ___might_sleep+0x163/0x280 [ 2186.282886][T27634] __should_failslab+0x121/0x190 [ 2186.282904][T27634] should_failslab+0x9/0x14 [ 2186.282923][T27634] __kmalloc_track_caller+0x2dc/0x760 [ 2186.320730][T27634] ? legacy_init_fs_context+0x48/0xe0 [ 2186.340815][T27634] ? btrfs_mount+0xdc/0x15e2 [ 2186.345389][T27634] kstrdup+0x3a/0x70 [ 2186.349263][T27634] ? btrfs_remount+0x10f0/0x10f0 [ 2186.354175][T27634] btrfs_mount+0xdc/0x15e2 [ 2186.360051][T27634] ? fs_parse+0x53c/0xf70 [ 2186.364360][T27634] ? btrfs_remount+0x10f0/0x10f0 [ 2186.369279][T27634] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2186.375499][T27634] ? cred_has_capability+0x199/0x330 [ 2186.380764][T27634] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 2186.386372][T27634] ? logfc+0x700/0x700 [ 2186.390975][T27634] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2186.397191][T27634] ? legacy_parse_param+0x116/0x880 [ 2186.402366][T27634] ? security_fs_context_parse_param+0x81/0xb0 [ 2186.408494][T27634] ? logfc+0x700/0x700 [ 2186.412540][T27634] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2186.418759][T27634] ? vfs_parse_fs_param+0xcd/0x540 [ 2186.423850][T27634] ? selinux_capable+0x36/0x40 [ 2186.428598][T27634] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2186.434813][T27634] ? btrfs_remount+0x10f0/0x10f0 [ 2186.439730][T27634] legacy_get_tree+0x108/0x220 [ 2186.444472][T27634] ? legacy_get_tree+0x108/0x220 [ 2186.449390][T27634] vfs_get_tree+0x8e/0x390 [ 2186.453783][T27634] do_mount+0x13b3/0x1c30 [ 2186.458090][T27634] ? copy_mount_string+0x40/0x40 [ 2186.463005][T27634] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2186.469221][T27634] ? copy_mount_options+0x2e8/0x3f0 [ 2186.474396][T27634] ksys_mount+0xdb/0x150 [ 2186.478615][T27634] __x64_sys_mount+0xbe/0x150 [ 2186.483275][T27634] do_syscall_64+0xfd/0x6a0 [ 2186.487759][T27634] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2186.493635][T27634] RIP: 0033:0x45c2ca [ 2186.497507][T27634] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2186.517083][T27634] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2186.525469][T27634] RAX: ffffffffffffffda RBX: 00007f9e2b362b40 RCX: 000000000045c2ca [ 2186.533418][T27634] RDX: 00007f9e2b362ae0 RSI: 0000000020000100 RDI: 00007f9e2b362b00 [ 2186.541378][T27634] RBP: 0000000000000001 R08: 00007f9e2b362b40 R09: 00007f9e2b362ae0 [ 2186.549325][T27634] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2186.557274][T27634] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:48 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x5000000, 0x0) 09:10:48 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:48 executing program 5 (fault-call:0 fault-nth:59): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:48 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x1100, 0x5}}}}}}}, 0x0) 09:10:48 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0xa00, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2186.816619][T27653] FAULT_INJECTION: forcing a failure. [ 2186.816619][T27653] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2186.829839][T27653] CPU: 0 PID: 27653 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2186.837896][T27653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2186.847944][T27653] Call Trace: [ 2186.851240][T27653] dump_stack+0x172/0x1f0 [ 2186.855579][T27653] should_fail.cold+0xa/0x15 [ 2186.860172][T27653] ? __kmalloc+0x163/0x770 09:10:48 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d0100000000000000000000fdfdffff00fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:48 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x300000000000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:48 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x2800, 0x5}}}}}}}, 0x0) 09:10:48 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0xd00, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:48 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x3580, 0x5}}}}}}}, 0x0) [ 2186.864600][T27653] ? fault_create_debugfs_attr+0x180/0x180 [ 2186.870406][T27653] ? do_mount+0x1d4/0x1c30 [ 2186.874823][T27653] ? ksys_mount+0xdb/0x150 [ 2186.879239][T27653] ? __x64_sys_mount+0xbe/0x150 [ 2186.884085][T27653] ? do_syscall_64+0xfd/0x6a0 [ 2186.888756][T27653] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2186.894828][T27653] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2186.900540][T27653] ? bpf_prog_kallsyms_find+0x50/0x2c0 [ 2186.906010][T27653] should_fail_alloc_page+0x50/0x60 [ 2186.911209][T27653] __alloc_pages_nodemask+0x1a1/0x900 09:10:48 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0xe80, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:48 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2186.916581][T27653] ? kernel_text_address+0x73/0xf0 [ 2186.921701][T27653] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2186.927419][T27653] ? unwind_get_return_address+0x61/0xa0 [ 2186.933052][T27653] ? profile_setup.cold+0xbb/0xbb [ 2186.938079][T27653] ? should_fail+0x1de/0x852 [ 2186.942673][T27653] ? fault_create_debugfs_attr+0x180/0x180 [ 2186.948475][T27653] cache_grow_begin+0x90/0xd20 [ 2186.953231][T27653] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2186.958949][T27653] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2186.965196][T27653] __kmalloc+0x6b2/0x770 [ 2186.969432][T27653] ? kasan_kmalloc+0x9/0x10 [ 2186.974015][T27653] ? __kmalloc+0x351/0x770 [ 2186.978427][T27653] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2186.984141][T27653] tomoyo_realpath_from_path+0xcd/0x7b0 [ 2186.989686][T27653] tomoyo_mount_acl+0x149/0x840 [ 2186.994539][T27653] ? __kasan_check_read+0x11/0x20 [ 2186.999566][T27653] ? __kasan_check_write+0x14/0x20 [ 2187.004677][T27653] ? avc_has_perm+0x376/0x600 [ 2187.009354][T27653] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 2187.014897][T27653] ? debug_check_no_obj_freed+0xc0/0x43f [ 2187.020534][T27653] ? avc_has_perm+0xcc/0x600 [ 2187.025140][T27653] ? lock_acquire+0x190/0x410 [ 2187.029819][T27653] ? tomoyo_mount_permission+0x10a/0x410 [ 2187.035450][T27653] tomoyo_mount_permission+0x16a/0x410 [ 2187.040901][T27653] ? tomoyo_mount_permission+0x10a/0x410 [ 2187.046529][T27653] ? tomoyo_mount_acl+0x840/0x840 [ 2187.051554][T27653] ? inode_has_perm+0x1b0/0x230 [ 2187.056409][T27653] ? selinux_inode_setxattr+0x8b0/0x8b0 [ 2187.061951][T27653] ? strncpy_from_user+0x2b4/0x400 [ 2187.067057][T27653] tomoyo_sb_mount+0x35/0x40 [ 2187.071643][T27653] security_sb_mount+0x87/0xd0 [ 2187.076405][T27653] do_mount+0x1d4/0x1c30 [ 2187.080646][T27653] ? __this_cpu_preempt_check+0x3a/0x210 [ 2187.086275][T27653] ? retint_kernel+0x2b/0x2b [ 2187.090864][T27653] ? copy_mount_string+0x40/0x40 [ 2187.095798][T27653] ? copy_mount_options+0x263/0x3f0 [ 2187.100991][T27653] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2187.107224][T27653] ? copy_mount_options+0x2e8/0x3f0 [ 2187.112424][T27653] ksys_mount+0xdb/0x150 [ 2187.116663][T27653] __x64_sys_mount+0xbe/0x150 [ 2187.121343][T27653] do_syscall_64+0xfd/0x6a0 [ 2187.125846][T27653] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2187.131732][T27653] RIP: 0033:0x45c2ca [ 2187.135626][T27653] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2187.155220][T27653] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2187.163623][T27653] RAX: ffffffffffffffda RBX: 00007f9e2b362b40 RCX: 000000000045c2ca [ 2187.171584][T27653] RDX: 00007f9e2b362ae0 RSI: 0000000020000100 RDI: 00007f9e2b362b00 [ 2187.179548][T27653] RBP: 0000000000000001 R08: 00007f9e2b362b40 R09: 00007f9e2b362ae0 [ 2187.187511][T27653] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2187.195475][T27653] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x6000000, 0x0) 09:10:49 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x500000000000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:49 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x3f00, 0x5}}}}}}}, 0x0) 09:10:49 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x1100, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:49 executing program 5 (fault-call:0 fault-nth:60): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2187.482039][T27683] FAULT_INJECTION: forcing a failure. [ 2187.482039][T27683] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2187.495250][T27683] CPU: 1 PID: 27683 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2187.495258][T27683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2187.495263][T27683] Call Trace: [ 2187.495285][T27683] dump_stack+0x172/0x1f0 [ 2187.495305][T27683] should_fail.cold+0xa/0x15 [ 2187.495321][T27683] ? fault_create_debugfs_attr+0x180/0x180 [ 2187.495338][T27683] ? tomoyo_mount_acl+0x149/0x840 [ 2187.513450][T27683] ? tomoyo_mount_permission+0x16a/0x410 [ 2187.513461][T27683] ? tomoyo_sb_mount+0x35/0x40 [ 2187.513474][T27683] ? security_sb_mount+0x87/0xd0 [ 2187.513492][T27683] ? do_mount+0x1d4/0x1c30 [ 2187.556077][T27683] ? ksys_mount+0xdb/0x150 [ 2187.560489][T27683] ? __x64_sys_mount+0xbe/0x150 [ 2187.565341][T27683] ? do_syscall_64+0xfd/0x6a0 [ 2187.570018][T27683] should_fail_alloc_page+0x50/0x60 [ 2187.575209][T27683] __alloc_pages_nodemask+0x1a1/0x900 [ 2187.580583][T27683] ? __kasan_check_read+0x11/0x20 [ 2187.585603][T27683] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2187.591311][T27683] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2187.596933][T27683] ? __kasan_check_read+0x11/0x20 [ 2187.601954][T27683] ? fault_create_debugfs_attr+0x180/0x180 [ 2187.607758][T27683] cache_grow_begin+0x90/0xd20 [ 2187.612520][T27683] ? getname_kernel+0x53/0x370 [ 2187.617286][T27683] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2187.623518][T27683] kmem_cache_alloc+0x64e/0x710 [ 2187.628366][T27683] getname_kernel+0x53/0x370 [ 2187.632954][T27683] kern_path+0x20/0x40 [ 2187.637027][T27683] tomoyo_mount_acl+0x28c/0x840 [ 2187.641869][T27683] ? __kasan_check_read+0x11/0x20 [ 2187.647152][T27683] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 2187.652691][T27683] ? debug_check_no_obj_freed+0xc0/0x43f [ 2187.658318][T27683] ? avc_has_perm+0xcc/0x600 [ 2187.662916][T27683] ? lock_acquire+0x190/0x410 [ 2187.667584][T27683] ? tomoyo_mount_permission+0x10a/0x410 [ 2187.673215][T27683] tomoyo_mount_permission+0x16a/0x410 [ 2187.678664][T27683] ? tomoyo_mount_permission+0x10a/0x410 [ 2187.684376][T27683] ? tomoyo_mount_acl+0x840/0x840 [ 2187.689394][T27683] ? inode_has_perm+0x1b0/0x230 [ 2187.694242][T27683] ? selinux_inode_setxattr+0x8b0/0x8b0 [ 2187.699781][T27683] ? strncpy_from_user+0x2b4/0x400 [ 2187.704889][T27683] tomoyo_sb_mount+0x35/0x40 [ 2187.709476][T27683] security_sb_mount+0x87/0xd0 [ 2187.714236][T27683] do_mount+0x1d4/0x1c30 [ 2187.718470][T27683] ? kasan_kmalloc+0x9/0x10 [ 2187.722966][T27683] ? copy_mount_string+0x40/0x40 [ 2187.727907][T27683] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2187.734139][T27683] ? copy_mount_options+0x2e8/0x3f0 [ 2187.739332][T27683] ksys_mount+0xdb/0x150 [ 2187.743569][T27683] __x64_sys_mount+0xbe/0x150 [ 2187.748247][T27683] do_syscall_64+0xfd/0x6a0 [ 2187.752748][T27683] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2187.758637][T27683] RIP: 0033:0x45c2ca [ 2187.762524][T27683] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2187.782119][T27683] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2187.790523][T27683] RAX: ffffffffffffffda RBX: 00007f9e2b362b40 RCX: 000000000045c2ca [ 2187.798489][T27683] RDX: 00007f9e2b362ae0 RSI: 0000000020000100 RDI: 00007f9e2b362b00 [ 2187.806537][T27683] RBP: 0000000000000001 R08: 00007f9e2b362b40 R09: 00007f9e2b362ae0 [ 2187.814494][T27683] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2187.822466][T27683] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:49 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000008cffffff00fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:49 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x600000000000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:49 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x4000, 0x5}}}}}}}, 0x0) 09:10:49 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x2800, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:49 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x700000000000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:49 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x4305, 0x5}}}}}}}, 0x0) 09:10:49 executing program 5 (fault-call:0 fault-nth:61): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:49 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x7000000, 0x0) 09:10:49 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x3580, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:49 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:49 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x4788, 0x5}}}}}}}, 0x0) [ 2188.112547][T27708] FAULT_INJECTION: forcing a failure. [ 2188.112547][T27708] name failslab, interval 1, probability 0, space 0, times 0 [ 2188.125284][T27708] CPU: 0 PID: 27708 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2188.125293][T27708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2188.125297][T27708] Call Trace: [ 2188.125319][T27708] dump_stack+0x172/0x1f0 [ 2188.125338][T27708] should_fail.cold+0xa/0x15 [ 2188.125354][T27708] ? __x64_sys_mount+0xbe/0x150 09:10:49 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x806000000000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2188.125370][T27708] ? fault_create_debugfs_attr+0x180/0x180 [ 2188.125383][T27708] ? page_to_nid.part.0+0x20/0x20 [ 2188.125398][T27708] ? ___might_sleep+0x163/0x280 [ 2188.125414][T27708] __should_failslab+0x121/0x190 [ 2188.125430][T27708] should_failslab+0x9/0x14 [ 2188.125442][T27708] kmem_cache_alloc_trace+0x2d3/0x790 [ 2188.125453][T27708] ? debug_check_no_obj_freed+0xc0/0x43f [ 2188.125472][T27708] alloc_fs_context+0x5a/0x6c0 [ 2188.125489][T27708] fs_context_for_mount+0x25/0x30 [ 2188.125503][T27708] vfs_kern_mount.part.0+0x28/0xf0 [ 2188.125518][T27708] vfs_kern_mount+0x40/0x60 [ 2188.125532][T27708] btrfs_mount+0x2b4/0x15e2 [ 2188.125547][T27708] ? fs_parse+0x53c/0xf70 [ 2188.125565][T27708] ? btrfs_remount+0x10f0/0x10f0 [ 2188.125579][T27708] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2188.125593][T27708] ? cred_has_capability+0x199/0x330 [ 2188.125607][T27708] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 2188.125620][T27708] ? logfc+0x700/0x700 [ 2188.125633][T27708] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2188.125646][T27708] ? legacy_parse_param+0x116/0x880 [ 2188.125661][T27708] ? security_fs_context_parse_param+0x81/0xb0 [ 2188.125673][T27708] ? logfc+0x700/0x700 [ 2188.125687][T27708] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2188.125699][T27708] ? vfs_parse_fs_param+0xcd/0x540 [ 2188.125717][T27708] ? selinux_capable+0x36/0x40 [ 2188.155980][T27708] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2188.156000][T27708] ? btrfs_remount+0x10f0/0x10f0 [ 2188.307253][T27708] legacy_get_tree+0x108/0x220 [ 2188.312018][T27708] ? legacy_get_tree+0x108/0x220 [ 2188.316962][T27708] vfs_get_tree+0x8e/0x390 [ 2188.321381][T27708] do_mount+0x13b3/0x1c30 [ 2188.325713][T27708] ? copy_mount_string+0x40/0x40 [ 2188.330649][T27708] ? __sanitizer_cov_trace_const_cmp8+0x1/0x20 [ 2188.336799][T27708] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2188.343042][T27708] ? copy_mount_options+0x2e8/0x3f0 [ 2188.348247][T27708] ksys_mount+0xdb/0x150 [ 2188.352491][T27708] __x64_sys_mount+0xbe/0x150 [ 2188.357586][T27708] do_syscall_64+0xfd/0x6a0 [ 2188.362092][T27708] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2188.367978][T27708] RIP: 0033:0x45c2ca [ 2188.371867][T27708] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2188.391692][T27708] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2188.400099][T27708] RAX: ffffffffffffffda RBX: 00007f9e2b362b40 RCX: 000000000045c2ca [ 2188.408064][T27708] RDX: 00007f9e2b362ae0 RSI: 0000000020000100 RDI: 00007f9e2b362b00 [ 2188.416029][T27708] RBP: 0000000000000001 R08: 00007f9e2b362b40 R09: 00007f9e2b362ae0 [ 2188.423991][T27708] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2188.432061][T27708] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:50 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d0100000000000000000000f4ffffff00fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:50 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x900000000000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:50 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x4888, 0x5}}}}}}}, 0x0) 09:10:50 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x3c00, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:50 executing program 5 (fault-call:0 fault-nth:62): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2188.763626][T27727] FAULT_INJECTION: forcing a failure. [ 2188.763626][T27727] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2188.776846][T27727] CPU: 1 PID: 27727 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2188.784902][T27727] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2188.794948][T27727] Call Trace: [ 2188.798237][T27727] dump_stack+0x172/0x1f0 [ 2188.802564][T27727] should_fail.cold+0xa/0x15 [ 2188.807155][T27727] ? fault_create_debugfs_attr+0x180/0x180 [ 2188.812953][T27727] ? tomoyo_mount_acl+0x149/0x840 [ 2188.817973][T27727] ? tomoyo_mount_permission+0x16a/0x410 [ 2188.823601][T27727] ? tomoyo_sb_mount+0x35/0x40 [ 2188.828361][T27727] ? security_sb_mount+0x87/0xd0 [ 2188.833295][T27727] ? do_mount+0x1d4/0x1c30 [ 2188.837706][T27727] ? ksys_mount+0xdb/0x150 [ 2188.842114][T27727] ? __x64_sys_mount+0xbe/0x150 [ 2188.846960][T27727] ? do_syscall_64+0xfd/0x6a0 [ 2188.851652][T27727] should_fail_alloc_page+0x50/0x60 [ 2188.856860][T27727] __alloc_pages_nodemask+0x1a1/0x900 [ 2188.862233][T27727] ? __kasan_check_read+0x11/0x20 [ 2188.867264][T27727] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2188.872978][T27727] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2188.878607][T27727] ? __kasan_check_read+0x11/0x20 [ 2188.883633][T27727] ? fault_create_debugfs_attr+0x180/0x180 [ 2188.889439][T27727] cache_grow_begin+0x90/0xd20 [ 2188.894201][T27727] ? getname_kernel+0x53/0x370 [ 2188.898963][T27727] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2188.905196][T27727] kmem_cache_alloc+0x64e/0x710 [ 2188.910047][T27727] getname_kernel+0x53/0x370 [ 2188.914635][T27727] kern_path+0x20/0x40 [ 2188.918700][T27727] tomoyo_mount_acl+0x28c/0x840 [ 2188.923545][T27727] ? __kasan_check_read+0x11/0x20 [ 2188.928575][T27727] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 2188.934203][T27727] ? debug_check_no_obj_freed+0xc0/0x43f [ 2188.939831][T27727] ? avc_has_perm+0xcc/0x600 [ 2188.944430][T27727] ? lock_acquire+0x190/0x410 [ 2188.949102][T27727] ? tomoyo_mount_permission+0x10a/0x410 [ 2188.954735][T27727] tomoyo_mount_permission+0x16a/0x410 [ 2188.960185][T27727] ? tomoyo_mount_permission+0x10a/0x410 [ 2188.965812][T27727] ? tomoyo_mount_acl+0x840/0x840 [ 2188.970834][T27727] ? inode_has_perm+0x1b0/0x230 [ 2188.975687][T27727] ? selinux_inode_setxattr+0x8b0/0x8b0 [ 2188.981226][T27727] ? strncpy_from_user+0x2b4/0x400 [ 2188.986334][T27727] tomoyo_sb_mount+0x35/0x40 [ 2188.990921][T27727] security_sb_mount+0x87/0xd0 [ 2188.995683][T27727] do_mount+0x1d4/0x1c30 [ 2188.999922][T27727] ? kasan_kmalloc+0x9/0x10 [ 2189.004418][T27727] ? copy_mount_string+0x40/0x40 [ 2189.009357][T27727] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2189.015595][T27727] ? copy_mount_options+0x2e8/0x3f0 [ 2189.020789][T27727] ksys_mount+0xdb/0x150 [ 2189.025027][T27727] __x64_sys_mount+0xbe/0x150 [ 2189.029702][T27727] do_syscall_64+0xfd/0x6a0 [ 2189.034203][T27727] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2189.040084][T27727] RIP: 0033:0x45c2ca [ 2189.043980][T27727] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 09:10:50 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x6000, 0x5}}}}}}}, 0x0) 09:10:50 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xa00000000000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2189.063575][T27727] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2189.071979][T27727] RAX: ffffffffffffffda RBX: 00007f9e2b362b40 RCX: 000000000045c2ca [ 2189.079941][T27727] RDX: 00007f9e2b362ae0 RSI: 0000000020000100 RDI: 00007f9e2b362b00 [ 2189.087904][T27727] RBP: 0000000000000001 R08: 00007f9e2b362b40 R09: 00007f9e2b362ae0 [ 2189.095865][T27727] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2189.103826][T27727] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:50 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x8000000, 0x0) 09:10:50 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x3f00, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:50 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xd00000000000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:50 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x4000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:50 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x6488, 0x5}}}}}}}, 0x0) [ 2189.237367][ C0] net_ratelimit: 24 callbacks suppressed [ 2189.237374][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2189.248829][ C0] protocol 88fb is buggy, dev hsr_slave_1 09:10:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d0100000000000000000000f5ffffff00fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:51 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:51 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x4305, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:51 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x9000000, 0x0) 09:10:51 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x800e, 0x5}}}}}}}, 0x0) 09:10:51 executing program 5 (fault-call:0 fault-nth:63): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2189.452056][T27763] FAULT_INJECTION: forcing a failure. [ 2189.452056][T27763] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2189.465272][T27763] CPU: 0 PID: 27763 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2189.473398][T27763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2189.483428][T27763] Call Trace: [ 2189.486722][T27763] dump_stack+0x172/0x1f0 [ 2189.491035][T27763] should_fail.cold+0xa/0x15 [ 2189.495608][T27763] ? fault_create_debugfs_attr+0x180/0x180 [ 2189.501397][T27763] ? quarantine_put+0x11c/0x1c0 [ 2189.506227][T27763] should_fail_alloc_page+0x50/0x60 [ 2189.511399][T27763] __alloc_pages_nodemask+0x1a1/0x900 [ 2189.516750][T27763] ? putname+0xef/0x130 [ 2189.520884][T27763] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2189.526755][T27763] ? filename_lookup+0x294/0x410 [ 2189.531670][T27763] ? fault_create_debugfs_attr+0x180/0x180 [ 2189.537451][T27763] ? nd_jump_link+0x1d0/0x1d0 [ 2189.542112][T27763] cache_grow_begin+0x90/0xd20 [ 2189.546857][T27763] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2189.552554][T27763] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2189.558768][T27763] __kmalloc+0x6b2/0x770 [ 2189.562986][T27763] ? kmem_cache_alloc+0x314/0x710 [ 2189.567987][T27763] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 2189.573682][T27763] tomoyo_realpath_from_path+0xcd/0x7b0 [ 2189.579208][T27763] tomoyo_mount_acl+0x2cc/0x840 [ 2189.584032][T27763] ? __kasan_check_read+0x11/0x20 [ 2189.589037][T27763] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 2189.594561][T27763] ? debug_check_no_obj_freed+0xc0/0x43f [ 2189.600171][T27763] ? avc_has_perm+0xcc/0x600 [ 2189.604744][T27763] ? lock_acquire+0x190/0x410 [ 2189.609396][T27763] ? tomoyo_mount_permission+0x10a/0x410 [ 2189.615003][T27763] tomoyo_mount_permission+0x16a/0x410 [ 2189.620453][T27763] ? tomoyo_mount_permission+0x10a/0x410 [ 2189.626057][T27763] ? tomoyo_mount_acl+0x840/0x840 [ 2189.631061][T27763] ? inode_has_perm+0x1b0/0x230 [ 2189.635907][T27763] ? selinux_inode_setxattr+0x8b0/0x8b0 [ 2189.641431][T27763] ? strncpy_from_user+0x2b4/0x400 [ 2189.646539][T27763] tomoyo_sb_mount+0x35/0x40 [ 2189.651112][T27763] security_sb_mount+0x87/0xd0 [ 2189.655858][T27763] do_mount+0x1d4/0x1c30 [ 2189.660076][T27763] ? retint_kernel+0x2b/0x2b [ 2189.664646][T27763] ? copy_mount_string+0x40/0x40 [ 2189.669559][T27763] ? copy_mount_options+0x263/0x3f0 [ 2189.674736][T27763] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2189.680950][T27763] ? copy_mount_options+0x2e8/0x3f0 [ 2189.686125][T27763] ksys_mount+0xdb/0x150 [ 2189.690347][T27763] __x64_sys_mount+0xbe/0x150 [ 2189.695000][T27763] do_syscall_64+0xfd/0x6a0 [ 2189.699483][T27763] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2189.705352][T27763] RIP: 0033:0x45c2ca [ 2189.709241][T27763] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2189.728820][T27763] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2189.737212][T27763] RAX: ffffffffffffffda RBX: 00007f9e2b362b40 RCX: 000000000045c2ca [ 2189.745159][T27763] RDX: 00007f9e2b362ae0 RSI: 0000000020000100 RDI: 00007f9e2b362b00 09:10:51 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x8035, 0x5}}}}}}}, 0x0) 09:10:51 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x1100000000000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2189.753107][T27763] RBP: 0000000000000001 R08: 00007f9e2b362b40 R09: 00007f9e2b362ae0 [ 2189.761062][T27763] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2189.769009][T27763] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:51 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x4788, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:51 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x2800000000000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:51 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x8100, 0x5}}}}}}}, 0x0) 09:10:51 executing program 5 (fault-call:0 fault-nth:64): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2189.990088][T27787] FAULT_INJECTION: forcing a failure. [ 2189.990088][T27787] name failslab, interval 1, probability 0, space 0, times 0 [ 2190.007616][T27787] CPU: 0 PID: 27787 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2190.015692][T27787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2190.025737][T27787] Call Trace: [ 2190.029029][T27787] dump_stack+0x172/0x1f0 [ 2190.033364][T27787] should_fail.cold+0xa/0x15 [ 2190.037956][T27787] ? cred_has_capability+0x199/0x330 [ 2190.043242][T27787] ? fault_create_debugfs_attr+0x180/0x180 [ 2190.049042][T27787] ? page_to_nid.part.0+0x20/0x20 [ 2190.054068][T27787] ? ___might_sleep+0x163/0x280 [ 2190.058920][T27787] __should_failslab+0x121/0x190 [ 2190.063857][T27787] should_failslab+0x9/0x14 [ 2190.068353][T27787] kmem_cache_alloc_trace+0x2d3/0x790 [ 2190.073713][T27787] ? __get_fs_type+0x23/0xd0 [ 2190.078315][T27787] alloc_fs_context+0x5a/0x6c0 [ 2190.083079][T27787] fs_context_for_mount+0x25/0x30 [ 2190.088099][T27787] do_mount+0x132d/0x1c30 [ 2190.092428][T27787] ? copy_mount_string+0x40/0x40 [ 2190.097365][T27787] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2190.103599][T27787] ? copy_mount_options+0x2e8/0x3f0 [ 2190.108795][T27787] ksys_mount+0xdb/0x150 [ 2190.113031][T27787] __x64_sys_mount+0xbe/0x150 [ 2190.117711][T27787] do_syscall_64+0xfd/0x6a0 [ 2190.122210][T27787] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2190.128092][T27787] RIP: 0033:0x45c2ca [ 2190.131983][T27787] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2190.151663][T27787] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2190.160072][T27787] RAX: ffffffffffffffda RBX: 00007f9e2b362b40 RCX: 000000000045c2ca [ 2190.168035][T27787] RDX: 00007f9e2b362ae0 RSI: 0000000020000100 RDI: 00007f9e2b362b00 [ 2190.176000][T27787] RBP: 0000000000000001 R08: 00007f9e2b362b40 R09: 00007f9e2b362ae0 09:10:51 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d0100000000000000000000f6ffffff00fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:51 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3c00000000000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:51 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xa000000, 0x0) 09:10:51 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x8847, 0x5}}}}}}}, 0x0) 09:10:51 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x4888, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2190.183973][T27787] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2190.193418][T27787] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 2190.197424][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2190.207122][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2190.212952][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2190.218696][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:10:52 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:52 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x8848, 0x5}}}}}}}, 0x0) 09:10:52 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x6488, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:52 executing program 5 (fault-call:0 fault-nth:65): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:52 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:52 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x800e, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:52 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x8864, 0x5}}}}}}}, 0x0) [ 2190.435490][T27812] FAULT_INJECTION: forcing a failure. [ 2190.435490][T27812] name failslab, interval 1, probability 0, space 0, times 0 [ 2190.451752][T27812] CPU: 0 PID: 27812 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2190.459823][T27812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2190.459828][T27812] Call Trace: [ 2190.459852][T27812] dump_stack+0x172/0x1f0 [ 2190.459875][T27812] should_fail.cold+0xa/0x15 [ 2190.473184][T27812] ? legacy_get_tree+0x108/0x220 [ 2190.488459][T27812] ? fault_create_debugfs_attr+0x180/0x180 [ 2190.494258][T27812] ? page_to_nid.part.0+0x20/0x20 [ 2190.499278][T27812] ? ___might_sleep+0x163/0x280 [ 2190.504125][T27812] __should_failslab+0x121/0x190 [ 2190.509062][T27812] should_failslab+0x9/0x14 [ 2190.513555][T27812] __kmalloc_track_caller+0x2dc/0x760 [ 2190.518922][T27812] ? kasan_unpoison_shadow+0x35/0x50 [ 2190.524208][T27812] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2190.530008][T27812] ? vfs_parse_fs_string+0xe8/0x170 [ 2190.535216][T27812] kmemdup_nul+0x31/0xa0 [ 2190.539452][T27812] vfs_parse_fs_string+0xe8/0x170 [ 2190.544469][T27812] ? vfs_parse_fs_param+0x540/0x540 [ 2190.549670][T27812] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2190.555902][T27812] ? alloc_fs_context+0x422/0x6c0 [ 2190.560931][T27812] vfs_kern_mount.part.0+0x73/0xf0 [ 2190.566035][T27812] vfs_kern_mount+0x40/0x60 [ 2190.570531][T27812] btrfs_mount+0x2b4/0x15e2 [ 2190.575031][T27812] ? fs_parse+0x53c/0xf70 [ 2190.579357][T27812] ? btrfs_remount+0x10f0/0x10f0 [ 2190.584284][T27812] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2190.590516][T27812] ? cred_has_capability+0x199/0x330 [ 2190.595800][T27812] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 2190.601426][T27812] ? logfc+0x700/0x700 [ 2190.605487][T27812] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2190.611732][T27812] ? legacy_parse_param+0x116/0x880 [ 2190.616928][T27812] ? security_fs_context_parse_param+0x81/0xb0 [ 2190.623073][T27812] ? logfc+0x700/0x700 [ 2190.627133][T27812] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2190.633362][T27812] ? vfs_parse_fs_param+0xcd/0x540 [ 2190.638467][T27812] ? selinux_capable+0x36/0x40 [ 2190.643227][T27812] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2190.649464][T27812] ? btrfs_remount+0x10f0/0x10f0 [ 2190.654392][T27812] legacy_get_tree+0x108/0x220 [ 2190.659152][T27812] ? legacy_get_tree+0x108/0x220 [ 2190.664089][T27812] vfs_get_tree+0x8e/0x390 [ 2190.668500][T27812] do_mount+0x13b3/0x1c30 [ 2190.672827][T27812] ? __this_cpu_preempt_check+0x3a/0x210 [ 2190.677363][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2190.678455][T27812] ? copy_mount_string+0x40/0x40 [ 2190.684173][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2190.689059][T27812] ? copy_mount_options+0x263/0x3f0 [ 2190.689077][T27812] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2190.706154][T27812] ? copy_mount_options+0x2e8/0x3f0 [ 2190.711348][T27812] ksys_mount+0xdb/0x150 [ 2190.715588][T27812] __x64_sys_mount+0xbe/0x150 [ 2190.720262][T27812] do_syscall_64+0xfd/0x6a0 [ 2190.724763][T27812] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2190.730646][T27812] RIP: 0033:0x45c2ca [ 2190.734536][T27812] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2190.754132][T27812] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2190.762535][T27812] RAX: ffffffffffffffda RBX: 00007f9e2b362b40 RCX: 000000000045c2ca [ 2190.770498][T27812] RDX: 00007f9e2b362ae0 RSI: 0000000020000100 RDI: 00007f9e2b362b00 [ 2190.778458][T27812] RBP: 0000000000000001 R08: 00007f9e2b362b40 R09: 00007f9e2b362ae0 [ 2190.786416][T27812] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2190.794376][T27812] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 2190.802591][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2190.808369][ C0] protocol 88fb is buggy, dev hsr_slave_1 09:10:52 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d0100000000000000000000fbffffff00fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:52 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x4305000000000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:52 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x8906, 0x5}}}}}}}, 0x0) 09:10:52 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x8035, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:52 executing program 5 (fault-call:0 fault-nth:66): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:52 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xb000000, 0x0) 09:10:52 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0xb200, 0x5}}}}}}}, 0x0) [ 2191.105982][T27826] FAULT_INJECTION: forcing a failure. [ 2191.105982][T27826] name failslab, interval 1, probability 0, space 0, times 0 [ 2191.132671][T27826] CPU: 0 PID: 27826 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2191.140752][T27826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2191.150802][T27826] Call Trace: [ 2191.154102][T27826] dump_stack+0x172/0x1f0 [ 2191.158432][T27826] should_fail.cold+0xa/0x15 [ 2191.163019][T27826] ? __kasan_check_read+0x11/0x20 [ 2191.168047][T27826] ? fault_create_debugfs_attr+0x180/0x180 [ 2191.173852][T27826] ? page_to_nid.part.0+0x20/0x20 [ 2191.178875][T27826] ? ___might_sleep+0x163/0x280 [ 2191.183726][T27826] __should_failslab+0x121/0x190 [ 2191.188662][T27826] should_failslab+0x9/0x14 [ 2191.193170][T27826] kmem_cache_alloc_trace+0x2d3/0x790 [ 2191.198533][T27826] ? lockdep_init_map+0x1be/0x6d0 [ 2191.203553][T27826] legacy_init_fs_context+0x48/0xe0 [ 2191.208748][T27826] ? generic_parse_monolithic+0x200/0x200 [ 2191.214464][T27826] alloc_fs_context+0x3d1/0x6c0 [ 2191.219343][T27826] fs_context_for_mount+0x25/0x30 [ 2191.224361][T27826] vfs_kern_mount.part.0+0x28/0xf0 [ 2191.229463][T27826] vfs_kern_mount+0x40/0x60 [ 2191.233968][T27826] btrfs_mount+0x2b4/0x15e2 [ 2191.238470][T27826] ? fs_parse+0x53c/0xf70 [ 2191.242797][T27826] ? btrfs_remount+0x10f0/0x10f0 [ 2191.247727][T27826] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2191.253964][T27826] ? cred_has_capability+0x199/0x330 [ 2191.259243][T27826] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 2191.264868][T27826] ? logfc+0x700/0x700 [ 2191.268931][T27826] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2191.275168][T27826] ? legacy_parse_param+0x116/0x880 [ 2191.280364][T27826] ? security_fs_context_parse_param+0x81/0xb0 [ 2191.286513][T27826] ? logfc+0x700/0x700 [ 2191.290579][T27826] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2191.296815][T27826] ? vfs_parse_fs_param+0xcd/0x540 [ 2191.301922][T27826] ? selinux_capable+0x36/0x40 [ 2191.306691][T27826] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2191.312928][T27826] ? btrfs_remount+0x10f0/0x10f0 [ 2191.317865][T27826] legacy_get_tree+0x108/0x220 [ 2191.322627][T27826] ? legacy_get_tree+0x108/0x220 [ 2191.327561][T27826] vfs_get_tree+0x8e/0x390 [ 2191.331971][T27826] do_mount+0x13b3/0x1c30 [ 2191.336299][T27826] ? copy_mount_string+0x40/0x40 [ 2191.341240][T27826] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2191.347477][T27826] ? copy_mount_options+0x2e8/0x3f0 [ 2191.352671][T27826] ksys_mount+0xdb/0x150 [ 2191.356915][T27826] __x64_sys_mount+0xbe/0x150 [ 2191.361592][T27826] do_syscall_64+0xfd/0x6a0 [ 2191.366095][T27826] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2191.371977][T27826] RIP: 0033:0x45c2ca [ 2191.375885][T27826] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2191.395480][T27826] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 09:10:53 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x4400000000000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:53 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x8100, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2191.403888][T27826] RAX: ffffffffffffffda RBX: 00007f9e2b362b40 RCX: 000000000045c2ca [ 2191.411852][T27826] RDX: 00007f9e2b362ae0 RSI: 0000000020000100 RDI: 00007f9e2b362b00 [ 2191.419815][T27826] RBP: 0000000000000001 R08: 00007f9e2b362b40 R09: 00007f9e2b362ae0 [ 2191.427780][T27826] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2191.435746][T27826] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:53 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x800e000000000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:53 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0xf000, 0x5}}}}}}}, 0x0) 09:10:53 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x8847, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:53 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000002000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:53 executing program 5 (fault-call:0 fault-nth:67): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:53 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8035000000000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:53 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0xff00, 0x5}}}}}}}, 0x0) 09:10:53 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x8848, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:53 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x10000000, 0x0) 09:10:53 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8100000000000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:53 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0xf0ffff, 0x5}}}}}}}, 0x0) [ 2191.812905][T27856] FAULT_INJECTION: forcing a failure. [ 2191.812905][T27856] name failslab, interval 1, probability 0, space 0, times 0 [ 2191.873495][T27856] CPU: 0 PID: 27856 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2191.881589][T27856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2191.891641][T27856] Call Trace: [ 2191.894934][T27856] dump_stack+0x172/0x1f0 [ 2191.899354][T27856] should_fail.cold+0xa/0x15 [ 2191.903947][T27856] ? fault_create_debugfs_attr+0x180/0x180 [ 2191.909750][T27856] ? page_to_nid.part.0+0x20/0x20 [ 2191.914775][T27856] ? ___might_sleep+0x163/0x280 [ 2191.919626][T27856] __should_failslab+0x121/0x190 [ 2191.924570][T27856] should_failslab+0x9/0x14 [ 2191.929082][T27856] __kmalloc_track_caller+0x2dc/0x760 [ 2191.934456][T27856] ? kasan_unpoison_shadow+0x35/0x50 [ 2191.939822][T27856] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2191.945620][T27856] ? vfs_parse_fs_string+0xe8/0x170 [ 2191.950817][T27856] kmemdup_nul+0x31/0xa0 [ 2191.955054][T27856] vfs_parse_fs_string+0xe8/0x170 [ 2191.960075][T27856] ? vfs_parse_fs_param+0x540/0x540 [ 2191.965272][T27856] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2191.971505][T27856] ? alloc_fs_context+0x422/0x6c0 [ 2191.976529][T27856] do_mount+0x700/0x1c30 [ 2191.980768][T27856] ? copy_mount_string+0x40/0x40 [ 2191.985708][T27856] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2191.991942][T27856] ? copy_mount_options+0x2e8/0x3f0 [ 2191.997138][T27856] ksys_mount+0xdb/0x150 [ 2192.001375][T27856] __x64_sys_mount+0xbe/0x150 [ 2192.006049][T27856] do_syscall_64+0xfd/0x6a0 [ 2192.010550][T27856] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2192.016431][T27856] RIP: 0033:0x45c2ca [ 2192.020325][T27856] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2192.039921][T27856] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2192.048329][T27856] RAX: ffffffffffffffda RBX: 00007f9e2b362b40 RCX: 000000000045c2ca [ 2192.056294][T27856] RDX: 00007f9e2b362ae0 RSI: 0000000020000100 RDI: 00007f9e2b362b00 [ 2192.064260][T27856] RBP: 0000000000000001 R08: 00007f9e2b362b40 R09: 00007f9e2b362ae0 09:10:53 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x8864, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2192.072224][T27856] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2192.080190][T27856] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:53 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x1000000, 0x5}}}}}}}, 0x0) 09:10:53 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x86ddffff00000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2192.147805][T27862] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop4 09:10:53 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x8906, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000003000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:54 executing program 5 (fault-call:0 fault-nth:68): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:54 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8847000000000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:54 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x2000000, 0x5}}}}}}}, 0x0) 09:10:54 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0xb200, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2192.368439][T27886] FAULT_INJECTION: forcing a failure. [ 2192.368439][T27886] name failslab, interval 1, probability 0, space 0, times 0 [ 2192.381747][T27886] CPU: 1 PID: 27886 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2192.389804][T27886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2192.389809][T27886] Call Trace: [ 2192.389833][T27886] dump_stack+0x172/0x1f0 [ 2192.389853][T27886] should_fail.cold+0xa/0x15 [ 2192.389867][T27886] ? stack_trace_save+0xac/0xe0 [ 2192.389881][T27886] ? fault_create_debugfs_attr+0x180/0x180 [ 2192.389893][T27886] ? page_to_nid.part.0+0x20/0x20 [ 2192.389911][T27886] ? ___might_sleep+0x163/0x280 [ 2192.432572][T27886] __should_failslab+0x121/0x190 [ 2192.437517][T27886] should_failslab+0x9/0x14 [ 2192.442040][T27886] kmem_cache_alloc+0x2aa/0x710 [ 2192.446886][T27886] ? fc_mount+0x17/0xc0 [ 2192.451034][T27886] ? vfs_kern_mount.part.0+0xd8/0xf0 [ 2192.456315][T27886] ? vfs_kern_mount+0x40/0x60 [ 2192.460988][T27886] ? btrfs_mount+0x2b4/0x15e2 [ 2192.465661][T27886] ? legacy_get_tree+0x108/0x220 [ 2192.470590][T27886] ? vfs_get_tree+0x8e/0x390 [ 2192.475172][T27886] ? do_mount+0x13b3/0x1c30 [ 2192.479667][T27886] ? ksys_mount+0xdb/0x150 [ 2192.484106][T27886] getname_kernel+0x53/0x370 [ 2192.488695][T27886] kern_path+0x20/0x40 [ 2192.492761][T27886] lookup_bdev.part.0+0x7b/0x1b0 [ 2192.497693][T27886] ? blkdev_open+0x290/0x290 [ 2192.502276][T27886] ? debug_check_no_obj_freed+0xc0/0x43f [ 2192.507996][T27886] blkdev_get_by_path+0x81/0x130 [ 2192.512931][T27886] btrfs_scan_one_device+0xd3/0x710 [ 2192.518126][T27886] ? device_list_add+0x14f0/0x14f0 [ 2192.523225][T27886] ? trace_hardirqs_off+0x240/0x240 [ 2192.528414][T27886] ? btrfs_mount_root+0xb2f/0x1290 [ 2192.533517][T27886] btrfs_mount_root+0x711/0x1290 [ 2192.538483][T27886] ? btrfs_decode_error+0x70/0x70 [ 2192.543501][T27886] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2192.549733][T27886] ? legacy_parse_param+0x116/0x880 [ 2192.554926][T27886] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2192.561161][T27886] ? security_fs_context_parse_param+0x81/0xb0 [ 2192.567304][T27886] ? logfc+0x700/0x700 [ 2192.571375][T27886] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2192.577607][T27886] ? vfs_parse_fs_param+0xcd/0x540 [ 2192.582712][T27886] ? kfree+0x1fd/0x2c0 [ 2192.586778][T27886] ? vfs_parse_fs_string+0x116/0x170 [ 2192.592059][T27886] ? vfs_parse_fs_param+0x540/0x540 [ 2192.597250][T27886] ? btrfs_decode_error+0x70/0x70 [ 2192.602268][T27886] legacy_get_tree+0x108/0x220 [ 2192.607029][T27886] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2192.613263][T27886] vfs_get_tree+0x8e/0x390 [ 2192.617686][T27886] fc_mount+0x17/0xc0 [ 2192.621677][T27886] vfs_kern_mount.part.0+0xd8/0xf0 [ 2192.626782][T27886] vfs_kern_mount+0x40/0x60 [ 2192.631284][T27886] btrfs_mount+0x2b4/0x15e2 [ 2192.635782][T27886] ? fs_parse+0x53c/0xf70 [ 2192.640110][T27886] ? btrfs_remount+0x10f0/0x10f0 [ 2192.645042][T27886] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2192.651276][T27886] ? cred_has_capability+0x199/0x330 [ 2192.656554][T27886] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 2192.662184][T27886] ? logfc+0x700/0x700 [ 2192.666244][T27886] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2192.672478][T27886] ? legacy_parse_param+0x116/0x880 [ 2192.677675][T27886] ? security_fs_context_parse_param+0x81/0xb0 [ 2192.683822][T27886] ? logfc+0x700/0x700 [ 2192.687890][T27886] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2192.694123][T27886] ? vfs_parse_fs_param+0xcd/0x540 [ 2192.699230][T27886] ? selinux_capable+0x36/0x40 [ 2192.703991][T27886] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2192.710223][T27886] ? btrfs_remount+0x10f0/0x10f0 [ 2192.715156][T27886] legacy_get_tree+0x108/0x220 [ 2192.719913][T27886] ? legacy_get_tree+0x108/0x220 [ 2192.724849][T27886] vfs_get_tree+0x8e/0x390 [ 2192.729263][T27886] do_mount+0x13b3/0x1c30 [ 2192.733591][T27886] ? copy_mount_string+0x40/0x40 [ 2192.738524][T27886] ? copy_mount_options+0x263/0x3f0 [ 2192.743714][T27886] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2192.749950][T27886] ? copy_mount_options+0x2e8/0x3f0 [ 2192.755143][T27886] ksys_mount+0xdb/0x150 [ 2192.759381][T27886] __x64_sys_mount+0xbe/0x150 [ 2192.764057][T27886] do_syscall_64+0xfd/0x6a0 [ 2192.768566][T27886] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2192.774447][T27886] RIP: 0033:0x45c2ca [ 2192.778340][T27886] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2192.797934][T27886] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2192.806333][T27886] RAX: ffffffffffffffda RBX: 00007f9e2b362b40 RCX: 000000000045c2ca 09:10:54 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x20000000, 0x0) 09:10:54 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8848000000000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2192.814300][T27886] RDX: 00007f9e2b362ae0 RSI: 0000000020000100 RDI: 00007f9e2b362b00 [ 2192.822270][T27886] RBP: 0000000000000001 R08: 00007f9e2b362b40 R09: 00007f9e2b362ae0 [ 2192.830236][T27886] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2192.838200][T27886] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:54 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x3000000, 0x5}}}}}}}, 0x0) 09:10:54 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8864000000000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:54 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0xf000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:54 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x5000000, 0x5}}}}}}}, 0x0) 09:10:54 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x6000000, 0x5}}}}}}}, 0x0) 09:10:54 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000004000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:54 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x88a8ffff00000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:54 executing program 5 (fault-call:0 fault-nth:69): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:54 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0xff00, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:54 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x7000000, 0x5}}}}}}}, 0x0) [ 2193.279828][T27925] FAULT_INJECTION: forcing a failure. [ 2193.279828][T27925] name failslab, interval 1, probability 0, space 0, times 0 [ 2193.296432][T27925] CPU: 0 PID: 27925 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2193.304498][T27925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2193.314546][T27925] Call Trace: [ 2193.317842][T27925] dump_stack+0x172/0x1f0 [ 2193.322175][T27925] should_fail.cold+0xa/0x15 [ 2193.326767][T27925] ? __x64_sys_mount+0xbe/0x150 [ 2193.331622][T27925] ? fault_create_debugfs_attr+0x180/0x180 [ 2193.337425][T27925] ? page_to_nid.part.0+0x20/0x20 [ 2193.342451][T27925] ? ___might_sleep+0x163/0x280 [ 2193.347298][T27925] __should_failslab+0x121/0x190 [ 2193.352235][T27925] should_failslab+0x9/0x14 [ 2193.356736][T27925] kmem_cache_alloc_trace+0x2d3/0x790 [ 2193.362106][T27925] ? debug_check_no_obj_freed+0xc0/0x43f [ 2193.367739][T27925] alloc_fs_context+0x5a/0x6c0 [ 2193.372936][T27925] fs_context_for_mount+0x25/0x30 [ 2193.377956][T27925] vfs_kern_mount.part.0+0x28/0xf0 [ 2193.383068][T27925] vfs_kern_mount+0x40/0x60 [ 2193.387567][T27925] btrfs_mount+0x2b4/0x15e2 [ 2193.392068][T27925] ? fs_parse+0x53c/0xf70 [ 2193.396400][T27925] ? btrfs_remount+0x10f0/0x10f0 [ 2193.401332][T27925] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2193.407582][T27925] ? cred_has_capability+0x199/0x330 [ 2193.412871][T27925] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 2193.418503][T27925] ? logfc+0x700/0x700 [ 2193.422575][T27925] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2193.428811][T27925] ? legacy_parse_param+0x116/0x880 [ 2193.434011][T27925] ? security_fs_context_parse_param+0x81/0xb0 [ 2193.440170][T27925] ? logfc+0x700/0x700 [ 2193.444239][T27925] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2193.450474][T27925] ? vfs_parse_fs_param+0xcd/0x540 [ 2193.455597][T27925] ? selinux_capable+0x36/0x40 [ 2193.460368][T27925] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2193.466782][T27925] ? btrfs_remount+0x10f0/0x10f0 [ 2193.471734][T27925] legacy_get_tree+0x108/0x220 [ 2193.476497][T27925] ? legacy_get_tree+0x108/0x220 [ 2193.481432][T27925] vfs_get_tree+0x8e/0x390 [ 2193.485843][T27925] do_mount+0x13b3/0x1c30 [ 2193.490171][T27925] ? copy_mount_string+0x40/0x40 [ 2193.495110][T27925] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2193.501348][T27925] ? copy_mount_options+0x2e8/0x3f0 [ 2193.506546][T27925] ksys_mount+0xdb/0x150 [ 2193.510787][T27925] __x64_sys_mount+0xbe/0x150 [ 2193.515465][T27925] do_syscall_64+0xfd/0x6a0 [ 2193.519969][T27925] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2193.525853][T27925] RIP: 0033:0x45c2ca [ 2193.529751][T27925] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2193.549343][T27925] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2193.557752][T27925] RAX: ffffffffffffffda RBX: 00007f9e2b362b40 RCX: 000000000045c2ca [ 2193.565718][T27925] RDX: 00007f9e2b362ae0 RSI: 0000000020000100 RDI: 00007f9e2b362b00 [ 2193.573688][T27925] RBP: 0000000000000001 R08: 00007f9e2b362b40 R09: 00007f9e2b362ae0 [ 2193.581654][T27925] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2193.589621][T27925] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:55 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x8000000, 0x5}}}}}}}, 0x0) 09:10:55 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x88caffff00000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:55 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x20100000, 0x0) 09:10:55 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x20000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:55 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8906000000000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:55 executing program 5 (fault-call:0 fault-nth:70): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:55 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x8060000, 0x5}}}}}}}, 0x0) 09:10:55 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000005000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:55 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0xf0ffff, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:55 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x8dffffff00000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:55 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0xd000000, 0x5}}}}}}}, 0x0) 09:10:55 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xb200000000000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2193.917956][T27945] FAULT_INJECTION: forcing a failure. [ 2193.917956][T27945] name failslab, interval 1, probability 0, space 0, times 0 [ 2193.930649][T27945] CPU: 1 PID: 27945 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2193.938711][T27945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2193.948755][T27945] Call Trace: [ 2193.948779][T27945] dump_stack+0x172/0x1f0 [ 2193.948796][T27945] should_fail.cold+0xa/0x15 [ 2193.948816][T27945] ? __kasan_check_read+0x11/0x20 [ 2193.960964][T27945] ? fault_create_debugfs_attr+0x180/0x180 [ 2193.960978][T27945] ? page_to_nid.part.0+0x20/0x20 [ 2193.960992][T27945] ? ___might_sleep+0x163/0x280 [ 2193.961010][T27945] __should_failslab+0x121/0x190 [ 2193.976801][T27945] should_failslab+0x9/0x14 [ 2193.976816][T27945] kmem_cache_alloc_trace+0x2d3/0x790 [ 2193.976827][T27945] ? lockdep_init_map+0x1be/0x6d0 [ 2193.976847][T27945] legacy_init_fs_context+0x48/0xe0 [ 2193.986591][T27945] ? generic_parse_monolithic+0x200/0x200 [ 2194.012300][T27945] alloc_fs_context+0x3d1/0x6c0 [ 2194.017153][T27945] fs_context_for_mount+0x25/0x30 [ 2194.022183][T27945] vfs_kern_mount.part.0+0x28/0xf0 [ 2194.027295][T27945] vfs_kern_mount+0x40/0x60 [ 2194.031796][T27945] btrfs_mount+0x2b4/0x15e2 [ 2194.036294][T27945] ? fs_parse+0x53c/0xf70 [ 2194.040624][T27945] ? btrfs_remount+0x10f0/0x10f0 [ 2194.045559][T27945] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2194.051794][T27945] ? cred_has_capability+0x199/0x330 [ 2194.057075][T27945] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 2194.062713][T27945] ? logfc+0x700/0x700 [ 2194.066781][T27945] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2194.073016][T27945] ? legacy_parse_param+0x116/0x880 [ 2194.078213][T27945] ? security_fs_context_parse_param+0x81/0xb0 [ 2194.084360][T27945] ? logfc+0x700/0x700 [ 2194.088430][T27945] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2194.094662][T27945] ? vfs_parse_fs_param+0xcd/0x540 [ 2194.099773][T27945] ? selinux_capable+0x36/0x40 [ 2194.104534][T27945] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2194.110772][T27945] ? btrfs_remount+0x10f0/0x10f0 [ 2194.115712][T27945] legacy_get_tree+0x108/0x220 [ 2194.120473][T27945] ? legacy_get_tree+0x108/0x220 [ 2194.125408][T27945] vfs_get_tree+0x8e/0x390 [ 2194.129819][T27945] do_mount+0x13b3/0x1c30 [ 2194.134151][T27945] ? copy_mount_string+0x40/0x40 [ 2194.139091][T27945] ? copy_mount_options+0x200/0x3f0 [ 2194.144281][T27945] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 2194.149827][T27945] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2194.156062][T27945] ? copy_mount_options+0x2e8/0x3f0 [ 2194.161259][T27945] ksys_mount+0xdb/0x150 [ 2194.165501][T27945] __x64_sys_mount+0xbe/0x150 [ 2194.170176][T27945] do_syscall_64+0xfd/0x6a0 [ 2194.174681][T27945] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2194.180563][T27945] RIP: 0033:0x45c2ca [ 2194.184455][T27945] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2194.204531][T27945] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 09:10:55 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x1000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:56 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x11000000, 0x5}}}}}}}, 0x0) [ 2194.212943][T27945] RAX: ffffffffffffffda RBX: 00007f9e2b362b40 RCX: 000000000045c2ca [ 2194.220907][T27945] RDX: 00007f9e2b362ae0 RSI: 0000000020000100 RDI: 00007f9e2b362b00 [ 2194.228872][T27945] RBP: 0000000000000001 R08: 00007f9e2b362b40 R09: 00007f9e2b362ae0 [ 2194.236839][T27945] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2194.244801][T27945] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:56 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x23000000, 0x0) 09:10:56 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xdc05000000000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:56 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x2000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2194.357390][ C1] net_ratelimit: 16 callbacks suppressed [ 2194.357398][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2194.363083][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2194.374585][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2194.380372][ C1] protocol 88fb is buggy, dev hsr_slave_1 09:10:56 executing program 5 (fault-call:0 fault-nth:71): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:56 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xf5ffffff00000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:56 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000006000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:56 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x3000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:56 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x28000000, 0x5}}}}}}}, 0x0) 09:10:56 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xfe80000000000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:56 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xfeffffff00000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2194.543736][T27980] FAULT_INJECTION: forcing a failure. [ 2194.543736][T27980] name failslab, interval 1, probability 0, space 0, times 0 09:10:56 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xff00000000000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2194.588080][T27980] CPU: 1 PID: 27980 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2194.596176][T27980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2194.606222][T27980] Call Trace: [ 2194.609515][T27980] dump_stack+0x172/0x1f0 [ 2194.613848][T27980] should_fail.cold+0xa/0x15 [ 2194.618447][T27980] ? __x64_sys_mount+0xbe/0x150 [ 2194.623301][T27980] ? fault_create_debugfs_attr+0x180/0x180 [ 2194.629107][T27980] ? page_to_nid.part.0+0x20/0x20 09:10:56 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2194.634136][T27980] ? ___might_sleep+0x163/0x280 [ 2194.638991][T27980] __should_failslab+0x121/0x190 [ 2194.643930][T27980] should_failslab+0x9/0x14 [ 2194.648434][T27980] kmem_cache_alloc_trace+0x2d3/0x790 [ 2194.653810][T27980] ? debug_check_no_obj_freed+0xc0/0x43f [ 2194.659459][T27980] alloc_fs_context+0x5a/0x6c0 [ 2194.664226][T27980] fs_context_for_mount+0x25/0x30 [ 2194.669253][T27980] vfs_kern_mount.part.0+0x28/0xf0 [ 2194.674366][T27980] vfs_kern_mount+0x40/0x60 [ 2194.678872][T27980] btrfs_mount+0x2b4/0x15e2 [ 2194.683372][T27980] ? fs_parse+0x53c/0xf70 [ 2194.687705][T27980] ? btrfs_remount+0x10f0/0x10f0 [ 2194.692648][T27980] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2194.698886][T27980] ? cred_has_capability+0x199/0x330 [ 2194.704169][T27980] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 2194.709795][T27980] ? logfc+0x700/0x700 [ 2194.713955][T27980] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2194.720366][T27980] ? legacy_parse_param+0x116/0x880 [ 2194.725564][T27980] ? security_fs_context_parse_param+0x81/0xb0 [ 2194.731712][T27980] ? logfc+0x700/0x700 [ 2194.735777][T27980] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2194.742011][T27980] ? vfs_parse_fs_param+0xcd/0x540 [ 2194.747136][T27980] ? selinux_capable+0x36/0x40 [ 2194.751896][T27980] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2194.758139][T27980] ? btrfs_remount+0x10f0/0x10f0 [ 2194.763075][T27980] legacy_get_tree+0x108/0x220 [ 2194.767834][T27980] ? legacy_get_tree+0x108/0x220 [ 2194.772772][T27980] vfs_get_tree+0x8e/0x390 [ 2194.777188][T27980] do_mount+0x13b3/0x1c30 [ 2194.781519][T27980] ? copy_mount_string+0x40/0x40 [ 2194.786455][T27980] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2194.792691][T27980] ? copy_mount_options+0x2e8/0x3f0 [ 2194.797885][T27980] ksys_mount+0xdb/0x150 [ 2194.802123][T27980] __x64_sys_mount+0xbe/0x150 [ 2194.806803][T27980] do_syscall_64+0xfd/0x6a0 [ 2194.811311][T27980] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2194.817202][T27980] RIP: 0033:0x45c2ca [ 2194.821096][T27980] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2194.840693][T27980] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2194.849099][T27980] RAX: ffffffffffffffda RBX: 00007f9e2b362b40 RCX: 000000000045c2ca [ 2194.857069][T27980] RDX: 00007f9e2b362ae0 RSI: 0000000020000100 RDI: 00007f9e2b362b00 [ 2194.865035][T27980] RBP: 0000000000000001 R08: 00007f9e2b362b40 R09: 00007f9e2b362ae0 [ 2194.873006][T27980] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2194.880974][T27980] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:56 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x3f000000, 0x0) 09:10:56 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x4000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:56 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x3f000000, 0x5}}}}}}}, 0x0) [ 2194.917367][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2194.917390][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2194.923146][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2194.928876][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2194.940342][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2194.946092][ C0] protocol 88fb is buggy, dev hsr_slave_1 09:10:56 executing program 5 (fault-call:0 fault-nth:72): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:56 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0xfffffffffffff000, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2195.149652][T28009] FAULT_INJECTION: forcing a failure. [ 2195.149652][T28009] name failslab, interval 1, probability 0, space 0, times 0 [ 2195.176292][T28009] CPU: 1 PID: 28009 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2195.184366][T28009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2195.194411][T28009] Call Trace: [ 2195.197698][T28009] dump_stack+0x172/0x1f0 [ 2195.202029][T28009] should_fail.cold+0xa/0x15 [ 2195.206614][T28009] ? stack_trace_save+0xac/0xe0 [ 2195.211458][T28009] ? fault_create_debugfs_attr+0x180/0x180 [ 2195.217262][T28009] ? page_to_nid.part.0+0x20/0x20 [ 2195.222280][T28009] ? ___might_sleep+0x163/0x280 [ 2195.227147][T28009] __should_failslab+0x121/0x190 [ 2195.232083][T28009] should_failslab+0x9/0x14 [ 2195.236582][T28009] kmem_cache_alloc+0x2aa/0x710 [ 2195.241422][T28009] ? fc_mount+0x17/0xc0 [ 2195.245575][T28009] ? vfs_kern_mount.part.0+0xd8/0xf0 [ 2195.250857][T28009] ? vfs_kern_mount+0x40/0x60 [ 2195.255531][T28009] ? btrfs_mount+0x2b4/0x15e2 [ 2195.260200][T28009] ? legacy_get_tree+0x108/0x220 [ 2195.265128][T28009] ? vfs_get_tree+0x8e/0x390 [ 2195.269711][T28009] ? do_mount+0x13b3/0x1c30 [ 2195.274205][T28009] ? ksys_mount+0xdb/0x150 [ 2195.278615][T28009] getname_kernel+0x53/0x370 [ 2195.283205][T28009] kern_path+0x20/0x40 [ 2195.287268][T28009] lookup_bdev.part.0+0x7b/0x1b0 [ 2195.292196][T28009] ? blkdev_open+0x290/0x290 [ 2195.296783][T28009] ? debug_check_no_obj_freed+0xc0/0x43f [ 2195.302419][T28009] blkdev_get_by_path+0x81/0x130 [ 2195.307351][T28009] btrfs_scan_one_device+0xd3/0x710 [ 2195.312541][T28009] ? device_list_add+0x14f0/0x14f0 [ 2195.318610][T28009] ? trace_hardirqs_off+0x240/0x240 [ 2195.323802][T28009] ? btrfs_mount_root+0xb2f/0x1290 [ 2195.328912][T28009] btrfs_mount_root+0x711/0x1290 [ 2195.333845][T28009] ? btrfs_decode_error+0x70/0x70 [ 2195.338869][T28009] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2195.345105][T28009] ? legacy_parse_param+0x116/0x880 [ 2195.350294][T28009] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2195.357013][T28009] ? security_fs_context_parse_param+0x81/0xb0 [ 2195.363158][T28009] ? logfc+0x700/0x700 [ 2195.367220][T28009] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2195.373450][T28009] ? vfs_parse_fs_param+0xcd/0x540 [ 2195.378566][T28009] ? kfree+0x1fd/0x2c0 [ 2195.382634][T28009] ? vfs_parse_fs_string+0x116/0x170 [ 2195.387912][T28009] ? vfs_parse_fs_param+0x540/0x540 [ 2195.393109][T28009] ? btrfs_decode_error+0x70/0x70 [ 2195.398124][T28009] legacy_get_tree+0x108/0x220 [ 2195.402884][T28009] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2195.409118][T28009] vfs_get_tree+0x8e/0x390 [ 2195.413529][T28009] fc_mount+0x17/0xc0 [ 2195.417537][T28009] vfs_kern_mount.part.0+0xd8/0xf0 [ 2195.422655][T28009] vfs_kern_mount+0x40/0x60 [ 2195.427158][T28009] btrfs_mount+0x2b4/0x15e2 [ 2195.431656][T28009] ? fs_parse+0x53c/0xf70 [ 2195.435985][T28009] ? btrfs_remount+0x10f0/0x10f0 [ 2195.440919][T28009] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2195.447153][T28009] ? cred_has_capability+0x199/0x330 [ 2195.452431][T28009] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 2195.458059][T28009] ? logfc+0x700/0x700 [ 2195.462127][T28009] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2195.468362][T28009] ? legacy_parse_param+0x116/0x880 [ 2195.473557][T28009] ? security_fs_context_parse_param+0x81/0xb0 [ 2195.479702][T28009] ? logfc+0x700/0x700 [ 2195.483765][T28009] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2195.490002][T28009] ? vfs_parse_fs_param+0xcd/0x540 [ 2195.495110][T28009] ? selinux_capable+0x36/0x40 [ 2195.499871][T28009] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2195.506104][T28009] ? btrfs_remount+0x10f0/0x10f0 [ 2195.511033][T28009] legacy_get_tree+0x108/0x220 [ 2195.515794][T28009] ? legacy_get_tree+0x108/0x220 [ 2195.520728][T28009] vfs_get_tree+0x8e/0x390 [ 2195.525143][T28009] do_mount+0x13b3/0x1c30 [ 2195.529467][T28009] ? copy_mount_string+0x40/0x40 [ 2195.534407][T28009] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2195.540639][T28009] ? copy_mount_options+0x2e8/0x3f0 [ 2195.545835][T28009] ksys_mount+0xdb/0x150 [ 2195.550081][T28009] __x64_sys_mount+0xbe/0x150 [ 2195.554757][T28009] do_syscall_64+0xfd/0x6a0 [ 2195.559255][T28009] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2195.565134][T28009] RIP: 0033:0x45c2ca [ 2195.569027][T28009] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2195.588635][T28009] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 09:10:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000007000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:57 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x5000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:57 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x40000000, 0x5}}}}}}}, 0x0) 09:10:57 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:57 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x40000000, 0x0) [ 2195.597036][T28009] RAX: ffffffffffffffda RBX: 00007f9e2b362b40 RCX: 000000000045c2ca [ 2195.605005][T28009] RDX: 00007f9e2b362ae0 RSI: 0000000020000100 RDI: 00007f9e2b362b00 [ 2195.612969][T28009] RBP: 0000000000000001 R08: 00007f9e2b362b40 R09: 00007f9e2b362ae0 [ 2195.621020][T28009] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2195.628988][T28009] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:57 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x6000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:57 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x43050000, 0x5}}}}}}}, 0x0) 09:10:57 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:57 executing program 5 (fault-call:0 fault-nth:73): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:57 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:57 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x60000000, 0x5}}}}}}}, 0x0) 09:10:57 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x7000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2195.821388][T28034] FAULT_INJECTION: forcing a failure. [ 2195.821388][T28034] name failslab, interval 1, probability 0, space 0, times 0 [ 2195.851517][T28034] CPU: 1 PID: 28034 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2195.859590][T28034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2195.859595][T28034] Call Trace: [ 2195.859618][T28034] dump_stack+0x172/0x1f0 [ 2195.859642][T28034] should_fail.cold+0xa/0x15 [ 2195.872946][T28034] ? fault_create_debugfs_attr+0x180/0x180 [ 2195.872963][T28034] ? page_to_nid.part.0+0x20/0x20 [ 2195.892625][T28034] ? ___might_sleep+0x163/0x280 [ 2195.897475][T28034] __should_failslab+0x121/0x190 [ 2195.902409][T28034] should_failslab+0x9/0x14 [ 2195.906909][T28034] kmem_cache_alloc_trace+0x2d3/0x790 [ 2195.912273][T28034] ? kasan_kmalloc+0x9/0x10 [ 2195.916774][T28034] ? __kmalloc_node+0x4e/0x70 [ 2195.921448][T28034] btrfs_mount_root+0x174/0x1290 [ 2195.926380][T28034] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2195.932615][T28034] ? btrfs_decode_error+0x70/0x70 [ 2195.937639][T28034] ? logfc+0x700/0x700 [ 2195.941699][T28034] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2195.947931][T28034] ? legacy_parse_param+0x116/0x880 [ 2195.953124][T28034] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2195.959362][T28034] ? security_fs_context_parse_param+0x81/0xb0 [ 2195.965512][T28034] ? logfc+0x700/0x700 [ 2195.969579][T28034] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2195.975817][T28034] ? vfs_parse_fs_param+0xcd/0x540 [ 2195.980919][T28034] ? kfree+0x1fd/0x2c0 [ 2195.984986][T28034] ? vfs_parse_fs_string+0x116/0x170 [ 2195.990267][T28034] ? vfs_parse_fs_param+0x540/0x540 [ 2195.995463][T28034] ? btrfs_decode_error+0x70/0x70 [ 2196.000484][T28034] legacy_get_tree+0x108/0x220 [ 2196.005240][T28034] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2196.011476][T28034] vfs_get_tree+0x8e/0x390 [ 2196.015889][T28034] fc_mount+0x17/0xc0 [ 2196.019877][T28034] vfs_kern_mount.part.0+0xd8/0xf0 [ 2196.024985][T28034] vfs_kern_mount+0x40/0x60 [ 2196.029486][T28034] btrfs_mount+0x2b4/0x15e2 [ 2196.033987][T28034] ? fs_parse+0x53c/0xf70 [ 2196.038317][T28034] ? btrfs_remount+0x10f0/0x10f0 [ 2196.043248][T28034] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2196.049483][T28034] ? cred_has_capability+0x199/0x330 [ 2196.054761][T28034] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 2196.060387][T28034] ? logfc+0x700/0x700 [ 2196.064453][T28034] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2196.070686][T28034] ? legacy_parse_param+0x116/0x880 [ 2196.075880][T28034] ? security_fs_context_parse_param+0x81/0xb0 [ 2196.082033][T28034] ? logfc+0x700/0x700 [ 2196.086096][T28034] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2196.092329][T28034] ? vfs_parse_fs_param+0xcd/0x540 [ 2196.097438][T28034] ? selinux_capable+0x36/0x40 [ 2196.102196][T28034] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2196.108431][T28034] ? btrfs_remount+0x10f0/0x10f0 [ 2196.113365][T28034] legacy_get_tree+0x108/0x220 [ 2196.118121][T28034] ? legacy_get_tree+0x108/0x220 [ 2196.123054][T28034] vfs_get_tree+0x8e/0x390 [ 2196.127465][T28034] do_mount+0x13b3/0x1c30 [ 2196.131796][T28034] ? copy_mount_string+0x40/0x40 [ 2196.136731][T28034] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2196.142966][T28034] ? copy_mount_options+0x2e8/0x3f0 [ 2196.148158][T28034] ksys_mount+0xdb/0x150 [ 2196.152399][T28034] __x64_sys_mount+0xbe/0x150 [ 2196.157074][T28034] do_syscall_64+0xfd/0x6a0 [ 2196.161578][T28034] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2196.167469][T28034] RIP: 0033:0x45c2ca [ 2196.171364][T28034] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2196.191541][T28034] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2196.199947][T28034] RAX: ffffffffffffffda RBX: 00007f9e2b362b40 RCX: 000000000045c2ca [ 2196.207908][T28034] RDX: 00007f9e2b362ae0 RSI: 0000000020000100 RDI: 00007f9e2b362b00 09:10:57 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000008000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 2196.215870][T28034] RBP: 0000000000000001 R08: 00007f9e2b362b40 R09: 00007f9e2b362ae0 [ 2196.223832][T28034] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2196.231793][T28034] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:58 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x8cffffff, 0x0) 09:10:58 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:58 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x8000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:58 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x800e0000, 0x5}}}}}}}, 0x0) 09:10:58 executing program 5 (fault-call:0 fault-nth:74): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:58 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:58 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x8060000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:58 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:58 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x80350000, 0x5}}}}}}}, 0x0) 09:10:58 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000009000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:58 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:58 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0xa000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2196.564444][T28064] FAULT_INJECTION: forcing a failure. [ 2196.564444][T28064] name failslab, interval 1, probability 0, space 0, times 0 [ 2196.614786][T28064] CPU: 1 PID: 28064 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2196.622863][T28064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2196.622869][T28064] Call Trace: [ 2196.622897][T28064] dump_stack+0x172/0x1f0 [ 2196.640519][T28064] should_fail.cold+0xa/0x15 [ 2196.645108][T28064] ? fault_create_debugfs_attr+0x180/0x180 [ 2196.650901][T28064] ? page_to_nid.part.0+0x20/0x20 [ 2196.650920][T28064] ? ___might_sleep+0x163/0x280 [ 2196.660759][T28064] __should_failslab+0x121/0x190 [ 2196.665697][T28064] should_failslab+0x9/0x14 [ 2196.670199][T28064] kmem_cache_alloc_node_trace+0x274/0x750 [ 2196.675996][T28064] ? vfs_get_tree+0x8e/0x390 [ 2196.680580][T28064] ? do_mount+0x13b3/0x1c30 [ 2196.685077][T28064] ? ksys_mount+0xdb/0x150 [ 2196.689489][T28064] ? __x64_sys_mount+0xbe/0x150 [ 2196.694338][T28064] ? do_syscall_64+0xfd/0x6a0 [ 2196.699012][T28064] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2196.705080][T28064] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2196.711402][T28064] __kmalloc_node+0x3d/0x70 [ 2196.715902][T28064] kvmalloc_node+0xbd/0x100 [ 2196.720412][T28064] btrfs_mount_root+0x12b/0x1290 [ 2196.725347][T28064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2196.731579][T28064] ? btrfs_decode_error+0x70/0x70 [ 2196.736601][T28064] ? logfc+0x700/0x700 [ 2196.740664][T28064] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2196.746899][T28064] ? legacy_parse_param+0x116/0x880 [ 2196.752093][T28064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2196.758335][T28064] ? security_fs_context_parse_param+0x81/0xb0 [ 2196.764482][T28064] ? logfc+0x700/0x700 [ 2196.768550][T28064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2196.774787][T28064] ? vfs_parse_fs_param+0xcd/0x540 [ 2196.779982][T28064] ? kfree+0x1fd/0x2c0 [ 2196.784046][T28064] ? vfs_parse_fs_string+0x116/0x170 [ 2196.789324][T28064] ? vfs_parse_fs_param+0x540/0x540 [ 2196.794519][T28064] ? btrfs_decode_error+0x70/0x70 [ 2196.799549][T28064] legacy_get_tree+0x108/0x220 [ 2196.804311][T28064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2196.810549][T28064] vfs_get_tree+0x8e/0x390 [ 2196.814968][T28064] fc_mount+0x17/0xc0 [ 2196.818952][T28064] vfs_kern_mount.part.0+0xd8/0xf0 [ 2196.824057][T28064] vfs_kern_mount+0x40/0x60 [ 2196.828664][T28064] btrfs_mount+0x2b4/0x15e2 [ 2196.833166][T28064] ? fs_parse+0x53c/0xf70 [ 2196.837516][T28064] ? btrfs_remount+0x10f0/0x10f0 [ 2196.842451][T28064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2196.848686][T28064] ? cred_has_capability+0x199/0x330 [ 2196.853968][T28064] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 2196.859593][T28064] ? logfc+0x700/0x700 [ 2196.863657][T28064] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2196.869890][T28064] ? legacy_parse_param+0x116/0x880 [ 2196.875084][T28064] ? security_fs_context_parse_param+0x81/0xb0 [ 2196.881231][T28064] ? logfc+0x700/0x700 [ 2196.885300][T28064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2196.891537][T28064] ? vfs_parse_fs_param+0xcd/0x540 [ 2196.896649][T28064] ? selinux_capable+0x36/0x40 [ 2196.901429][T28064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2196.907664][T28064] ? btrfs_remount+0x10f0/0x10f0 [ 2196.912595][T28064] legacy_get_tree+0x108/0x220 [ 2196.917357][T28064] ? legacy_get_tree+0x108/0x220 [ 2196.922293][T28064] vfs_get_tree+0x8e/0x390 [ 2196.926704][T28064] do_mount+0x13b3/0x1c30 [ 2196.931034][T28064] ? copy_mount_string+0x40/0x40 [ 2196.935974][T28064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2196.942212][T28064] ? copy_mount_options+0x2e8/0x3f0 [ 2196.947406][T28064] ksys_mount+0xdb/0x150 [ 2196.951646][T28064] __x64_sys_mount+0xbe/0x150 [ 2196.956324][T28064] do_syscall_64+0xfd/0x6a0 [ 2196.960830][T28064] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2196.966712][T28064] RIP: 0033:0x45c2ca [ 2196.970602][T28064] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2196.990196][T28064] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2196.998604][T28064] RAX: ffffffffffffffda RBX: 00007f9e2b362b40 RCX: 000000000045c2ca [ 2197.006570][T28064] RDX: 00007f9e2b362ae0 RSI: 0000000020000100 RDI: 00007f9e2b362b00 09:10:58 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xc0ed0000, 0x0) 09:10:58 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x81000000, 0x5}}}}}}}, 0x0) 09:10:58 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2197.014536][T28064] RBP: 0000000000000001 R08: 00007f9e2b362b40 R09: 00007f9e2b362ae0 [ 2197.022501][T28064] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2197.030465][T28064] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:58 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:58 executing program 5 (fault-call:0 fault-nth:75): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:58 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0xd000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:58 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x86ddffff, 0x5}}}}}}}, 0x0) 09:10:58 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:58 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d0100000000000000000000000a000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:59 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x88470000, 0x5}}}}}}}, 0x0) 09:10:59 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x11000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:59 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2197.296588][T28093] FAULT_INJECTION: forcing a failure. [ 2197.296588][T28093] name failslab, interval 1, probability 0, space 0, times 0 [ 2197.331290][T28093] CPU: 1 PID: 28093 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2197.339381][T28093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2197.349430][T28093] Call Trace: [ 2197.352723][T28093] dump_stack+0x172/0x1f0 [ 2197.357054][T28093] should_fail.cold+0xa/0x15 [ 2197.361649][T28093] ? fault_create_debugfs_attr+0x180/0x180 [ 2197.367455][T28093] ? page_to_nid.part.0+0x20/0x20 [ 2197.372476][T28093] ? ___might_sleep+0x163/0x280 [ 2197.377326][T28093] __should_failslab+0x121/0x190 [ 2197.382267][T28093] should_failslab+0x9/0x14 [ 2197.386768][T28093] kmem_cache_alloc_trace+0x2d3/0x790 [ 2197.392133][T28093] ? kasan_kmalloc+0x9/0x10 [ 2197.396679][T28093] btrfs_mount_root+0x1d0/0x1290 [ 2197.401631][T28093] ? btrfs_decode_error+0x70/0x70 [ 2197.406657][T28093] ? logfc+0x700/0x700 [ 2197.410728][T28093] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2197.416970][T28093] ? legacy_parse_param+0x116/0x880 [ 2197.422163][T28093] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2197.428402][T28093] ? security_fs_context_parse_param+0x81/0xb0 [ 2197.434554][T28093] ? logfc+0x700/0x700 [ 2197.438650][T28093] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2197.444892][T28093] ? vfs_parse_fs_param+0xcd/0x540 [ 2197.449998][T28093] ? kfree+0x1fd/0x2c0 [ 2197.454064][T28093] ? vfs_parse_fs_string+0x116/0x170 [ 2197.459344][T28093] ? vfs_parse_fs_param+0x540/0x540 [ 2197.464536][T28093] ? btrfs_decode_error+0x70/0x70 [ 2197.469555][T28093] legacy_get_tree+0x108/0x220 [ 2197.474324][T28093] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2197.480564][T28093] vfs_get_tree+0x8e/0x390 [ 2197.484974][T28093] fc_mount+0x17/0xc0 [ 2197.488953][T28093] vfs_kern_mount.part.0+0xd8/0xf0 [ 2197.494058][T28093] vfs_kern_mount+0x40/0x60 [ 2197.498559][T28093] btrfs_mount+0x2b4/0x15e2 [ 2197.503059][T28093] ? fs_parse+0x53c/0xf70 [ 2197.507391][T28093] ? btrfs_remount+0x10f0/0x10f0 [ 2197.512322][T28093] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2197.518558][T28093] ? cred_has_capability+0x199/0x330 [ 2197.523838][T28093] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 2197.529467][T28093] ? logfc+0x700/0x700 [ 2197.533534][T28093] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2197.539769][T28093] ? legacy_parse_param+0x116/0x880 [ 2197.544962][T28093] ? security_fs_context_parse_param+0x81/0xb0 [ 2197.551119][T28093] ? logfc+0x700/0x700 [ 2197.555184][T28093] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2197.561417][T28093] ? vfs_parse_fs_param+0xcd/0x540 [ 2197.566526][T28093] ? selinux_capable+0x36/0x40 [ 2197.571291][T28093] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2197.577530][T28093] ? btrfs_remount+0x10f0/0x10f0 [ 2197.582462][T28093] legacy_get_tree+0x108/0x220 [ 2197.587224][T28093] ? legacy_get_tree+0x108/0x220 [ 2197.592157][T28093] vfs_get_tree+0x8e/0x390 [ 2197.596571][T28093] do_mount+0x13b3/0x1c30 [ 2197.600902][T28093] ? copy_mount_string+0x40/0x40 [ 2197.605841][T28093] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2197.612088][T28093] ? copy_mount_options+0x2e8/0x3f0 [ 2197.617283][T28093] ksys_mount+0xdb/0x150 [ 2197.621524][T28093] __x64_sys_mount+0xbe/0x150 [ 2197.626201][T28093] do_syscall_64+0xfd/0x6a0 [ 2197.630705][T28093] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2197.636588][T28093] RIP: 0033:0x45c2ca [ 2197.640485][T28093] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2197.660077][T28093] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2197.668485][T28093] RAX: ffffffffffffffda RBX: 00007f9e2b362b40 RCX: 000000000045c2ca [ 2197.676448][T28093] RDX: 00007f9e2b362ae0 RSI: 0000000020000100 RDI: 00007f9e2b362b00 [ 2197.684410][T28093] RBP: 0000000000000001 R08: 00007f9e2b362b40 R09: 00007f9e2b362ae0 [ 2197.692374][T28093] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2197.700341][T28093] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:10:59 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf4ffffff, 0x0) 09:10:59 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x88480000, 0x5}}}}}}}, 0x0) 09:10:59 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:59 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x28000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:59 executing program 5 (fault-call:0 fault-nth:76): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:59 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x88640000, 0x5}}}}}}}, 0x0) 09:10:59 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:59 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x3c000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:59 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d0100000000000000000000000b000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:10:59 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:10:59 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x88a8ffff, 0x5}}}}}}}, 0x0) 09:10:59 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x3f000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2198.058357][T28125] FAULT_INJECTION: forcing a failure. [ 2198.058357][T28125] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2198.071577][T28125] CPU: 0 PID: 28125 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2198.079632][T28125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2198.089681][T28125] Call Trace: [ 2198.092973][T28125] dump_stack+0x172/0x1f0 [ 2198.097301][T28125] should_fail.cold+0xa/0x15 [ 2198.101896][T28125] ? fault_create_debugfs_attr+0x180/0x180 [ 2198.107700][T28125] ? __kasan_check_read+0x11/0x20 [ 2198.112726][T28125] should_fail_alloc_page+0x50/0x60 [ 2198.117927][T28125] __alloc_pages_nodemask+0x1a1/0x900 [ 2198.123294][T28125] ? lock_repin_lock+0x4b0/0x4b0 [ 2198.128233][T28125] ? __alloc_pages_slowpath+0x2520/0x2520 [ 2198.133947][T28125] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 2198.139570][T28125] ? __kasan_check_read+0x11/0x20 [ 2198.139588][T28125] ? fault_create_debugfs_attr+0x180/0x180 [ 2198.139604][T28125] cache_grow_begin+0x90/0xd20 [ 2198.150382][T28125] ? getname_kernel+0x53/0x370 [ 2198.150399][T28125] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2198.150415][T28125] kmem_cache_alloc+0x64e/0x710 [ 2198.170945][T28125] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2198.177177][T28125] getname_kernel+0x53/0x370 [ 2198.181765][T28125] kern_path+0x20/0x40 [ 2198.185835][T28125] lookup_bdev.part.0+0x7b/0x1b0 [ 2198.191262][T28125] ? blkdev_open+0x290/0x290 [ 2198.195852][T28125] ? btrfs_open_devices+0x74/0x160 [ 2198.200965][T28125] blkdev_get_by_path+0x81/0x130 [ 2198.205899][T28125] btrfs_get_bdev_and_sb+0x38/0x300 [ 2198.211089][T28125] open_fs_devices+0x6e7/0xc40 [ 2198.211107][T28125] ? btrfs_uuid_rescan_kthread+0x60/0x60 [ 2198.211126][T28125] ? btrfs_scan_one_device+0x5ac/0x710 [ 2198.224808][T28125] btrfs_open_devices+0x140/0x160 [ 2198.224828][T28125] btrfs_mount_root+0x793/0x1290 [ 2198.235271][T28125] ? btrfs_decode_error+0x70/0x70 [ 2198.235294][T28125] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2198.251430][T28125] ? legacy_parse_param+0x116/0x880 [ 2198.256627][T28125] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2198.262871][T28125] ? security_fs_context_parse_param+0x81/0xb0 [ 2198.269026][T28125] ? logfc+0x700/0x700 [ 2198.273100][T28125] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2198.279344][T28125] ? vfs_parse_fs_param+0xcd/0x540 [ 2198.284449][T28125] ? kfree+0x1fd/0x2c0 [ 2198.288515][T28125] ? vfs_parse_fs_string+0x116/0x170 [ 2198.293800][T28125] ? vfs_parse_fs_param+0x540/0x540 [ 2198.298997][T28125] ? btrfs_decode_error+0x70/0x70 [ 2198.304019][T28125] legacy_get_tree+0x108/0x220 [ 2198.308778][T28125] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2198.315015][T28125] vfs_get_tree+0x8e/0x390 [ 2198.319428][T28125] fc_mount+0x17/0xc0 [ 2198.323405][T28125] vfs_kern_mount.part.0+0xd8/0xf0 [ 2198.328516][T28125] vfs_kern_mount+0x40/0x60 [ 2198.333016][T28125] btrfs_mount+0x2b4/0x15e2 [ 2198.337520][T28125] ? fs_parse+0x53c/0xf70 [ 2198.341854][T28125] ? btrfs_remount+0x10f0/0x10f0 [ 2198.346786][T28125] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2198.353027][T28125] ? cred_has_capability+0x199/0x330 [ 2198.358958][T28125] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 2198.364589][T28125] ? logfc+0x700/0x700 [ 2198.368654][T28125] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2198.374903][T28125] ? legacy_parse_param+0x116/0x880 [ 2198.380099][T28125] ? security_fs_context_parse_param+0x81/0xb0 [ 2198.386250][T28125] ? logfc+0x700/0x700 [ 2198.390327][T28125] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2198.396565][T28125] ? vfs_parse_fs_param+0xcd/0x540 [ 2198.401676][T28125] ? selinux_capable+0x36/0x40 [ 2198.406436][T28125] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2198.412677][T28125] ? btrfs_remount+0x10f0/0x10f0 [ 2198.417610][T28125] legacy_get_tree+0x108/0x220 [ 2198.422373][T28125] ? legacy_get_tree+0x108/0x220 [ 2198.427312][T28125] vfs_get_tree+0x8e/0x390 [ 2198.431729][T28125] do_mount+0x13b3/0x1c30 [ 2198.436063][T28125] ? copy_mount_string+0x40/0x40 [ 2198.441000][T28125] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2198.447237][T28125] ? _copy_from_user+0x12c/0x1a0 [ 2198.452177][T28125] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2198.458417][T28125] ? copy_mount_options+0x2e8/0x3f0 [ 2198.463616][T28125] ksys_mount+0xdb/0x150 [ 2198.467856][T28125] __x64_sys_mount+0xbe/0x150 [ 2198.472535][T28125] do_syscall_64+0xfd/0x6a0 [ 2198.477034][T28125] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2198.482919][T28125] RIP: 0033:0x45c2ca [ 2198.486814][T28125] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 09:11:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf5ffffff, 0x0) 09:11:00 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x40000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:11:00 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x44, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:11:00 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x88caffff, 0x5}}}}}}}, 0x0) [ 2198.506408][T28125] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2198.514812][T28125] RAX: ffffffffffffffda RBX: 00007f9e2b362b40 RCX: 000000000045c2ca [ 2198.522779][T28125] RDX: 00007f9e2b362ae0 RSI: 0000000020000100 RDI: 00007f9e2b362b00 [ 2198.530744][T28125] RBP: 0000000000000001 R08: 00007f9e2b362b40 R09: 00007f9e2b362ae0 [ 2198.538707][T28125] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2198.546674][T28125] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:11:00 executing program 5 (fault-call:0 fault-nth:77): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:11:00 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x89060000, 0x5}}}}}}}, 0x0) 09:11:00 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x43050000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:11:00 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xb2, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2198.806407][T28162] FAULT_INJECTION: forcing a failure. [ 2198.806407][T28162] name failslab, interval 1, probability 0, space 0, times 0 [ 2198.829746][T28162] CPU: 0 PID: 28162 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2198.837823][T28162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2198.847866][T28162] Call Trace: [ 2198.851168][T28162] dump_stack+0x172/0x1f0 [ 2198.855496][T28162] should_fail.cold+0xa/0x15 [ 2198.855513][T28162] ? fault_create_debugfs_attr+0x180/0x180 [ 2198.855532][T28162] ? page_to_nid.part.0+0x20/0x20 [ 2198.870895][T28162] ? ___might_sleep+0x163/0x280 [ 2198.875751][T28162] __should_failslab+0x121/0x190 [ 2198.880692][T28162] should_failslab+0x9/0x14 [ 2198.885192][T28162] kmem_cache_alloc_trace+0x2d3/0x790 [ 2198.890552][T28162] ? kasan_kmalloc+0x9/0x10 [ 2198.890572][T28162] btrfs_mount_root+0x1d0/0x1290 [ 2198.890591][T28162] ? btrfs_decode_error+0x70/0x70 [ 2198.890607][T28162] ? logfc+0x700/0x700 [ 2198.890623][T28162] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2198.890634][T28162] ? legacy_parse_param+0x116/0x880 [ 2198.890652][T28162] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2198.926724][T28162] ? security_fs_context_parse_param+0x81/0xb0 [ 2198.926739][T28162] ? logfc+0x700/0x700 [ 2198.926753][T28162] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2198.926777][T28162] ? vfs_parse_fs_param+0xcd/0x540 [ 2198.948274][T28162] ? kfree+0x1fd/0x2c0 [ 2198.948293][T28162] ? vfs_parse_fs_string+0x116/0x170 [ 2198.948307][T28162] ? vfs_parse_fs_param+0x540/0x540 [ 2198.948323][T28162] ? btrfs_decode_error+0x70/0x70 [ 2198.948337][T28162] legacy_get_tree+0x108/0x220 [ 2198.948352][T28162] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2198.948371][T28162] vfs_get_tree+0x8e/0x390 [ 2198.978826][T28162] fc_mount+0x17/0xc0 [ 2198.978842][T28162] vfs_kern_mount.part.0+0xd8/0xf0 [ 2198.978857][T28162] vfs_kern_mount+0x40/0x60 [ 2198.978872][T28162] btrfs_mount+0x2b4/0x15e2 [ 2198.978891][T28162] ? fs_parse+0x53c/0xf70 [ 2199.005575][T28162] ? btrfs_remount+0x10f0/0x10f0 [ 2199.010494][T28162] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2199.016713][T28162] ? cred_has_capability+0x199/0x330 [ 2199.021977][T28162] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 2199.027588][T28162] ? logfc+0x700/0x700 [ 2199.031634][T28162] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2199.037851][T28162] ? legacy_parse_param+0x116/0x880 [ 2199.043028][T28162] ? security_fs_context_parse_param+0x81/0xb0 [ 2199.049156][T28162] ? logfc+0x700/0x700 [ 2199.053206][T28162] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2199.059422][T28162] ? vfs_parse_fs_param+0xcd/0x540 [ 2199.064513][T28162] ? selinux_capable+0x36/0x40 [ 2199.069259][T28162] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2199.075475][T28162] ? btrfs_remount+0x10f0/0x10f0 [ 2199.080393][T28162] legacy_get_tree+0x108/0x220 [ 2199.085140][T28162] ? legacy_get_tree+0x108/0x220 [ 2199.090056][T28162] vfs_get_tree+0x8e/0x390 [ 2199.094471][T28162] do_mount+0x13b3/0x1c30 [ 2199.098786][T28162] ? copy_mount_string+0x40/0x40 [ 2199.103703][T28162] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2199.109919][T28162] ? copy_mount_options+0x2e8/0x3f0 [ 2199.115098][T28162] ksys_mount+0xdb/0x150 [ 2199.119321][T28162] __x64_sys_mount+0xbe/0x150 [ 2199.123977][T28162] do_syscall_64+0xfd/0x6a0 [ 2199.128464][T28162] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2199.134334][T28162] RIP: 0033:0x45c2ca [ 2199.138209][T28162] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 09:11:00 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000010000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:11:00 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x8dffffff, 0x5}}}}}}}, 0x0) 09:11:00 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0xf0, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:11:00 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x800e0000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:11:00 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf6ffffff, 0x0) 09:11:00 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0xb2000000, 0x5}}}}}}}, 0x0) [ 2199.157805][T28162] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2199.166194][T28162] RAX: ffffffffffffffda RBX: 00007f9e2b362b40 RCX: 000000000045c2ca [ 2199.174142][T28162] RDX: 00007f9e2b362ae0 RSI: 0000000020000100 RDI: 00007f9e2b362b00 [ 2199.182093][T28162] RBP: 0000000000000001 R08: 00007f9e2b362b40 R09: 00007f9e2b362ae0 [ 2199.190040][T28162] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2199.197988][T28162] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 09:11:00 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:11:00 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0xf5ffffff, 0x5}}}}}}}, 0x0) 09:11:01 executing program 5 (fault-call:0 fault-nth:78): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:11:01 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x80350000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:11:01 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:11:01 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0xff000000, 0x5}}}}}}}, 0x0) 09:11:01 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000023000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:11:01 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x543, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:11:01 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x81000000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:11:01 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xf9fdffff, 0x0) 09:11:01 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0xffffa888, 0x5}}}}}}}, 0x0) 09:11:01 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x5dc, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:11:01 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x86ddffff, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:11:01 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2199.631325][T28206] FAULT_INJECTION: forcing a failure. [ 2199.631325][T28206] name failslab, interval 1, probability 0, space 0, times 0 [ 2199.661427][T28206] CPU: 1 PID: 28206 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2199.669521][T28206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2199.679566][T28206] Call Trace: [ 2199.679592][T28206] dump_stack+0x172/0x1f0 [ 2199.687166][T28206] should_fail.cold+0xa/0x15 [ 2199.691756][T28206] ? fault_create_debugfs_attr+0x180/0x180 [ 2199.697648][T28206] ? page_to_nid.part.0+0x20/0x20 [ 2199.702667][T28206] ? ___might_sleep+0x163/0x280 [ 2199.707528][T28206] __should_failslab+0x121/0x190 [ 2199.712460][T28206] should_failslab+0x9/0x14 [ 2199.716957][T28206] kmem_cache_alloc+0x2aa/0x710 [ 2199.721813][T28206] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2199.728052][T28206] ? _atomic_dec_and_lock+0x143/0x210 [ 2199.733423][T28206] getname_kernel+0x53/0x370 [ 2199.738009][T28206] kern_path+0x20/0x40 [ 2199.742077][T28206] lookup_bdev.part.0+0x7b/0x1b0 [ 2199.747013][T28206] ? blkdev_open+0x290/0x290 [ 2199.751598][T28206] ? btrfs_open_devices+0x74/0x160 [ 2199.756713][T28206] blkdev_get_by_path+0x81/0x130 [ 2199.761644][T28206] btrfs_get_bdev_and_sb+0x38/0x300 [ 2199.766839][T28206] open_fs_devices+0x6e7/0xc40 [ 2199.771606][T28206] ? btrfs_uuid_rescan_kthread+0x60/0x60 [ 2199.777232][T28206] ? btrfs_scan_one_device+0x5ac/0x710 [ 2199.782693][T28206] btrfs_open_devices+0x140/0x160 [ 2199.787717][T28206] btrfs_mount_root+0x793/0x1290 [ 2199.792657][T28206] ? btrfs_decode_error+0x70/0x70 [ 2199.797701][T28206] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2199.803942][T28206] ? legacy_parse_param+0x116/0x880 [ 2199.809140][T28206] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2199.815375][T28206] ? security_fs_context_parse_param+0x81/0xb0 [ 2199.821524][T28206] ? logfc+0x700/0x700 [ 2199.825591][T28206] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2199.831824][T28206] ? vfs_parse_fs_param+0xcd/0x540 [ 2199.836934][T28206] ? kfree+0x1fd/0x2c0 [ 2199.841001][T28206] ? vfs_parse_fs_string+0x116/0x170 [ 2199.846281][T28206] ? vfs_parse_fs_param+0x540/0x540 [ 2199.851477][T28206] ? btrfs_decode_error+0x70/0x70 [ 2199.856498][T28206] legacy_get_tree+0x108/0x220 [ 2199.861266][T28206] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2199.867506][T28206] vfs_get_tree+0x8e/0x390 [ 2199.871920][T28206] fc_mount+0x17/0xc0 [ 2199.875896][T28206] vfs_kern_mount.part.0+0xd8/0xf0 [ 2199.881005][T28206] vfs_kern_mount+0x40/0x60 [ 2199.885503][T28206] btrfs_mount+0x2b4/0x15e2 [ 2199.890007][T28206] ? fs_parse+0x53c/0xf70 [ 2199.894339][T28206] ? btrfs_remount+0x10f0/0x10f0 [ 2199.899270][T28206] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2199.905508][T28206] ? cred_has_capability+0x199/0x330 [ 2199.910882][T28206] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 2199.916512][T28206] ? logfc+0x700/0x700 [ 2199.920575][T28206] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2199.926810][T28206] ? legacy_parse_param+0x116/0x880 [ 2199.932003][T28206] ? security_fs_context_parse_param+0x81/0xb0 [ 2199.938147][T28206] ? logfc+0x700/0x700 [ 2199.942209][T28206] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2199.948446][T28206] ? vfs_parse_fs_param+0xcd/0x540 [ 2199.953551][T28206] ? selinux_capable+0x36/0x40 [ 2199.958308][T28206] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2199.964544][T28206] ? btrfs_remount+0x10f0/0x10f0 [ 2199.969473][T28206] legacy_get_tree+0x108/0x220 [ 2199.974232][T28206] ? legacy_get_tree+0x108/0x220 [ 2199.979163][T28206] vfs_get_tree+0x8e/0x390 [ 2199.983579][T28206] do_mount+0x13b3/0x1c30 [ 2199.987906][T28206] ? copy_mount_string+0x40/0x40 [ 2199.992841][T28206] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2199.999075][T28206] ? _copy_from_user+0x12c/0x1a0 [ 2200.004006][T28206] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2200.010242][T28206] ? copy_mount_options+0x2e8/0x3f0 [ 2200.015436][T28206] ksys_mount+0xdb/0x150 [ 2200.019682][T28206] __x64_sys_mount+0xbe/0x150 [ 2200.024360][T28206] do_syscall_64+0xfd/0x6a0 [ 2200.028868][T28206] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2200.034750][T28206] RIP: 0033:0x45c2ca [ 2200.038645][T28206] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2200.058243][T28206] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2200.066648][T28206] RAX: ffffffffffffffda RBX: 00007f9e2b362b40 RCX: 000000000045c2ca [ 2200.074614][T28206] RDX: 00007f9e2b362ae0 RSI: 0000000020000100 RDI: 00007f9e2b362b00 [ 2200.082581][T28206] RBP: 0000000000000001 R08: 00007f9e2b362b40 R09: 00007f9e2b362ae0 [ 2200.090548][T28206] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2200.098516][T28206] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 2200.107388][ C0] net_ratelimit: 24 callbacks suppressed [ 2200.107399][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2200.118777][ C0] protocol 88fb is buggy, dev hsr_slave_1 09:11:01 executing program 5 (fault-call:0 fault-nth:79): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00000100000000000100008cffffff005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:11:01 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0xffffca88, 0x5}}}}}}}, 0x0) 09:11:01 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x88470000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:11:01 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x608, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:11:02 executing program 4: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000003f01004d01000000000000000000000048000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 09:11:02 executing program 3: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000600)="8da4363ac0ed0000000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0xfbffffff, 0x0) 09:11:02 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x88480000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:11:02 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x689, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 09:11:02 executing program 2: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x8a, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0xffffdd86, 0x5}}}}}}}, 0x0) [ 2200.309931][T28224] FAULT_INJECTION: forcing a failure. [ 2200.309931][T28224] name failslab, interval 1, probability 0, space 0, times 0 09:11:02 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2200.352966][T28224] CPU: 1 PID: 28224 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2200.361511][T28224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2200.371561][T28224] Call Trace: [ 2200.374862][T28224] dump_stack+0x172/0x1f0 [ 2200.379201][T28224] should_fail.cold+0xa/0x15 [ 2200.383793][T28224] ? fault_create_debugfs_attr+0x180/0x180 [ 2200.389601][T28224] ? btrfs_cache_helper+0x20/0x20 [ 2200.394637][T28224] ? lockdep_init_map+0x1be/0x6d0 [ 2200.399662][T28224] ? ___might_sleep+0x163/0x280 [ 2200.404512][T28224] __should_failslab+0x121/0x190 [ 2200.409456][T28224] should_failslab+0x9/0x14 [ 2200.413954][T28224] __kmalloc+0x2e0/0x770 [ 2200.418194][T28224] ? btrfs_find_device_by_devspec+0x620/0x620 [ 2200.424253][T28224] ? blkdev_put+0x98/0x560 [ 2200.428669][T28224] ? close_fs_devices.part.0+0x25c/0x7d0 [ 2200.434303][T28224] close_fs_devices.part.0+0x25c/0x7d0 [ 2200.439765][T28224] btrfs_close_devices+0xa0/0x200 [ 2200.444795][T28224] btrfs_mount_root+0xf42/0x1290 [ 2200.449741][T28224] ? btrfs_decode_error+0x70/0x70 [ 2200.454771][T28224] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2200.461008][T28224] ? legacy_parse_param+0x116/0x880 [ 2200.466202][T28224] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2200.474696][T28224] ? security_fs_context_parse_param+0x81/0xb0 [ 2200.480845][T28224] ? logfc+0x700/0x700 [ 2200.484916][T28224] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2200.491155][T28224] ? vfs_parse_fs_param+0xcd/0x540 [ 2200.496265][T28224] ? kfree+0x1fd/0x2c0 [ 2200.500332][T28224] ? vfs_parse_fs_string+0x116/0x170 [ 2200.505619][T28224] ? vfs_parse_fs_param+0x540/0x540 [ 2200.510827][T28224] ? btrfs_decode_error+0x70/0x70 [ 2200.515848][T28224] legacy_get_tree+0x108/0x220 [ 2200.520618][T28224] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2200.526861][T28224] vfs_get_tree+0x8e/0x390 [ 2200.531273][T28224] fc_mount+0x17/0xc0 [ 2200.535250][T28224] vfs_kern_mount.part.0+0xd8/0xf0 [ 2200.540360][T28224] vfs_kern_mount+0x40/0x60 [ 2200.544860][T28224] btrfs_mount+0x2b4/0x15e2 [ 2200.549364][T28224] ? fs_parse+0x53c/0xf70 [ 2200.553697][T28224] ? btrfs_remount+0x10f0/0x10f0 [ 2200.558634][T28224] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2200.564874][T28224] ? cred_has_capability+0x199/0x330 [ 2200.570157][T28224] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 2200.575786][T28224] ? logfc+0x700/0x700 [ 2200.579856][T28224] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2200.586091][T28224] ? legacy_parse_param+0x116/0x880 [ 2200.591289][T28224] ? security_fs_context_parse_param+0x81/0xb0 [ 2200.597436][T28224] ? logfc+0x700/0x700 [ 2200.601514][T28224] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2200.607748][T28224] ? vfs_parse_fs_param+0xcd/0x540 [ 2200.612862][T28224] ? selinux_capable+0x36/0x40 [ 2200.617631][T28224] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2200.623871][T28224] ? btrfs_remount+0x10f0/0x10f0 [ 2200.628804][T28224] legacy_get_tree+0x108/0x220 [ 2200.633568][T28224] ? legacy_get_tree+0x108/0x220 [ 2200.638509][T28224] vfs_get_tree+0x8e/0x390 [ 2200.642928][T28224] do_mount+0x13b3/0x1c30 [ 2200.647260][T28224] ? copy_mount_string+0x40/0x40 [ 2200.652192][T28224] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2200.658427][T28224] ? _copy_from_user+0x12c/0x1a0 [ 2200.663365][T28224] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2200.669609][T28224] ? copy_mount_options+0x2e8/0x3f0 [ 2200.674812][T28224] ksys_mount+0xdb/0x150 [ 2200.679065][T28224] __x64_sys_mount+0xbe/0x150 [ 2200.683738][T28224] do_syscall_64+0xfd/0x6a0 [ 2200.688248][T28224] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2200.694136][T28224] RIP: 0033:0x45c2ca [ 2200.698027][T28224] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2200.717709][T28224] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2200.726117][T28224] RAX: ffffffffffffffda RBX: 00007f9e2b362b40 RCX: 000000000045c2ca [ 2200.734081][T28224] RDX: 00007f9e2b362ae0 RSI: 0000000020000100 RDI: 00007f9e2b362b00 [ 2200.742044][T28224] RBP: 0000000000000001 R08: 00007f9e2b362b40 R09: 00007f9e2b362ae0 09:11:02 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) listen(r0, 0x2000002) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x88640000, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2200.750010][T28224] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2200.757975][T28224] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 2200.766215][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2200.772011][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2200.777853][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2200.783608][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2200.799514][T28224] ------------[ cut here ]------------ 09:11:02 executing program 0: syz_emit_ethernet(0xc0, &(0x7f0000000100)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x806, 0x0, 0x0, 0x0, 0xd]}, @local={0xfe, 0x80, [0x2]}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 2200.801930][ T3907] kobject: 'loop4' (00000000fe4f1dcb): kobject_uevent_env [ 2200.804978][T28224] kernel BUG at fs/btrfs/volumes.c:1280! [ 2200.804999][T28224] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 2200.805016][T28224] CPU: 1 PID: 28224 Comm: syz-executor.5 Not tainted 5.3.0-rc5+ #118 [ 2200.820166][ T3907] kobject: 'loop4' (00000000fe4f1dcb): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2200.831791][T28224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2200.831814][T28224] RIP: 0010:close_fs_devices.part.0+0x605/0x7d0 [ 2200.831832][T28224] Code: 00 48 8b 45 b8 c7 80 20 01 00 00 00 00 00 00 48 83 c4 50 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 82 d2 bf fe 0f 0b e8 7b d2 bf fe <0f> 0b 48 8b 7d c0 e8 40 e5 f9 fe e9 3d fd ff ff e8 d6 e5 f9 fe e9 [ 2200.877800][T28224] RSP: 0018:ffff8880563bf798 EFLAGS: 00010246 [ 2200.883866][T28224] RAX: 0000000000040000 RBX: 0000000000000000 RCX: ffffc900109fe000 [ 2200.891832][T28224] RDX: 0000000000040000 RSI: ffffffff82b29f85 RDI: ffff8880aa4001c0 [ 2200.899891][T28224] RBP: ffff8880563bf810 R08: ffff8880a899e340 R09: fffffbfff11cae47 [ 2200.907860][T28224] R10: fffffbfff11cae46 R11: ffffffff88e57233 R12: ffff888097e5bbd0 [ 2200.915825][T28224] R13: ffff88808a8fa4c0 R14: dffffc0000000000 R15: ffff8880954f2000 [ 2200.923796][T28224] FS: 00007f9e2b363700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2200.932715][T28224] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2200.939293][T28224] CR2: 00007ffe36baef9c CR3: 0000000090000000 CR4: 00000000001426e0 [ 2200.947262][T28224] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2200.955229][T28224] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2200.963191][T28224] Call Trace: [ 2200.966493][T28224] btrfs_close_devices+0xa0/0x200 [ 2200.971515][T28224] btrfs_mount_root+0xf42/0x1290 [ 2200.976455][T28224] ? btrfs_decode_error+0x70/0x70 [ 2200.981483][T28224] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2200.987716][T28224] ? legacy_parse_param+0x116/0x880 [ 2200.992915][T28224] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2200.999151][T28224] ? security_fs_context_parse_param+0x81/0xb0 [ 2201.005487][T28224] ? logfc+0x700/0x700 [ 2201.009556][T28224] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2201.015796][T28224] ? vfs_parse_fs_param+0xcd/0x540 [ 2201.020900][T28224] ? kfree+0x1fd/0x2c0 [ 2201.024971][T28224] ? vfs_parse_fs_string+0x116/0x170 [ 2201.030252][T28224] ? vfs_parse_fs_param+0x540/0x540 [ 2201.035455][T28224] ? btrfs_decode_error+0x70/0x70 [ 2201.040475][T28224] legacy_get_tree+0x108/0x220 [ 2201.045248][T28224] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2201.051488][T28224] vfs_get_tree+0x8e/0x390 [ 2201.055900][T28224] fc_mount+0x17/0xc0 [ 2201.059874][T28224] vfs_kern_mount.part.0+0xd8/0xf0 [ 2201.064985][T28224] vfs_kern_mount+0x40/0x60 [ 2201.069486][T28224] btrfs_mount+0x2b4/0x15e2 [ 2201.073987][T28224] ? fs_parse+0x53c/0xf70 [ 2201.078321][T28224] ? btrfs_remount+0x10f0/0x10f0 [ 2201.083258][T28224] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2201.089485][T28224] ? cred_has_capability+0x199/0x330 [ 2201.094753][T28224] ? selinux_sb_eat_lsm_opts+0x700/0x700 [ 2201.100363][T28224] ? logfc+0x700/0x700 [ 2201.104410][T28224] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2201.110630][T28224] ? legacy_parse_param+0x116/0x880 [ 2201.115817][T28224] ? security_fs_context_parse_param+0x81/0xb0 [ 2201.121947][T28224] ? logfc+0x700/0x700 [ 2201.125993][T28224] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2201.132211][T28224] ? vfs_parse_fs_param+0xcd/0x540 [ 2201.137300][T28224] ? selinux_capable+0x36/0x40 [ 2201.142045][T28224] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2201.148274][T28224] ? btrfs_remount+0x10f0/0x10f0 [ 2201.153202][T28224] legacy_get_tree+0x108/0x220 [ 2201.157947][T28224] ? legacy_get_tree+0x108/0x220 [ 2201.162879][T28224] vfs_get_tree+0x8e/0x390 [ 2201.167285][T28224] do_mount+0x13b3/0x1c30 [ 2201.171599][T28224] ? copy_mount_string+0x40/0x40 [ 2201.176517][T28224] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2201.182736][T28224] ? _copy_from_user+0x12c/0x1a0 [ 2201.187655][T28224] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2201.193872][T28224] ? copy_mount_options+0x2e8/0x3f0 [ 2201.199052][T28224] ksys_mount+0xdb/0x150 [ 2201.203278][T28224] __x64_sys_mount+0xbe/0x150 [ 2201.207936][T28224] do_syscall_64+0xfd/0x6a0 [ 2201.212419][T28224] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2201.218300][T28224] RIP: 0033:0x45c2ca [ 2201.222189][T28224] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2201.241768][T28224] RSP: 002b:00007f9e2b362a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2201.250155][T28224] RAX: ffffffffffffffda RBX: 00007f9e2b362b40 RCX: 000000000045c2ca [ 2201.258102][T28224] RDX: 00007f9e2b362ae0 RSI: 0000000020000100 RDI: 00007f9e2b362b00 [ 2201.266062][T28224] RBP: 0000000000000001 R08: 00007f9e2b362b40 R09: 00007f9e2b362ae0 [ 2201.274010][T28224] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 2201.281972][T28224] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000003 [ 2201.289938][T28224] Modules linked in: [ 2201.294010][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2201.297561][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2201.299790][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2201.305465][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2201.312945][T28224] ---[ end trace 38f1427043ee357f ]--- [ 2201.322444][T28224] RIP: 0010:close_fs_devices.part.0+0x605/0x7d0 [ 2201.329063][T28224] Code: 00 48 8b 45 b8 c7 80 20 01 00 00 00 00 00 00 48 83 c4 50 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 82 d2 bf fe 0f 0b e8 7b d2 bf fe <0f> 0b 48 8b 7d c0 e8 40 e5 f9 fe e9 3d fd ff ff e8 d6 e5 f9 fe e9 [ 2201.349318][T28228] kobject: 'loop3' (00000000211425a4): kobject_uevent_env [ 2201.356468][T28228] kobject: 'loop3' (00000000211425a4): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2201.366662][T28224] RSP: 0018:ffff8880563bf798 EFLAGS: 00010246 [ 2201.372937][T28224] RAX: 0000000000040000 RBX: 0000000000000000 RCX: ffffc900109fe000 [ 2201.381227][T28224] RDX: 0000000000040000 RSI: ffffffff82b29f85 RDI: ffff8880aa4001c0 [ 2201.403688][ T3907] kobject: 'loop2' (00000000614049cb): kobject_uevent_env [ 2201.413219][T28243] kobject: 'loop4' (00000000fe4f1dcb): kobject_uevent_env [ 2201.420734][T28243] kobject: 'loop4' (00000000fe4f1dcb): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2201.425257][ T3907] kobject: 'loop2' (00000000614049cb): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2201.438089][T28224] RBP: ffff8880563bf810 R08: ffff8880a899e340 R09: fffffbfff11cae47 [ 2201.444969][ T3907] kobject: 'loop1' (0000000022508c17): kobject_uevent_env [ 2201.467880][T28224] R10: fffffbfff11cae46 R11: ffffffff88e57233 R12: ffff888097e5bbd0 [ 2201.469725][ T3907] kobject: 'loop1' (0000000022508c17): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2201.475923][T28224] R13: ffff88808a8fa4c0 R14: dffffc0000000000 R15: ffff8880954f2000 [ 2201.495068][T28224] FS: 00007f9e2b363700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 2201.497154][ T3907] kobject: 'loop3' (00000000211425a4): kobject_uevent_env [ 2201.504398][T28224] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2201.513387][ T3907] kobject: 'loop3' (00000000211425a4): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 2201.521014][T28224] CR2: 0000000000738000 CR3: 0000000090000000 CR4: 00000000001426e0 [ 2201.529268][ T3907] kobject: 'loop1' (0000000022508c17): kobject_uevent_env [ 2201.536061][T28224] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2201.545897][ T3907] kobject: 'loop1' (0000000022508c17): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 2201.551644][T28224] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2201.562516][ T3907] kobject: 'loop5' (0000000017bc8390): kobject_uevent_env [ 2201.569819][T28224] Kernel panic - not syncing: Fatal exception [ 2201.578582][ T3907] kobject: 'loop5' (0000000017bc8390): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2201.593790][T28224] Kernel Offset: disabled [ 2201.598106][T28224] Rebooting in 86400 seconds..