lity 0, space 0, times 0 [ 526.872881][T32331] CPU: 0 PID: 32331 Comm: syz-executor.2 Not tainted 5.2.0-rc2-next-20190531 #4 23:06:03 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0xffffca88, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:03 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) [ 526.882035][T32331] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 526.892091][T32331] Call Trace: [ 526.895389][T32331] dump_stack+0x172/0x1f0 [ 526.899748][T32331] should_fail.cold+0xa/0x15 [ 526.904361][T32331] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 526.910181][T32331] ? ___might_sleep+0x163/0x280 [ 526.915046][T32331] __should_failslab+0x121/0x190 [ 526.919991][T32331] should_failslab+0x9/0x14 [ 526.924829][T32331] kmem_cache_alloc+0x2af/0x6f0 [ 526.929784][T32331] ? lock_downgrade+0x880/0x880 [ 526.934631][T32331] __kernfs_new_node+0xf0/0x6c0 [ 526.939463][T32331] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 526.944917][T32331] ? wait_for_completion+0x440/0x440 [ 526.950189][T32331] ? mutex_unlock+0xd/0x10 [ 526.954588][T32331] ? kernfs_activate+0x192/0x1f0 [ 526.959507][T32331] kernfs_new_node+0x96/0x120 [ 526.964168][T32331] __kernfs_create_file+0x51/0x340 [ 526.969319][T32331] sysfs_add_file_mode_ns+0x222/0x560 [ 526.974690][T32331] internal_create_group+0x359/0xc40 [ 526.979963][T32331] ? remove_files.isra.0+0x190/0x190 [ 526.985223][T32331] ? bd_set_size+0x3f/0xb0 [ 526.989620][T32331] ? kasan_check_write+0x14/0x20 [ 526.994533][T32331] ? up_write+0xbe/0x1e0 [ 526.998757][T32331] sysfs_create_group+0x20/0x30 [ 527.003586][T32331] lo_ioctl+0x1128/0x2320 [ 527.007901][T32331] ? lo_rw_aio+0x1120/0x1120 [ 527.012473][T32331] blkdev_ioctl+0xece/0x1c10 [ 527.017046][T32331] ? blkpg_ioctl+0xa90/0xa90 [ 527.021617][T32331] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 527.027417][T32331] ? __fget+0x35a/0x550 [ 527.031556][T32331] block_ioctl+0xee/0x130 [ 527.035865][T32331] ? blkdev_fallocate+0x410/0x410 [ 527.040871][T32331] do_vfs_ioctl+0xdb6/0x13e0 [ 527.045454][T32331] ? ioctl_preallocate+0x210/0x210 [ 527.050562][T32331] ? __fget+0x381/0x550 [ 527.054707][T32331] ? ksys_dup3+0x3e0/0x3e0 [ 527.059101][T32331] ? do_sys_open+0x31d/0x5d0 [ 527.063671][T32331] ? tomoyo_file_ioctl+0x23/0x30 [ 527.068605][T32331] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 527.074823][T32331] ? security_file_ioctl+0x8d/0xc0 [ 527.079924][T32331] ksys_ioctl+0xab/0xd0 [ 527.084077][T32331] __x64_sys_ioctl+0x73/0xb0 [ 527.088655][T32331] do_syscall_64+0xfd/0x680 [ 527.093164][T32331] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 527.099043][T32331] RIP: 0033:0x4590e7 [ 527.102935][T32331] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 527.122522][T32331] RSP: 002b:00007f472d0b2a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 527.130914][T32331] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004590e7 [ 527.138865][T32331] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 527.146817][T32331] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 527.154769][T32331] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 527.162725][T32331] R13: 00000000004c7f67 R14: 00000000004de478 R15: 0000000000000004 23:06:04 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x806000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 527.181455][T32331] hfsplus: unable to find HFS+ superblock 23:06:04 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0xff00, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:04 executing program 2 (fault-call:2 fault-nth:25): r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:04 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0xd00000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:04 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0xffffdd86, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:04 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:04 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0xf0ffff, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 527.549195][T32362] FAULT_INJECTION: forcing a failure. [ 527.549195][T32362] name failslab, interval 1, probability 0, space 0, times 0 [ 527.580114][T32362] CPU: 1 PID: 32362 Comm: syz-executor.2 Not tainted 5.2.0-rc2-next-20190531 #4 [ 527.589272][T32362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 527.599343][T32362] Call Trace: [ 527.602650][T32362] dump_stack+0x172/0x1f0 [ 527.607022][T32362] should_fail.cold+0xa/0x15 [ 527.611631][T32362] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 527.617447][T32362] ? ___might_sleep+0x163/0x280 [ 527.622287][T32362] __should_failslab+0x121/0x190 [ 527.627206][T32362] should_failslab+0x9/0x14 [ 527.631751][T32362] kmem_cache_alloc+0x2af/0x6f0 [ 527.636673][T32362] ? lock_downgrade+0x880/0x880 [ 527.641522][T32362] __kernfs_new_node+0xf0/0x6c0 23:06:04 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000001640)={@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x1, 0x0, 0x2, 0x3, {0xa, 0x4e22, 0xfffffffffffffffd, @mcast1, 0xfffffffffffffff7}}}, {&(0x7f0000001500)=""/205, 0xcd}, &(0x7f0000001600), 0x2}, 0xa0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) syz_mount_image$minix(&(0x7f0000000040)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x6, &(0x7f0000001440)=[{&(0x7f0000000180)="918732b1e6fd3af66fa71e07601f1c070acfe044407032e74ef9e425a1cbcd388263b4c55898224f062677a53fed18bd588c5cca4b29458cc4af00cf9206982e63b4405cdf9a5f442a0759694108d3a1d93a32664c6d1aba0c2e7b04733f78dffba4637eb29d5247d14c92acfa9d", 0x6e, 0x2}, {&(0x7f0000000100)="02", 0x1, 0x1ff}, {&(0x7f0000000280)="a3fb5e572649ec913ac382920b7268a12e00ec658058f92bbd89c960117614a50df54c3d348e0bb8b8267cb63a6430c40ef83a9554ebbd3b4cbc2c1bfaf882868710e013336d55bcaf48738361b122f7e9e6eda233e7022b9d4eb244c5af8ddbf910ca7d1447c2d58f135cf2bed3def04138b44548c8b7ebf51c5d58203f3ee4008bce7a0fd9a004a0fafed09c8ead47e327102bf33682c2407e5527dc9aca1143f22ac6b68db884a00ff11bd70f32caaaa637f1cdf7510dc345cfb8a133e294ec747675", 0xc4, 0xfb}, {&(0x7f0000000380)="19c5dd6950ad75f5c738614847f692c8f1fa40084d20916dcf6493cdab127873a35543849ca2be895301421670b699ce9d74b0092b8e3c3765448780c26c6c3e81e6d859082f9ca98f8e20a81ce685cd4f32e7ee292de4c612ed212d3111cc3cf03804161efb1f0bd7badcac240f94188616fae4ea8ee59589976a699b6bd84ae821425083ba", 0x86, 0x40}, {&(0x7f0000000200)="69228fe93038", 0x6, 0xffff}, {&(0x7f0000000440)="7a0c468b30274d2aeb9a5eabb1c6d46ccc8448e718b888e8890184b91e2e73589df558b736fa78724bd13131a50ee68ac16cfdc06af1134f8125bd1058573e28af291c5a9f6f66a7fa1ec9372a4e67f9501d403e672023fc175dada337ab82fcd257f94f77c5405634b2d6f6555fb1bb7779c7b7346ff1835e5cf3022ed0f065fdf3e70d024ad72d65d2de014be2c790371a3e708dc6e8506817227650483ce85cd8bbb631099687588861abd04c2fc33cff451a153b0d498c7c43efd34aaf754fc6d623d3c0285b9331342ca72e5cac16407b6817ffbb827ad1a82a02aef8b7bb8fb570440c6401abe698ed625c8c2e14d6f6acc43eaedae0241df831e7734dc679d1c4bee91d9ebd498413a85476bc76f120ec9825738a5e7aa51763d7438aa731b50cf511f21e3d74bfc006db5b8f529678df3e47da8ba6b826eee1ed826aec728ef4a950deb6836827e9ada60a82ed5eb7f853af39e4bb42e09ec73dab59b824fb31809fd46944e01598985309da1c1295dd4f0393ba660e52da97505e815705260f9a5b7f1c7695deb543ad26174298bdf951f4759ee4f28b63a25bd3e367474c081b34fdda1e5f692f399617f5898fba50a3a67f0c4ea7afd38dcf0e8a4956c4228365e8833e54b4a4381a41423e41c1162b21e1bac96295c7fa5340d420b995beedb4a2790cced2ea40726592855903667a709ba139112b1f6d25c9f86c96bdce06cd6d4b8370b33ea04dcdf81b16abb8b2e8170165cf36a641da6543f966292402b7219295363482c487e6d8a22d47aff0e0a0d8b4c70b292aa24734d93ab7bb2fc101b5bc0eaf4adf9ca889d30e027825e28dcf416a54f296090b858f34eae71fa0da257e1aed91659baa78de000b13e908885e6ac89a34c70baba7d075c9ccd8c775df8b9840f7e97eda1fee55c69101aeab004134a5360c81d5d6415ef25d68b79c70bdae2ab6b209552300a786b3293f301437cb02a0dbbb92ea4c83df3215e3fcb4be259e04323e8b8503110df99275e947df3156e37528803f35264fc360034e478da863e1a9c2e378ef5f2a2384d5050a912e4423327d5bc16a4110346f11f7f32a9bbcfc6b9ce805f8b1b0d20a1416fac7c65f878850c31cbef1397f79db43aa3399fcded59d867b8375cf4124bd3a9b633e603630bd3fa267589e8cbc55e24bbe4cb56e86b6d05b0bd0e77cf9de9be2dada07e13152ea6e03a4d2c16142814a18c67efd460dc68176af20820d922b399f23315069a82551a9930d0125dc26c6d22a89a00f229afe3d48540813b2531c97b28621e56ce8c6927d4a70e2df642e69691d53dd1604c235f956460da19c58b29d4cf1f45d630d48fbd90653fda874f54d649bf4e496affde2612f35a99d63c210ff355490c0e28b2a21a855119160ddbee699909b40c2d7f31fa0b8d6a23339190b053d7ca64ac03b68465782af2469fa5e7eb94a72e5512591b3daef1d469bd96e49cb7a27325cbdd43438f397544f7b6a98a2c993025e7f0765a05b960d0dc961f6311572a7351934bcf6c73746693628a1a9954fc4fc6abe19fc57f71b5de96c22944faf3df2c89eed4967291f528e18a82ffe4b0585ae5d85a97944e61a4e6cbfd7ac50bfe8a0d4233a2e24c16fd4a6f6d84f80c87ff143fde1c6b5db8dde54b34256577338f50484ca15680f2a47fd66bd8ef5bcd495f56f5370afa699bd5cb45ce99b93f61fe176e7e7c61a729f2fb18c9fd6410e530fc30edc5b133d8f812ba6a08b6624c6ae39f6ab8829fb0208e8b32eb0af3852bb22560012d39583f5f31a65728221c950875854465fe163cfbd0f92a0a6f246ef91858896e7f06c9b393a4b34be693058a696d7a3db6b39dea18856ff2a4469b666a9223b7686a55ee0c02208c928ad436868efa223b570ab0ab9158e61065f3db992fcd1c874ae595b1e0557ba050c9e2e2af44b21b719e5d7bf7c55a7efa29ba9016062f0e5b216a0f9f21b09f7be2ed660ed23787f162d415d5e28d434b7e1f9e175ca88ffd00bd6b318f2e8201d7dff53c3127327424ddb6a13b262442072fd6266f743e931292eb9a7fdf860a75657b2d4bac76c17baa2c1236a124317a2ee081220663ea4f0985ab2f17fd51b55359f35a22e3ec730914e419ec9af79cfc2ec4ac720db8123ee549cf5432c82c39e02bb2f7b3cb2d6d2091f28a77b78105d28f4adf8fc2e55c41b72a0e8a2cb4c438f2efd8c3554078f1dd0fb31a0ca5f8e50343a65ec6b6e323149398b5565120b783b8218356c3fef7c01e5dfbc474dfb3e0b23dc3dc076e8875f5f4e9d6ea5943b42203bc3d32c12a691eaa8e096c0781e473be6fb2663b152e7afb165c3d7d39d99b4b16c504ab86a8cf47989ff23cf32f7fa3041e00d5f57cf055dee6874d8c019bb34be2871b56c03dcef52df377a564adf6f5d9365e12a1a50a42be30dbb648b854ad202d9582d04ad82a7be2c00d0f7bad416d8d7924f12e253b2173adc1d2dd4903be49ac9e8db7b7071181936fb5410300d927a72e8a5b5d7beb3fd99d75559f168d8e8e17c4a58c9d821f2160eb161c839986733bca5b21fc65ceef745ef0f1f982cdfe263f1b4ae3cb28e5b20ea423b1bb67fae2fa9361ff84f04563ad85e3568f5542261e2f872dd1088690c8a0e179b2a5f5a55ee8307a90dcea64f856a053f0c7e857a280652948dff2b1dd22910a75e0c665ddb4f53d8393d5650c123a71fd9c7eb085211f31b1b2a80f5d8103a57cb300bda72551d26cc688cbfd41bb0a1ecebc674e5300cbd2b2106d492e130e3178390bac3bde2fcf10e616fa16c9689436b255e80c23f47c68c0f1bc77c6afce8a2d24a490ea440d5958dedf46f3aeb431a34f078e6170a94111c52e8b5d36146bb4ee1dac39c8eef176cfa0ec838735a6de5869a08f9f730b160ffcf9843239107a1897a43b9712f78a4eac979cee0f43b285627b7f536694bf60a66564ec488c43994547189ca91e72e90c21980024b48cdf0ce72e699c812f1a001f939b78ce3a9bf572524f4a0af8b243b064bca72fd69797d96ff7fb96bf79bfc7d673395d099f81a11a81de1d08e5a1a5e5e64afee2a37590cf01e38c78d8b8a2710138e0cf93542dd66582d27a2bc78f045a796baac0dc052126474c7a797e2b0587018d57326d434ce7a62c05d48f4cda5030f292922a46b9e79bc6a2ca9ab8867bcecf5bd0c0d3227031e9a29a8d078e8bb47a00c5e3fc397a464a5c784e824b11bf8a27203f6d5d47f7e6cd1350d1c74fbd2fb2851bdc9157bc56a6eb7d97d26ccd93c98ffd63f33dc04ec16ec84196b45fce935a637fcea779d2f499ba59e8fa7b7868b3a397a6a0d71466824def791335f52ac1510c5e2a1e4c8e383a1f326137dbe3073a5a5319a9661ea46faf361129f6e60f31721fd46e6b7bd3c86043fe431a6b90f2c9c5c5b6db1b1e7aa1c16931277348bacc94e5aac3cf0799c557a15e45e1ed36e780540228e0166e9bf900567b16edb2db4bb77e196332dca8f8c6f07f10f9b91c7fb1f331a172c01e7f065ef9d4f9c2c26c95b7a8edd2f720475031076870472f844d7b613baeecd53a74184d8fd0f1e014d422d9f8f01b80bcfb3eb537b7fb45cea640cf1649c9f98c69e07bf175834029200a1854064173dff8c7f63b5ec0ea0c5068a27d90f2370076937fe9a18c11686fa691408dd68ef1653e8ce347eb4dc3cc00c2b1c3d0be089d2c1eb7703215084fe1e8d9850d9b158d8efad3387d8ac53d1b851c2f14cd96780806244cb7b9f9d614bf761b9df3d16f21a41f7da36d1922cbe8ba286b654e434205afce0c621d2c6a764bb173df9e19f584c0b88fd3594df42dbcdb3931c58c55db24eec465411ce52132f035f23761ce91070c50152a85c266cbb6f33165afe6c706a8d319046b58b2ab514aa691a853689956aadd544aa2b09e8f88dd16924f23aaee01162167c9e449e4416dd66364d7e0d40ed85597b69d05b07f2feb2666e98603cd1c7c15e2cb388464df709de737ae5eb8c027df5c0fece3531bc410fb5a8855a58ac198271b7d085978a2df35ff50ba84be919a59493bcd85551aa5df3f52d73424c80a165d4af0562bdfc817534ef6dd9f6d0036af0c3a56d4ead2bd317fef151ee28193b27089b6f72a640bc19621b0aae7ca24e62e3e6d24a8313dc4fe72ed62148305c0726482445fb9cbaac95365a302e440c0f88990ecf2c40f104611c4ddfd678a7265e6ea7b92fd5848e25f49277eea8303c5a2af6c135168a4a0488e6fe988f13e4a9427373fb8ca5257f96298decb4663c126031c0fc2dfd6a144234fb30f0e61c83844d08e74d82110e1c5917a2380ba0aa8704a6e3cee8bc593bf4a9fc3b129dfd26977f6db9577e33f203cde6f47943df8a2e3e5df87cc3161211555df7849e2e4139a7c051863dadf7529c83cf952ba59ed83fccb1cc5d0529a9982b4644249575e4250596b16f74e2d02cb18c92c9714f9d285b03408d8c23706cf67189aa54dae36cda2c8e89030c9117f5b24015362c0c76dcdd3f5732243191a9e5b6563f4cd5e89e6ce210ce9c0b13e2555b79453228ad18bd8832afb686df2e4dd2a460624b67a71bed248c3ac8a1b18fca6918aa480e3ab038c959a0932fd93aa091f63a680db3505882253b59792b571ab56a5f9657a71ce6a10646b8fc54931822545059125f547a08f31177c8db73ccb3cf16a0a6ce4500d1fd54716be5f54c3ba30aaa7bc3ccdf59825b8d9d0523a7cd0c313df27eda2ac20b64824a82721f2e5789f349c39381122dc4e7550089016c96bb13a3cbb28b341ebf5a68192214336fbc7b3f761a2fda9df2ae031495179f2b8773968b742e12ab46a9928add3f1b10be47a607cf7d26781926ed62b77057df8597257c90d514e35cb9ab99666a119bceb7396a3bd24a007d0d4a363d78732f959e80469261108311e98bb5472a0a7ea7ef242f8ef1779f88ad56e3993d954acdb0f8927b33eb15dd28f0bbedb6d205871dee4ff7c99ae5644f0fd2279c8377c885eb218fa040b1fc5da2a9875f41fd8fa492f362c87bd86177e74060a3a1bc631f86535059dc2541f14e4183992b2276d0d07b52d325c590cb60141531a7659acbe0914e17e3e1695a262c190850107fa5387e23ffa95934f26effe9ae318f894af076c0fe965461c01846e6a584f1e4c4faf14ec39a5178d6fda125c3bebb74635f0d5ed68915929bab3e263314c6c306e150e3f26204af13908604201fa63efca49f84929438896f83e4e6569e99192c577603ce830b35f83d7a2e9110af730e83eb3799d774a91639917a610de913baa317f701d6f2543d9a1847119b5a1bcf4b27701b7e9b0ff4a4c86c4392702d3a8b25200437f8a7f41da3fb03edff12fef9cc8e4ffbbf16f5f8f5887edcd04db12357039f6fdcbc0f3ff70400a473263dbc507c9477325e41a6341305030307cac7a24175e616ede2a3dd0bedb1d66a850a80b31c2dc658c0a59ab4a727e1cda87e31ead03c1f3be2857d47cf72afa6d74d5464c506f011304601170c0281e99ba945f1c9f1a7cc2a9b8b139a759b928a9240f120c1eec2e3bcf2ed6066c865ef262cecb858e4a330a1cfe6f43f4603b585bb7ba5fdc686fa9602a53378a99988c0382196bf5820df6f0ce553ec5aacbdf80a0238ec42669e12608f6201cc2bb3859d1b1136ca23ad2acfa91a8d955caa46174609ad1c9ce6c8775762225aa1c2d71aa5969397c1fc575b39c423180853b71bfb34e793b2528e840d0d9ebcb64b68359fd94f79cc612b36", 0x1000, 0x7ff}], 0x8011, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r1, 0x0, r3, 0x0, 0x100000000ffe0, 0x0) splice(r4, 0x0, r2, 0x0, 0xffffffffffffffc0, 0x0) 23:06:04 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x2800000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:04 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) [ 527.646363][T32362] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 527.651806][T32362] ? wait_for_completion+0x440/0x440 [ 527.657076][T32362] ? mutex_unlock+0xd/0x10 [ 527.661495][T32362] ? kernfs_activate+0x192/0x1f0 [ 527.666441][T32362] kernfs_new_node+0x96/0x120 [ 527.671127][T32362] __kernfs_create_file+0x51/0x340 [ 527.676252][T32362] sysfs_add_file_mode_ns+0x222/0x560 [ 527.681643][T32362] internal_create_group+0x359/0xc40 [ 527.686932][T32362] ? remove_files.isra.0+0x190/0x190 [ 527.692212][T32362] ? bd_set_size+0x3f/0xb0 [ 527.696628][T32362] ? kasan_check_write+0x14/0x20 [ 527.701556][T32362] ? up_write+0xbe/0x1e0 [ 527.705803][T32362] sysfs_create_group+0x20/0x30 [ 527.710721][T32362] lo_ioctl+0x1128/0x2320 [ 527.715031][T32362] ? lo_rw_aio+0x1120/0x1120 [ 527.719609][T32362] blkdev_ioctl+0xece/0x1c10 [ 527.724182][T32362] ? blkpg_ioctl+0xa90/0xa90 [ 527.728782][T32362] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 527.734579][T32362] ? __fget+0x35a/0x550 [ 527.738730][T32362] block_ioctl+0xee/0x130 [ 527.743150][T32362] ? blkdev_fallocate+0x410/0x410 [ 527.748178][T32362] do_vfs_ioctl+0xdb6/0x13e0 [ 527.752757][T32362] ? ioctl_preallocate+0x210/0x210 [ 527.757849][T32362] ? __fget+0x381/0x550 [ 527.761993][T32362] ? ksys_dup3+0x3e0/0x3e0 [ 527.766405][T32362] ? do_sys_open+0x31d/0x5d0 [ 527.770999][T32362] ? tomoyo_file_ioctl+0x23/0x30 [ 527.776009][T32362] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 527.782231][T32362] ? security_file_ioctl+0x8d/0xc0 [ 527.787335][T32362] ksys_ioctl+0xab/0xd0 [ 527.791475][T32362] __x64_sys_ioctl+0x73/0xb0 [ 527.796045][T32362] do_syscall_64+0xfd/0x680 [ 527.800528][T32362] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 527.806403][T32362] RIP: 0033:0x4590e7 [ 527.810283][T32362] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 527.829871][T32362] RSP: 002b:00007f472d0b2a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 527.838268][T32362] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004590e7 [ 527.846221][T32362] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 527.854171][T32362] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 527.862120][T32362] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 527.870070][T32362] R13: 00000000004c7f67 R14: 00000000004de478 R15: 0000000000000004 23:06:04 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0xfffff000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 527.912171][T32362] hfsplus: unable to find HFS+ superblock 23:06:04 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x1000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:04 executing program 2 (fault-call:2 fault-nth:26): r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:05 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0xffffff89, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:05 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x2900000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:05 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:05 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x2000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:05 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x2b00000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 528.249332][T32390] FAULT_INJECTION: forcing a failure. [ 528.249332][T32390] name failslab, interval 1, probability 0, space 0, times 0 [ 528.283905][T32390] CPU: 1 PID: 32390 Comm: syz-executor.2 Not tainted 5.2.0-rc2-next-20190531 #4 23:06:05 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) [ 528.293115][T32390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 528.303212][T32390] Call Trace: [ 528.306526][T32390] dump_stack+0x172/0x1f0 [ 528.310880][T32390] should_fail.cold+0xa/0x15 [ 528.315501][T32390] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 528.321314][T32390] ? ___might_sleep+0x163/0x280 [ 528.326353][T32390] __should_failslab+0x121/0x190 [ 528.331302][T32390] should_failslab+0x9/0x14 [ 528.335809][T32390] kmem_cache_alloc+0x2af/0x6f0 [ 528.340649][T32390] ? lock_downgrade+0x880/0x880 [ 528.345512][T32390] __kernfs_new_node+0xf0/0x6c0 [ 528.350369][T32390] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 528.355835][T32390] ? wait_for_completion+0x440/0x440 [ 528.361115][T32390] ? mutex_unlock+0xd/0x10 [ 528.365524][T32390] ? kernfs_activate+0x192/0x1f0 [ 528.370463][T32390] kernfs_new_node+0x96/0x120 [ 528.375132][T32390] __kernfs_create_file+0x51/0x340 [ 528.380318][T32390] sysfs_add_file_mode_ns+0x222/0x560 [ 528.385691][T32390] internal_create_group+0x359/0xc40 [ 528.390985][T32390] ? remove_files.isra.0+0x190/0x190 [ 528.396270][T32390] ? bd_set_size+0x3f/0xb0 [ 528.400702][T32390] ? kasan_check_write+0x14/0x20 [ 528.405655][T32390] ? up_write+0xbe/0x1e0 [ 528.409910][T32390] sysfs_create_group+0x20/0x30 [ 528.414772][T32390] lo_ioctl+0x1128/0x2320 [ 528.419093][T32390] ? lo_rw_aio+0x1120/0x1120 [ 528.423673][T32390] blkdev_ioctl+0xece/0x1c10 [ 528.428271][T32390] ? blkpg_ioctl+0xa90/0xa90 [ 528.432856][T32390] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 528.438648][T32390] ? __fget+0x35a/0x550 [ 528.442789][T32390] block_ioctl+0xee/0x130 [ 528.447102][T32390] ? blkdev_fallocate+0x410/0x410 [ 528.452127][T32390] do_vfs_ioctl+0xdb6/0x13e0 [ 528.456700][T32390] ? ioctl_preallocate+0x210/0x210 [ 528.461792][T32390] ? __fget+0x381/0x550 [ 528.465944][T32390] ? ksys_dup3+0x3e0/0x3e0 [ 528.470351][T32390] ? tomoyo_file_ioctl+0x23/0x30 [ 528.475320][T32390] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 528.481575][T32390] ? security_file_ioctl+0x8d/0xc0 [ 528.486763][T32390] ksys_ioctl+0xab/0xd0 [ 528.490901][T32390] __x64_sys_ioctl+0x73/0xb0 [ 528.495481][T32390] do_syscall_64+0xfd/0x680 [ 528.499972][T32390] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 528.505997][T32390] RIP: 0033:0x4590e7 [ 528.509895][T32390] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 528.530409][T32390] RSP: 002b:00007f472d0b2a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 528.538824][T32390] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004590e7 [ 528.546786][T32390] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 528.554753][T32390] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 528.562749][T32390] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 528.570751][T32390] R13: 00000000004c7f67 R14: 00000000004de478 R15: 0000000000000004 [ 528.672888][T32390] hfsplus: unable to find HFS+ superblock 23:06:05 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x0) splice(r2, 0x0, r2, 0x0, 0x1, 0x0) 23:06:05 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x2c00000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:05 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0xf0ffffffffffff, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:05 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x4000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:05 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:05 executing program 2 (fault-call:2 fault-nth:27): r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:06 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x100000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:06 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x2f00000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 529.059500][T32435] FAULT_INJECTION: forcing a failure. [ 529.059500][T32435] name failslab, interval 1, probability 0, space 0, times 0 [ 529.080456][T32435] CPU: 1 PID: 32435 Comm: syz-executor.2 Not tainted 5.2.0-rc2-next-20190531 #4 [ 529.089522][T32435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 529.099595][T32435] Call Trace: [ 529.103073][T32435] dump_stack+0x172/0x1f0 23:06:06 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:06 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x6000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 529.107429][T32435] should_fail.cold+0xa/0x15 [ 529.112037][T32435] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 529.117869][T32435] ? ___might_sleep+0x163/0x280 [ 529.122740][T32435] __should_failslab+0x121/0x190 [ 529.127710][T32435] should_failslab+0x9/0x14 [ 529.132225][T32435] kmem_cache_alloc_trace+0x2ce/0x750 [ 529.137622][T32435] kobject_uevent_env+0x387/0x101d [ 529.142742][T32435] ? kasan_check_write+0x14/0x20 [ 529.147687][T32435] ? up_write+0xbe/0x1e0 [ 529.151942][T32435] kobject_uevent+0x20/0x26 [ 529.156464][T32435] lo_ioctl+0x11a4/0x2320 [ 529.160800][T32435] ? lo_rw_aio+0x1120/0x1120 [ 529.165389][T32435] blkdev_ioctl+0xece/0x1c10 [ 529.169976][T32435] ? blkpg_ioctl+0xa90/0xa90 [ 529.174554][T32435] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 529.180351][T32435] ? __fget+0x35a/0x550 [ 529.184622][T32435] block_ioctl+0xee/0x130 [ 529.189020][T32435] ? blkdev_fallocate+0x410/0x410 [ 529.194025][T32435] do_vfs_ioctl+0xdb6/0x13e0 [ 529.198610][T32435] ? ioctl_preallocate+0x210/0x210 [ 529.203829][T32435] ? __fget+0x381/0x550 [ 529.207975][T32435] ? ksys_dup3+0x3e0/0x3e0 [ 529.212375][T32435] ? do_sys_open+0x31d/0x5d0 [ 529.216968][T32435] ? tomoyo_file_ioctl+0x23/0x30 [ 529.221991][T32435] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 529.228240][T32435] ? security_file_ioctl+0x8d/0xc0 [ 529.233346][T32435] ksys_ioctl+0xab/0xd0 [ 529.237507][T32435] __x64_sys_ioctl+0x73/0xb0 [ 529.242104][T32435] do_syscall_64+0xfd/0x680 [ 529.246620][T32435] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 529.252506][T32435] RIP: 0033:0x4590e7 [ 529.256390][T32435] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 529.276090][T32435] RSP: 002b:00007f472d0b2a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 529.284505][T32435] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004590e7 [ 529.292478][T32435] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 529.300542][T32435] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 529.308501][T32435] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 529.316467][T32435] R13: 00000000004c7f67 R14: 00000000004de478 R15: 0000000000000004 [ 529.330877][T32435] hfsplus: unable to find HFS+ superblock 23:06:06 executing program 2 (fault-call:2 fault-nth:28): r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:06 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x200000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 529.665199][T32462] FAULT_INJECTION: forcing a failure. [ 529.665199][T32462] name failslab, interval 1, probability 0, space 0, times 0 [ 529.682276][T32462] CPU: 1 PID: 32462 Comm: syz-executor.2 Not tainted 5.2.0-rc2-next-20190531 #4 [ 529.691329][T32462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 529.691342][T32462] Call Trace: [ 529.704689][T32462] dump_stack+0x172/0x1f0 [ 529.709035][T32462] should_fail.cold+0xa/0x15 [ 529.713634][T32462] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 529.713659][T32462] ? ___might_sleep+0x163/0x280 [ 529.713679][T32462] __should_failslab+0x121/0x190 [ 529.729234][T32462] should_failslab+0x9/0x14 [ 529.733745][T32462] kmem_cache_alloc+0x2af/0x6f0 [ 529.738605][T32462] ? __fget+0x381/0x550 [ 529.742783][T32462] getname_flags+0xd6/0x5b0 [ 529.747300][T32462] do_mkdirat+0xa0/0x2a0 [ 529.751550][T32462] ? __ia32_sys_mknod+0xb0/0xb0 [ 529.756403][T32462] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 529.761866][T32462] ? do_syscall_64+0x26/0x680 [ 529.766552][T32462] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 529.772786][T32462] ? do_syscall_64+0x26/0x680 [ 529.777457][T32462] ? lockdep_hardirqs_on+0x418/0x5d0 [ 529.782761][T32462] __x64_sys_mkdir+0x5c/0x80 [ 529.787351][T32462] do_syscall_64+0xfd/0x680 [ 529.791856][T32462] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 529.797727][T32462] RIP: 0033:0x458697 [ 529.801601][T32462] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 529.821195][T32462] RSP: 002b:00007f472d0b2a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 529.829593][T32462] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458697 [ 529.837569][T32462] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000240 [ 529.845530][T32462] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 529.853496][T32462] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 529.861447][T32462] R13: 00000000004c7f67 R14: 00000000004de478 R15: 0000000000000004 23:06:06 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(r0, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r1, 0x0, r3, 0x0, 0x100000000ffe0, 0x0) splice(r4, 0x0, r2, 0x0, 0xffffffffffffffc0, 0x0) 23:06:06 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x3c00000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:06 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:06 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x8000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:06 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x400000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:06 executing program 2 (fault-call:2 fault-nth:29): r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:07 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x8060000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:07 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) [ 530.090373][T32479] FAULT_INJECTION: forcing a failure. [ 530.090373][T32479] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 530.103617][T32479] CPU: 1 PID: 32479 Comm: syz-executor.2 Not tainted 5.2.0-rc2-next-20190531 #4 [ 530.112851][T32479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 530.122920][T32479] Call Trace: [ 530.126228][T32479] dump_stack+0x172/0x1f0 [ 530.130579][T32479] should_fail.cold+0xa/0x15 [ 530.135182][T32479] ? console_unlock+0x781/0xec0 23:06:07 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x4000000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:07 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x600000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 530.140057][T32479] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 530.145881][T32479] ? mark_held_locks+0xf0/0xf0 [ 530.150670][T32479] should_fail_alloc_page+0x50/0x60 [ 530.155880][T32479] __alloc_pages_nodemask+0x1a1/0x8d0 [ 530.161263][T32479] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 530.166910][T32479] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 530.172648][T32479] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 530.178360][T32479] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 530.184150][T32479] cache_grow_begin+0x9d/0x650 [ 530.188981][T32479] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 530.195319][T32479] kmem_cache_alloc_trace+0x67a/0x750 [ 530.200791][T32479] kobject_uevent_env+0x387/0x101d [ 530.208097][T32479] ? kasan_check_write+0x14/0x20 [ 530.213029][T32479] ? up_write+0xbe/0x1e0 [ 530.217269][T32479] kobject_uevent+0x20/0x26 [ 530.221752][T32479] lo_ioctl+0x11a4/0x2320 [ 530.226092][T32479] ? lo_rw_aio+0x1120/0x1120 [ 530.230666][T32479] blkdev_ioctl+0xece/0x1c10 [ 530.235245][T32479] ? blkpg_ioctl+0xa90/0xa90 [ 530.240131][T32479] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 530.245931][T32479] ? __fget+0x35a/0x550 [ 530.250085][T32479] block_ioctl+0xee/0x130 [ 530.254418][T32479] ? blkdev_fallocate+0x410/0x410 [ 530.259426][T32479] do_vfs_ioctl+0xdb6/0x13e0 [ 530.264017][T32479] ? ioctl_preallocate+0x210/0x210 [ 530.269128][T32479] ? __fget+0x381/0x550 [ 530.273282][T32479] ? ksys_dup3+0x3e0/0x3e0 [ 530.277682][T32479] ? do_sys_open+0x31d/0x5d0 [ 530.282262][T32479] ? tomoyo_file_ioctl+0x23/0x30 [ 530.287186][T32479] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 530.293416][T32479] ? security_file_ioctl+0x8d/0xc0 [ 530.298524][T32479] ksys_ioctl+0xab/0xd0 [ 530.302681][T32479] __x64_sys_ioctl+0x73/0xb0 [ 530.307282][T32479] do_syscall_64+0xfd/0x680 [ 530.311781][T32479] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 530.317652][T32479] RIP: 0033:0x4590e7 [ 530.321550][T32479] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 530.341156][T32479] RSP: 002b:00007f472d0b2a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 530.349736][T32479] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004590e7 [ 530.357869][T32479] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 530.365826][T32479] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 530.373786][T32479] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 530.381831][T32479] R13: 00000000004c7f67 R14: 00000000004de478 R15: 0000000000000004 [ 530.409116][T32479] hfsplus: unable to find HFS+ superblock 23:06:07 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x800000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:07 executing program 2 (fault-call:2 fault-nth:30): r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 530.648775][T32503] FAULT_INJECTION: forcing a failure. [ 530.648775][T32503] name failslab, interval 1, probability 0, space 0, times 0 [ 530.722710][T32503] CPU: 1 PID: 32503 Comm: syz-executor.2 Not tainted 5.2.0-rc2-next-20190531 #4 [ 530.731786][T32503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 530.741853][T32503] Call Trace: [ 530.745163][T32503] dump_stack+0x172/0x1f0 [ 530.749515][T32503] should_fail.cold+0xa/0x15 [ 530.754129][T32503] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 530.759955][T32503] ? ___might_sleep+0x163/0x280 [ 530.764827][T32503] __should_failslab+0x121/0x190 [ 530.769782][T32503] should_failslab+0x9/0x14 [ 530.774328][T32503] kmem_cache_alloc+0x2af/0x6f0 [ 530.779186][T32503] ? __fget+0x381/0x550 [ 530.783364][T32503] getname_flags+0xd6/0x5b0 [ 530.787893][T32503] do_mkdirat+0xa0/0x2a0 [ 530.792150][T32503] ? __ia32_sys_mknod+0xb0/0xb0 [ 530.797003][T32503] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 530.802559][T32503] ? do_syscall_64+0x26/0x680 [ 530.807230][T32503] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 530.813277][T32503] ? do_syscall_64+0x26/0x680 [ 530.817940][T32503] ? lockdep_hardirqs_on+0x418/0x5d0 [ 530.823383][T32503] __x64_sys_mkdir+0x5c/0x80 [ 530.827964][T32503] do_syscall_64+0xfd/0x680 [ 530.832469][T32503] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 530.838343][T32503] RIP: 0033:0x458697 [ 530.842224][T32503] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 530.861986][T32503] RSP: 002b:00007f472d0b2a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 23:06:07 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x2, 0x0) getsockname$tipc(r3, &(0x7f0000000080), &(0x7f0000000100)=0x10) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x0) splice(r4, 0x0, r1, 0x0, 0xffffffffffffffc0, 0x0) 23:06:07 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x4305000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:07 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:07 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x806000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:07 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0xd000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 530.870394][T32503] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458697 [ 530.878390][T32503] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000240 [ 530.886434][T32503] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 530.894392][T32503] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 530.902450][T32503] R13: 00000000004c7f67 R14: 00000000004de478 R15: 0000000000000004 23:06:08 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0xd00000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:08 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:08 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x6c00000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:08 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x28000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:08 executing program 2 (fault-call:2 fault-nth:31): r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 531.210982][T32533] FAULT_INJECTION: forcing a failure. [ 531.210982][T32533] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 531.224229][T32533] CPU: 0 PID: 32533 Comm: syz-executor.2 Not tainted 5.2.0-rc2-next-20190531 #4 [ 531.233251][T32533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 531.243311][T32533] Call Trace: [ 531.246620][T32533] dump_stack+0x172/0x1f0 [ 531.250976][T32533] should_fail.cold+0xa/0x15 [ 531.255582][T32533] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 531.261399][T32533] should_fail_alloc_page+0x50/0x60 [ 531.266604][T32533] __alloc_pages_nodemask+0x1a1/0x8d0 [ 531.272082][T32533] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 531.277723][T32533] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 531.277736][T32533] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 531.277755][T32533] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 531.295399][T32533] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 531.295422][T32533] cache_grow_begin+0x9d/0x650 [ 531.306153][T32533] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 531.312591][T32533] kmem_cache_alloc+0x628/0x6f0 [ 531.317464][T32533] ? __fget+0x381/0x550 [ 531.321649][T32533] getname_flags+0xd6/0x5b0 [ 531.326179][T32533] do_mkdirat+0xa0/0x2a0 [ 531.330438][T32533] ? __ia32_sys_mknod+0xb0/0xb0 [ 531.335302][T32533] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 531.340781][T32533] ? do_syscall_64+0x26/0x680 [ 531.345554][T32533] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 531.351634][T32533] ? do_syscall_64+0x26/0x680 [ 531.356329][T32533] ? lockdep_hardirqs_on+0x418/0x5d0 23:06:08 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x2800000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:08 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x2900000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 531.361638][T32533] __x64_sys_mkdir+0x5c/0x80 [ 531.366254][T32533] do_syscall_64+0xfd/0x680 [ 531.370872][T32533] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 531.379702][T32533] RIP: 0033:0x458697 [ 531.379723][T32533] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 531.403279][T32533] RSP: 002b:00007f472d0b2a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 531.403292][T32533] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458697 [ 531.403299][T32533] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000240 [ 531.403305][T32533] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 531.403312][T32533] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 531.403319][T32533] R13: 00000000004c7f67 R14: 00000000004de478 R15: 0000000000000004 [ 531.481207][T32533] hfsplus: unable to find HFS+ superblock 23:06:08 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='me]ory/event3\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$setperm(0x5, r2, 0x22003a) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r0, 0x0, r3, 0x0, 0x100000000ffe0, 0x0) splice(r4, 0x0, r1, 0x0, 0xffffffffffffffc0, 0x0) 23:06:08 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x800e000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:08 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:08 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x2b00000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:08 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x29000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:08 executing program 2 (fault-call:2 fault-nth:32): r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:08 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x2c00000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 531.988745][T32559] FAULT_INJECTION: forcing a failure. [ 531.988745][T32559] name failslab, interval 1, probability 0, space 0, times 0 23:06:09 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, 0x0, 0x0) 23:06:09 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x8035000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 532.038743][T32559] CPU: 1 PID: 32559 Comm: syz-executor.2 Not tainted 5.2.0-rc2-next-20190531 #4 [ 532.048023][T32559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 532.058090][T32559] Call Trace: [ 532.061381][T32559] dump_stack+0x172/0x1f0 [ 532.065719][T32559] should_fail.cold+0xa/0x15 [ 532.070338][T32559] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 532.076168][T32559] ? ___might_sleep+0x163/0x280 [ 532.081032][T32559] __should_failslab+0x121/0x190 [ 532.085961][T32559] should_failslab+0x9/0x14 [ 532.090593][T32559] kmem_cache_alloc+0x2af/0x6f0 [ 532.095922][T32559] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 532.101806][T32559] ? lock_downgrade+0x880/0x880 [ 532.106816][T32559] skb_clone+0x154/0x3d0 [ 532.111278][T32559] netlink_broadcast_filtered+0x86e/0xb20 [ 532.117000][T32559] netlink_broadcast+0x3a/0x50 [ 532.121770][T32559] kobject_uevent_env+0xad4/0x101d [ 532.126891][T32559] kobject_uevent+0x20/0x26 [ 532.131858][T32559] lo_ioctl+0x11a4/0x2320 [ 532.136193][T32559] ? lo_rw_aio+0x1120/0x1120 [ 532.140859][T32559] blkdev_ioctl+0xece/0x1c10 [ 532.145705][T32559] ? blkpg_ioctl+0xa90/0xa90 [ 532.150441][T32559] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 532.156243][T32559] ? __fget+0x35a/0x550 [ 532.160392][T32559] block_ioctl+0xee/0x130 [ 532.180887][T32559] ? blkdev_fallocate+0x410/0x410 [ 532.187181][T32559] do_vfs_ioctl+0xdb6/0x13e0 [ 532.191881][T32559] ? ioctl_preallocate+0x210/0x210 [ 532.197181][T32559] ? __fget+0x381/0x550 [ 532.201351][T32559] ? ksys_dup3+0x3e0/0x3e0 [ 532.208245][T32559] ? tomoyo_file_ioctl+0x23/0x30 [ 532.213184][T32559] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 532.219421][T32559] ? security_file_ioctl+0x8d/0xc0 [ 532.224610][T32559] ksys_ioctl+0xab/0xd0 [ 532.228883][T32559] __x64_sys_ioctl+0x73/0xb0 [ 532.233478][T32559] do_syscall_64+0xfd/0x680 [ 532.237981][T32559] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 532.243947][T32559] RIP: 0033:0x4590e7 [ 532.247844][T32559] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 532.267442][T32559] RSP: 002b:00007f472d0b2a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 532.276022][T32559] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00000000004590e7 [ 532.284070][T32559] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 532.292383][T32559] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 532.300479][T32559] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 532.308643][T32559] R13: 00000000004c7f67 R14: 00000000004de478 R15: 0000000000000004 23:06:09 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x2b000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 532.337609][T32559] hfsplus: unable to find HFS+ superblock 23:06:09 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x8100000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:09 executing program 2 (fault-call:2 fault-nth:33): r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 532.527925][T32581] FAULT_INJECTION: forcing a failure. [ 532.527925][T32581] name failslab, interval 1, probability 0, space 0, times 0 [ 532.543743][T32581] CPU: 0 PID: 32581 Comm: syz-executor.2 Not tainted 5.2.0-rc2-next-20190531 #4 [ 532.552804][T32581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 532.562868][T32581] Call Trace: [ 532.566367][T32581] dump_stack+0x172/0x1f0 [ 532.570713][T32581] should_fail.cold+0xa/0x15 [ 532.575318][T32581] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 532.581141][T32581] ? ___might_sleep+0x163/0x280 [ 532.586012][T32581] __should_failslab+0x121/0x190 [ 532.590970][T32581] should_failslab+0x9/0x14 [ 532.595615][T32581] kmem_cache_alloc+0x2af/0x6f0 [ 532.600471][T32581] ? __fget+0x381/0x550 [ 532.604647][T32581] getname_flags+0xd6/0x5b0 [ 532.609160][T32581] do_mkdirat+0xa0/0x2a0 [ 532.613420][T32581] ? __ia32_sys_mknod+0xb0/0xb0 [ 532.618294][T32581] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 532.623757][T32581] ? do_syscall_64+0x26/0x680 [ 532.628574][T32581] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 532.634646][T32581] ? do_syscall_64+0x26/0x680 [ 532.639433][T32581] ? lockdep_hardirqs_on+0x418/0x5d0 [ 532.644730][T32581] __x64_sys_mkdir+0x5c/0x80 [ 532.649326][T32581] do_syscall_64+0xfd/0x680 [ 532.653931][T32581] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 532.660090][T32581] RIP: 0033:0x458697 [ 532.664105][T32581] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 532.683932][T32581] RSP: 002b:00007f472d0b2a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 532.692351][T32581] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458697 [ 532.700333][T32581] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000240 [ 532.708480][T32581] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 532.716455][T32581] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 532.724606][T32581] R13: 00000000004c7f67 R14: 00000000004de478 R15: 0000000000000004 23:06:09 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000000915, &(0x7f0000000040)="0adc1f123c123f319bc170") splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x0) splice(r3, 0x0, r1, 0x0, 0xffffffffffffffc0, 0x0) 23:06:09 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x2f00000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:09 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, 0x0, 0x0) 23:06:09 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x2c000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:09 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x86ddffff00000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:09 executing program 2 (fault-call:2 fault-nth:34): r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 532.954062][T32591] FAULT_INJECTION: forcing a failure. [ 532.954062][T32591] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 532.967571][T32591] CPU: 0 PID: 32591 Comm: syz-executor.2 Not tainted 5.2.0-rc2-next-20190531 #4 [ 532.976607][T32591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 532.986677][T32591] Call Trace: [ 532.989990][T32591] dump_stack+0x172/0x1f0 [ 532.994341][T32591] should_fail.cold+0xa/0x15 [ 532.998970][T32591] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 533.004801][T32591] should_fail_alloc_page+0x50/0x60 [ 533.010010][T32591] __alloc_pages_nodemask+0x1a1/0x8d0 [ 533.015492][T32591] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 533.021146][T32591] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 533.026882][T32591] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 533.032619][T32591] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 533.038874][T32591] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 533.044698][T32591] cache_grow_begin+0x9d/0x650 [ 533.049643][T32591] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 533.055898][T32591] kmem_cache_alloc+0x628/0x6f0 [ 533.060757][T32591] ? __fget+0x381/0x550 [ 533.064931][T32591] getname_flags+0xd6/0x5b0 [ 533.069479][T32591] do_mkdirat+0xa0/0x2a0 [ 533.073737][T32591] ? __ia32_sys_mknod+0xb0/0xb0 [ 533.078737][T32591] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 533.084296][T32591] ? do_syscall_64+0x26/0x680 [ 533.089073][T32591] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 533.095234][T32591] ? do_syscall_64+0x26/0x680 [ 533.100149][T32591] ? lockdep_hardirqs_on+0x418/0x5d0 [ 533.105795][T32591] __x64_sys_mkdir+0x5c/0x80 [ 533.110403][T32591] do_syscall_64+0xfd/0x680 [ 533.115009][T32591] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 533.120914][T32591] RIP: 0033:0x458697 [ 533.124819][T32591] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 533.144435][T32591] RSP: 002b:00007f472d0b2a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 23:06:10 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x2f000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:10 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x8847000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:10 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, 0x0, 0x0) 23:06:10 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x3c00000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 533.152967][T32591] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458697 [ 533.161180][T32591] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000240 [ 533.169489][T32591] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 533.177469][T32591] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 533.185796][T32591] R13: 00000000004c7f67 R14: 00000000004de478 R15: 0000000000000004 [ 533.271377][T32591] hfsplus: unable to find HFS+ superblock 23:06:10 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x4000000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:10 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x3c000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:11 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r2, &(0x7f0000000200)=ANY=[], 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={0x0, 0x6000000000000000}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000100)={r3, 0x8}, 0x8) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x140) flistxattr(r2, &(0x7f0000000280)=""/74, 0x4a) r4 = socket$inet_udplite(0x2, 0x2, 0x88) write$P9_RSTAT(r0, &(0x7f0000000180)={0x79, 0x7d, 0x1, {0x0, 0x72, 0x8, 0x49c, {0x1, 0x0, 0x4}, 0x6a200000, 0x0, 0x1f, 0x59f2, 0xe, 'memory.events\x00', 0xe, 'memory.events\x00', 0x15, 'bdeveth1trustedvmnet0', 0xe, 'memory.events\x00'}}, 0x79) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x0) splice(r4, 0x0, r1, 0x0, 0xffffffffffffffc0, 0x0) 23:06:11 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x3f000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:11 executing program 2 (fault-call:2 fault-nth:35): r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:11 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x8848000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:11 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x0, @loopback}, 0x10) 23:06:11 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x4305000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 534.185152][T32618] FAULT_INJECTION: forcing a failure. [ 534.185152][T32618] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 534.198588][T32618] CPU: 0 PID: 32618 Comm: syz-executor.2 Not tainted 5.2.0-rc2-next-20190531 #4 [ 534.210161][T32618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 534.220233][T32618] Call Trace: [ 534.223680][T32618] dump_stack+0x172/0x1f0 [ 534.228211][T32618] should_fail.cold+0xa/0x15 [ 534.232949][T32618] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 534.238779][T32618] should_fail_alloc_page+0x50/0x60 [ 534.244181][T32618] __alloc_pages_nodemask+0x1a1/0x8d0 [ 534.249568][T32618] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 534.255218][T32618] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 534.260945][T32618] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 534.266587][T32618] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 534.272847][T32618] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 534.278667][T32618] cache_grow_begin+0x9d/0x650 [ 534.283444][T32618] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 534.289693][T32618] kmem_cache_alloc+0x628/0x6f0 [ 534.294708][T32618] ? __fget+0x381/0x550 [ 534.298887][T32618] getname_flags+0xd6/0x5b0 [ 534.303424][T32618] do_mkdirat+0xa0/0x2a0 [ 534.307677][T32618] ? __ia32_sys_mknod+0xb0/0xb0 [ 534.312597][T32618] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 534.318063][T32618] ? do_syscall_64+0x26/0x680 [ 534.322745][T32618] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 534.328815][T32618] ? do_syscall_64+0x26/0x680 [ 534.333496][T32618] ? lockdep_hardirqs_on+0x418/0x5d0 [ 534.338794][T32618] __x64_sys_mkdir+0x5c/0x80 [ 534.343390][T32618] do_syscall_64+0xfd/0x680 [ 534.347912][T32618] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 534.353807][T32618] RIP: 0033:0x458697 [ 534.357710][T32618] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 534.377509][T32618] RSP: 002b:00007f472d0b2a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 23:06:11 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x0, @loopback}, 0x10) 23:06:11 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x8864000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:11 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x6c00000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:11 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x40000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 534.386278][T32618] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458697 [ 534.394949][T32618] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000240 [ 534.402963][T32618] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 534.411127][T32618] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 534.419110][T32618] R13: 00000000004c7f67 R14: 00000000004de478 R15: 0000000000000004 23:06:11 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x88a8ffff00000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:11 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x43050000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 534.530923][T32618] hfsplus: unable to find HFS+ superblock 23:06:12 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_int(r2, 0x6, 0xc, &(0x7f0000000040)=0x40, 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xe4fd4ef8) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r2, 0xc0045540, &(0x7f0000000080)=0xdc) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r1, 0x0, r3, 0x0, 0x100000000ffe0, 0x0) splice(r4, 0x0, r2, 0x0, 0xffffffffffffffc0, 0x0) 23:06:12 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x0, @loopback}, 0x10) 23:06:12 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x800e000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:12 executing program 2 (fault-call:2 fault-nth:36): r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:12 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x88caffff00000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:12 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x6c000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:12 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x8035000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:12 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x8906000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:12 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x800e0000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:12 executing program 3 (fault-call:4 fault-nth:0): r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) [ 535.448097][T32647] FAULT_INJECTION: forcing a failure. [ 535.448097][T32647] name failslab, interval 1, probability 0, space 0, times 0 [ 535.523688][T32647] CPU: 1 PID: 32647 Comm: syz-executor.2 Not tainted 5.2.0-rc2-next-20190531 #4 [ 535.533009][T32647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 535.543092][T32647] Call Trace: [ 535.546402][T32647] dump_stack+0x172/0x1f0 [ 535.550753][T32647] should_fail.cold+0xa/0x15 [ 535.555368][T32647] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 535.561214][T32647] ? ___might_sleep+0x163/0x280 [ 535.566117][T32647] __should_failslab+0x121/0x190 23:06:12 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x89ffffff00000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:12 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x80350000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 535.571062][T32647] ? ratelimit_state_init+0xb0/0xb0 [ 535.576271][T32647] should_failslab+0x9/0x14 [ 535.580791][T32647] kmem_cache_alloc+0x2af/0x6f0 [ 535.585756][T32647] ? tomoyo_path_number_perm+0x214/0x520 [ 535.591406][T32647] ? kfree+0x170/0x220 [ 535.595488][T32647] ? ratelimit_state_init+0xb0/0xb0 [ 535.600709][T32647] ext4_alloc_inode+0x1f/0x640 [ 535.605487][T32647] ? ratelimit_state_init+0xb0/0xb0 [ 535.610701][T32647] alloc_inode+0x68/0x1e0 [ 535.615050][T32647] new_inode_pseudo+0x19/0xf0 [ 535.619746][T32647] new_inode+0x1f/0x40 [ 535.623834][T32647] __ext4_new_inode+0x377/0x5440 [ 535.628878][T32647] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 535.634925][T32647] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 535.641180][T32647] ? __dquot_initialize+0x525/0xd80 [ 535.646571][T32647] ? ext4_free_inode+0x1450/0x1450 [ 535.651699][T32647] ? dqget+0x10c0/0x10c0 [ 535.656067][T32647] ext4_mkdir+0x3d5/0xdf0 [ 535.660417][T32647] ? ext4_init_dot_dotdot+0x520/0x520 [ 535.665802][T32647] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 535.672056][T32647] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 535.678317][T32647] ? security_inode_permission+0xcb/0x100 [ 535.684148][T32647] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 535.690397][T32647] ? security_inode_mkdir+0xe4/0x120 [ 535.695702][T32647] vfs_mkdir+0x42e/0x670 [ 535.699960][T32647] do_mkdirat+0x234/0x2a0 [ 535.704301][T32647] ? __ia32_sys_mknod+0xb0/0xb0 [ 535.709166][T32647] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 535.714789][T32647] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 535.720873][T32647] ? do_syscall_64+0x26/0x680 [ 535.725713][T32647] ? lockdep_hardirqs_on+0x418/0x5d0 [ 535.725750][T32647] __x64_sys_mkdir+0x5c/0x80 [ 535.725767][T32647] do_syscall_64+0xfd/0x680 [ 535.725786][T32647] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 535.725796][T32647] RIP: 0033:0x458697 [ 535.725810][T32647] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 535.725817][T32647] RSP: 002b:00007f472d0b2a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 535.725831][T32647] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458697 [ 535.725839][T32647] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000240 [ 535.725851][T32647] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 535.735720][T32647] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 535.746182][T32647] R13: 00000000004c7f67 R14: 00000000004de478 R15: 0000000000000004 [ 535.770998][T32664] FAULT_INJECTION: forcing a failure. [ 535.770998][T32664] name failslab, interval 1, probability 0, space 0, times 0 [ 535.796639][T32664] CPU: 1 PID: 32664 Comm: syz-executor.3 Not tainted 5.2.0-rc2-next-20190531 #4 [ 535.811801][T32664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 535.811807][T32664] Call Trace: [ 535.811826][T32664] dump_stack+0x172/0x1f0 [ 535.811850][T32664] should_fail.cold+0xa/0x15 [ 535.832622][T32664] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 535.832642][T32664] ? ___might_sleep+0x163/0x280 [ 535.832659][T32664] __should_failslab+0x121/0x190 [ 535.832676][T32664] should_failslab+0x9/0x14 [ 535.852230][T32664] kmem_cache_alloc_node+0x261/0x700 [ 535.852249][T32664] ? __sk_dst_check+0x145/0x2e0 [ 535.852268][T32664] __alloc_skb+0xd5/0x5e0 [ 535.852282][T32664] ? skb_trim+0x190/0x190 [ 535.852357][T32664] ? tcp_chrono_stop+0x1f9/0x3b0 [ 535.859905][T32664] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 535.859958][T32664] ? tcp_write_queue_purge+0x842/0x1250 [ 535.859976][T32664] sk_stream_alloc_skb+0x2d2/0xc50 [ 535.870684][T32664] tcp_connect+0xfc3/0x4260 [ 535.870702][T32664] ? trace_hardirqs_on+0x67/0x220 [ 535.870723][T32664] ? tcp_push_one+0x110/0x110 [ 535.880553][T32664] ? dst_release+0x62/0xb0 [ 535.880574][T32664] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 535.890474][T32664] ? sk_setup_caps+0x20a/0x6a0 [ 535.890495][T32664] tcp_v4_connect+0x1514/0x1c40 [ 535.890520][T32664] ? tcp_v4_parse_md5_keys+0x270/0x270 [ 535.899808][T32664] ? lock_sock_nested+0xac/0x120 [ 535.899890][T32664] __inet_stream_connect+0x834/0xe90 [ 535.899909][T32664] ? mark_held_locks+0xa4/0xf0 [ 535.909244][T32664] ? inet_dgram_connect+0x2d0/0x2d0 [ 535.909261][T32664] ? lock_sock_nested+0x9a/0x120 [ 535.909282][T32664] ? trace_hardirqs_on+0x67/0x220 [ 535.921399][T32664] ? lock_sock_nested+0x9a/0x120 [ 535.921419][T32664] ? __local_bh_enable_ip+0x15a/0x270 [ 535.921446][T32664] inet_stream_connect+0x58/0xa0 [ 536.012215][T32664] kernel_connect+0x69/0x90 [ 536.016817][T32664] smc_connect+0x239/0x3a0 [ 536.021252][T32664] __sys_connect+0x264/0x330 [ 536.025859][T32664] ? __ia32_sys_accept+0xb0/0xb0 [ 536.030836][T32664] ? fput+0x1b/0x20 [ 536.034664][T32664] ? ksys_write+0x1cf/0x290 [ 536.039181][T32664] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 536.044646][T32664] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 536.050113][T32664] ? do_syscall_64+0x26/0x680 [ 536.054800][T32664] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 536.060961][T32664] ? do_syscall_64+0x26/0x680 [ 536.065652][T32664] __x64_sys_connect+0x73/0xb0 [ 536.070427][T32664] do_syscall_64+0xfd/0x680 [ 536.074944][T32664] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 536.080879][T32664] RIP: 0033:0x459279 [ 536.084868][T32664] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 536.104494][T32664] RSP: 002b:00007f1e9bd47c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 536.112978][T32664] RAX: ffffffffffffffda RBX: 00007f1e9bd47c90 RCX: 0000000000459279 [ 536.121014][T32664] RDX: 0000000000000010 RSI: 0000000020000300 RDI: 0000000000000003 [ 536.129126][T32664] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 536.137112][T32664] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1e9bd486d4 [ 536.145178][T32664] R13: 00000000004bf740 R14: 00000000004d0c00 R15: 0000000000000005 23:06:13 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x0) splice(r3, 0x0, r3, 0x0, 0xffffffffffffffc0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0xff, 0x40000000000}) 23:06:13 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0xff00000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:13 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x81000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:13 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x8100000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:13 executing program 3 (fault-call:4 fault-nth:1): r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:13 executing program 2 (fault-call:2 fault-nth:37): r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 536.479725][T32675] FAULT_INJECTION: forcing a failure. [ 536.479725][T32675] name failslab, interval 1, probability 0, space 0, times 0 [ 536.509887][T32672] FAULT_INJECTION: forcing a failure. [ 536.509887][T32672] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 536.523816][T32672] CPU: 0 PID: 32672 Comm: syz-executor.2 Not tainted 5.2.0-rc2-next-20190531 #4 [ 536.533103][T32672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 536.543257][T32672] Call Trace: [ 536.546568][T32672] dump_stack+0x172/0x1f0 [ 536.550921][T32672] should_fail.cold+0xa/0x15 [ 536.555530][T32672] ? is_bpf_text_address+0xac/0x170 [ 536.560756][T32672] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 536.566577][T32672] ? is_bpf_text_address+0xac/0x170 [ 536.571801][T32672] should_fail_alloc_page+0x50/0x60 [ 536.577004][T32672] __alloc_pages_nodemask+0x1a1/0x8d0 [ 536.577034][T32672] ? __lock_acquire+0x54f/0x5490 [ 536.577048][T32672] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 536.577071][T32672] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 536.593318][T32672] cache_grow_begin+0x9d/0x650 [ 536.603975][T32672] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 536.610226][T32672] __kmalloc+0x67a/0x740 [ 536.614490][T32672] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 536.620228][T32672] tomoyo_realpath_from_path+0xcd/0x7a0 [ 536.625796][T32672] ? tomoyo_path_number_perm+0x193/0x520 [ 536.631450][T32672] tomoyo_path_number_perm+0x1dd/0x520 [ 536.636933][T32672] ? tomoyo_path_number_perm+0x193/0x520 [ 536.642582][T32672] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 536.648400][T32672] ? debug_check_no_obj_freed+0x211/0x444 [ 536.654140][T32672] ? kasan_check_write+0x14/0x20 [ 536.659243][T32672] ? putname+0xef/0x130 [ 536.663401][T32672] ? putname+0xef/0x130 [ 536.667560][T32672] ? putname+0xef/0x130 [ 536.671724][T32672] ? rcu_read_lock_sched_held+0x110/0x130 [ 536.677451][T32672] ? kmem_cache_free+0x222/0x260 [ 536.682543][T32672] tomoyo_path_mkdir+0xaa/0xf0 [ 536.687319][T32672] ? tomoyo_file_ioctl+0x30/0x30 [ 536.692277][T32672] ? kern_path_mountpoint+0x40/0x40 [ 536.697503][T32672] ? strncpy_from_user+0x2b4/0x400 [ 536.702634][T32672] security_path_mkdir+0x113/0x170 [ 536.707846][T32672] do_mkdirat+0x160/0x2a0 [ 536.712188][T32672] ? __ia32_sys_mknod+0xb0/0xb0 [ 536.717062][T32672] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 536.722801][T32672] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 23:06:13 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0xfffffffffffff000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:13 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x7, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 536.722816][T32672] ? do_syscall_64+0x26/0x680 [ 536.722835][T32672] ? lockdep_hardirqs_on+0x418/0x5d0 [ 536.738846][T32672] __x64_sys_mkdir+0x5c/0x80 [ 536.743447][T32672] do_syscall_64+0xfd/0x680 [ 536.748080][T32672] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 536.753972][T32672] RIP: 0033:0x458697 [ 536.753987][T32672] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 23:06:13 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x108, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:13 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x86ddffff, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 536.754000][T32672] RSP: 002b:00007f472d0b2a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 536.786216][T32672] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458697 [ 536.794291][T32672] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000240 [ 536.802287][T32672] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 536.810358][T32672] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 536.818525][T32672] R13: 00000000004c7f67 R14: 00000000004de478 R15: 0000000000000004 [ 536.835105][T32675] CPU: 1 PID: 32675 Comm: syz-executor.3 Not tainted 5.2.0-rc2-next-20190531 #4 [ 536.844166][T32675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 536.854399][T32675] Call Trace: [ 536.857699][T32675] dump_stack+0x172/0x1f0 [ 536.862092][T32675] should_fail.cold+0xa/0x15 [ 536.866704][T32675] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 536.872531][T32675] ? ___might_sleep+0x163/0x280 [ 536.877403][T32675] __should_failslab+0x121/0x190 [ 536.882467][T32675] should_failslab+0x9/0x14 [ 536.887166][T32675] kmem_cache_alloc_node_trace+0x26d/0x720 [ 536.893009][T32675] __kmalloc_node_track_caller+0x3d/0x70 [ 536.898748][T32675] __kmalloc_reserve.isra.0+0x40/0xf0 [ 536.904158][T32675] __alloc_skb+0x10b/0x5e0 [ 536.908599][T32675] ? skb_trim+0x190/0x190 [ 536.912945][T32675] ? tcp_chrono_stop+0x1f9/0x3b0 [ 536.917985][T32675] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 536.924239][T32675] ? tcp_write_queue_purge+0x842/0x1250 [ 536.929916][T32675] sk_stream_alloc_skb+0x2d2/0xc50 [ 536.935175][T32675] tcp_connect+0xfc3/0x4260 [ 536.939699][T32675] ? trace_hardirqs_on+0x67/0x220 [ 536.944751][T32675] ? tcp_push_one+0x110/0x110 [ 536.949724][T32675] ? dst_release+0x62/0xb0 [ 536.949742][T32675] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 536.949756][T32675] ? sk_setup_caps+0x20a/0x6a0 [ 536.949773][T32675] tcp_v4_connect+0x1514/0x1c40 [ 536.949800][T32675] ? tcp_v4_parse_md5_keys+0x270/0x270 [ 536.949818][T32675] ? lock_sock_nested+0xac/0x120 23:06:13 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:13 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x88470000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 536.965313][T32675] __inet_stream_connect+0x834/0xe90 [ 536.965332][T32675] ? mark_held_locks+0xa4/0xf0 [ 536.965350][T32675] ? inet_dgram_connect+0x2d0/0x2d0 [ 536.976319][T32675] ? lock_sock_nested+0x9a/0x120 [ 536.976338][T32675] ? trace_hardirqs_on+0x67/0x220 [ 536.976353][T32675] ? lock_sock_nested+0x9a/0x120 [ 536.976370][T32675] ? __local_bh_enable_ip+0x15a/0x270 [ 536.976395][T32675] inet_stream_connect+0x58/0xa0 [ 536.986626][T32675] kernel_connect+0x69/0x90 [ 536.986647][T32675] smc_connect+0x239/0x3a0 [ 536.986665][T32675] __sys_connect+0x264/0x330 [ 536.986680][T32675] ? __ia32_sys_accept+0xb0/0xb0 [ 536.986699][T32675] ? fput+0x1b/0x20 [ 536.996627][T32675] ? ksys_write+0x1cf/0x290 [ 536.996648][T32675] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 536.996664][T32675] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 536.996677][T32675] ? do_syscall_64+0x26/0x680 [ 536.996691][T32675] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 536.996708][T32675] ? do_syscall_64+0x26/0x680 [ 537.006756][T32675] __x64_sys_connect+0x73/0xb0 [ 537.006777][T32675] do_syscall_64+0xfd/0x680 [ 537.006797][T32675] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 537.006808][T32675] RIP: 0033:0x459279 [ 537.006826][T32675] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 537.017185][T32675] RSP: 002b:00007f1e9bd47c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 537.017199][T32675] RAX: ffffffffffffffda RBX: 00007f1e9bd47c90 RCX: 0000000000459279 [ 537.017207][T32675] RDX: 0000000000000010 RSI: 0000000020000300 RDI: 0000000000000003 [ 537.017215][T32675] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 537.017224][T32675] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1e9bd486d4 [ 537.017232][T32675] R13: 00000000004bf740 R14: 00000000004d0c00 R15: 0000000000000005 [ 537.154944][T32672] hfsplus: unable to find HFS+ superblock 23:06:14 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") dup3(r0, r2, 0x0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x100000000ffe0, 0x0) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffc0, 0x0) 23:06:14 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x86ddffff00000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:14 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x88480000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:14 executing program 3 (fault-call:4 fault-nth:2): r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:14 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x4, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:14 executing program 2 (fault-call:2 fault-nth:38): r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 537.819295][T32703] FAULT_INJECTION: forcing a failure. [ 537.819295][T32703] name failslab, interval 1, probability 0, space 0, times 0 [ 537.834180][T32704] FAULT_INJECTION: forcing a failure. [ 537.834180][T32704] name failslab, interval 1, probability 0, space 0, times 0 [ 537.861386][T32703] CPU: 0 PID: 32703 Comm: syz-executor.3 Not tainted 5.2.0-rc2-next-20190531 #4 [ 537.870457][T32703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 537.880515][T32703] Call Trace: [ 537.883815][T32703] dump_stack+0x172/0x1f0 [ 537.888161][T32703] should_fail.cold+0xa/0x15 [ 537.892758][T32703] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 537.898630][T32703] ? __nf_conntrack_find_get+0xb85/0x1370 [ 537.904359][T32703] ? find_held_lock+0x35/0x130 [ 537.909138][T32703] __should_failslab+0x121/0x190 [ 537.914082][T32703] should_failslab+0x9/0x14 [ 537.918578][T32703] kmem_cache_alloc+0x47/0x6f0 [ 537.923347][T32703] ? kasan_check_read+0x11/0x20 [ 537.928200][T32703] __nf_conntrack_alloc+0xdb/0x6c0 [ 537.933323][T32703] init_conntrack.isra.0+0xe2a/0x1170 [ 537.938707][T32703] ? nf_conntrack_alloc+0x50/0x50 [ 537.943738][T32703] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 537.950022][T32703] ? ipt_do_table+0xf13/0x1b80 [ 537.954812][T32703] nf_conntrack_in+0xd93/0x1410 [ 537.959673][T32703] ? nf_conntrack_update+0x950/0x950 [ 537.964959][T32703] ? __do_replace+0x910/0x910 [ 537.969638][T32703] ? get_mctgt_type_thp.isra.0+0x370/0x3d0 [ 537.975451][T32703] ? find_held_lock+0x35/0x130 [ 537.980218][T32703] ipv4_conntrack_local+0x169/0x210 [ 537.985418][T32703] nf_hook_slow+0xbc/0x1e0 [ 537.989842][T32703] __ip_local_out+0x403/0x880 [ 537.994526][T32703] ? ip_finish_output+0xd40/0xd40 [ 537.999563][T32703] ? trace_hardirqs_on+0x67/0x220 [ 538.004594][T32703] ? ip_append_data.part.0+0x170/0x170 [ 538.010065][T32703] ip_local_out+0x2d/0x1b0 [ 538.014485][T32703] __ip_queue_xmit+0x86f/0x1bf0 [ 538.019379][T32703] ? kasan_check_write+0x14/0x20 [ 538.024327][T32703] ip_queue_xmit+0x5a/0x70 [ 538.028738][T32703] __tcp_transmit_skb+0x1a1a/0x3730 [ 538.028752][T32703] ? tcp_connect+0x116f/0x4260 [ 538.028773][T32703] ? __tcp_select_window+0x8b0/0x8b0 [ 538.044147][T32703] ? lockdep_hardirqs_on+0x418/0x5d0 [ 538.049450][T32703] ? trace_hardirqs_on+0x67/0x220 [ 538.054487][T32703] ? tcp_rbtree_insert+0x188/0x200 [ 538.059598][T32703] tcp_connect+0x2e03/0x4260 [ 538.064217][T32703] ? tcp_push_one+0x110/0x110 [ 538.068906][T32703] ? dst_release+0x62/0xb0 [ 538.073331][T32703] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 538.079574][T32703] ? sk_setup_caps+0x20a/0x6a0 [ 538.084345][T32703] tcp_v4_connect+0x1514/0x1c40 [ 538.089199][T32703] ? tcp_v4_parse_md5_keys+0x270/0x270 [ 538.094668][T32703] ? lock_sock_nested+0xac/0x120 [ 538.099707][T32703] __inet_stream_connect+0x834/0xe90 [ 538.104992][T32703] ? mark_held_locks+0xa4/0xf0 [ 538.109776][T32703] ? inet_dgram_connect+0x2d0/0x2d0 [ 538.115059][T32703] ? lock_sock_nested+0x9a/0x120 [ 538.119992][T32703] ? trace_hardirqs_on+0x67/0x220 [ 538.125012][T32703] ? lock_sock_nested+0x9a/0x120 [ 538.130045][T32703] ? __local_bh_enable_ip+0x15a/0x270 [ 538.135425][T32703] inet_stream_connect+0x58/0xa0 [ 538.140368][T32703] kernel_connect+0x69/0x90 [ 538.144877][T32703] smc_connect+0x239/0x3a0 [ 538.149297][T32703] __sys_connect+0x264/0x330 [ 538.153879][T32703] ? __ia32_sys_accept+0xb0/0xb0 [ 538.153902][T32703] ? fput+0x1b/0x20 [ 538.153919][T32703] ? ksys_write+0x1cf/0x290 [ 538.167126][T32703] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 538.172588][T32703] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 538.178053][T32703] ? do_syscall_64+0x26/0x680 [ 538.182733][T32703] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 538.188799][T32703] ? do_syscall_64+0x26/0x680 [ 538.193476][T32703] __x64_sys_connect+0x73/0xb0 [ 538.198239][T32703] do_syscall_64+0xfd/0x680 [ 538.202748][T32703] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 538.211149][T32703] RIP: 0033:0x459279 [ 538.215041][T32703] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 538.234728][T32703] RSP: 002b:00007f1e9bd47c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 538.243140][T32703] RAX: ffffffffffffffda RBX: 00007f1e9bd47c90 RCX: 0000000000459279 [ 538.251109][T32703] RDX: 0000000000000010 RSI: 0000000020000300 RDI: 0000000000000003 [ 538.259072][T32703] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 23:06:15 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x6, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:15 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x88640000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:15 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x8847000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 538.267042][T32703] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1e9bd486d4 [ 538.275022][T32703] R13: 00000000004bf740 R14: 00000000004d0c00 R15: 0000000000000005 [ 538.283876][T32704] CPU: 0 PID: 32704 Comm: syz-executor.2 Not tainted 5.2.0-rc2-next-20190531 #4 [ 538.292934][T32704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 538.292940][T32704] Call Trace: [ 538.292960][T32704] dump_stack+0x172/0x1f0 [ 538.292982][T32704] should_fail.cold+0xa/0x15 [ 538.315195][T32704] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 538.321014][T32704] ? ___might_sleep+0x163/0x280 [ 538.325963][T32704] __should_failslab+0x121/0x190 [ 538.330904][T32704] should_failslab+0x9/0x14 [ 538.335406][T32704] __kmalloc+0x2d9/0x740 [ 538.335427][T32704] ? tomoyo_realpath_from_path+0xc0/0x7a0 [ 538.335446][T32704] ? rcu_read_lock_sched_held+0x110/0x130 [ 538.335460][T32704] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 538.335479][T32704] tomoyo_realpath_from_path+0xcd/0x7a0 [ 538.335491][T32704] ? tomoyo_path_number_perm+0x193/0x520 23:06:15 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x8848000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 538.335510][T32704] tomoyo_path_number_perm+0x1dd/0x520 [ 538.335523][T32704] ? tomoyo_path_number_perm+0x193/0x520 [ 538.335538][T32704] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 538.335553][T32704] ? debug_check_no_obj_freed+0x211/0x444 [ 538.335575][T32704] ? kasan_check_write+0x14/0x20 [ 538.335607][T32704] ? putname+0xef/0x130 [ 538.335624][T32704] ? putname+0xef/0x130 [ 538.404013][T32704] ? putname+0xef/0x130 [ 538.408274][T32704] ? rcu_read_lock_sched_held+0x110/0x130 [ 538.414085][T32704] ? kmem_cache_free+0x222/0x260 [ 538.414107][T32704] tomoyo_path_mkdir+0xaa/0xf0 [ 538.414124][T32704] ? tomoyo_file_ioctl+0x30/0x30 [ 538.428729][T32704] ? kern_path_mountpoint+0x40/0x40 [ 538.433928][T32704] ? strncpy_from_user+0x2b4/0x400 [ 538.433954][T32704] security_path_mkdir+0x113/0x170 [ 538.433976][T32704] do_mkdirat+0x160/0x2a0 [ 538.433996][T32704] ? __ia32_sys_mknod+0xb0/0xb0 [ 538.434016][T32704] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 538.458798][T32704] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 538.464872][T32704] ? do_syscall_64+0x26/0x680 [ 538.469566][T32704] ? lockdep_hardirqs_on+0x418/0x5d0 [ 538.474873][T32704] __x64_sys_mkdir+0x5c/0x80 [ 538.479475][T32704] do_syscall_64+0xfd/0x680 [ 538.483990][T32704] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 538.489879][T32704] RIP: 0033:0x458697 [ 538.493864][T32704] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 538.513474][T32704] RSP: 002b:00007f472d0b2a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 23:06:15 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x8864000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 538.521897][T32704] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458697 [ 538.529875][T32704] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000240 [ 538.537858][T32704] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 538.545838][T32704] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 538.553894][T32704] R13: 00000000004c7f67 R14: 00000000004de478 R15: 0000000000000004 23:06:15 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:15 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000040)=0x8) splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x0) splice(r3, 0x0, r1, 0x0, 0xffffffffffffffc0, 0x0) 23:06:15 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x88a8ffff, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:15 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x88a8ffff00000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:15 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:15 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x88caffff00000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:15 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:15 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xd, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:15 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x3, 0x4e23, @loopback}, 0x10) 23:06:15 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x88caffff, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:15 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x8906000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 538.898641][T32704] ERROR: Out of memory at tomoyo_realpath_from_path. 23:06:16 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x28, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:16 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x89060000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 539.293506][T32749] hfsplus: unable to find HFS+ superblock 23:06:16 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod(&(0x7f0000000040)='./file0\x00', 0x8001, 0x0) splice(r1, 0x0, r0, 0x0, 0xffffffffffffffc0, 0x0) 23:06:16 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x89ffffff00000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:16 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x4, 0x4e23, @loopback}, 0x10) 23:06:16 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x29, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:16 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x89ffffff, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:16 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='\nfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:16 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2b, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:16 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0xff00000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:16 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0xff000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:16 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0xfffffffffffff000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:16 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x5, 0x4e23, @loopback}, 0x10) 23:06:16 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2c, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:17 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000080)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x1000, 0x1}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mmap$perf(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000002, 0x110, r0, 0x0) splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x80881, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000040)) splice(r3, 0x0, r1, 0x0, 0xffffffffffffffc0, 0x0) 23:06:17 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0xffffa888, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:17 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x7, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:17 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2f, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:17 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='%fsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:17 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x7, 0x4e23, @loopback}, 0x10) 23:06:17 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x3c, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:17 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0xffffca88, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:17 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x8, 0x4e23, @loopback}, 0x10) 23:06:17 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x108, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:17 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0xffffdd86, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:17 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='\\fsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:18 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:18 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x6c, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:18 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x9, 0x4e23, @loopback}, 0x10) 23:06:18 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0xfffff000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:18 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='h\nsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:18 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PIO_CMAP(r0, 0x4b71, &(0x7f0000000000)={0x5, 0x1000, 0x2, 0xa9f, 0x0, 0xcf}) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) membarrier(0x28, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f00000001c0)={0x0, 0x7fff}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000280)={0x0, 0x35, "c92fdfc08cd386e71c1c963d948bf6a52ded22c538f235bd405311796d0b338edbfc4bc1eff69729b1d43777b0dd9c288161d49444"}, &(0x7f00000002c0)=0x3d) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000300)={r3, 0x6, 0xc5, 0x1, 0x0, 0x0, 0x0, 0x30e, {r4, @in6={{0xa, 0x4e23, 0x80, @ipv4={[], [], @remote}}}, 0x7fff, 0x1, 0x3ff, 0x9, 0x20000000000000}}, &(0x7f00000003c0)=0xb0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x4800, 0x4000) ioctl(r7, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000040)={r2, r0}) splice(r1, 0x0, r5, 0x0, 0x100000000ffe0, 0x0) splice(r6, 0x0, r2, 0x0, 0xffffffffffffffc0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000180)=0x0) fcntl$setown(r5, 0x8, r8) 23:06:18 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xf0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:18 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0xffffff89, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:18 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x4, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:18 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0xa, 0x4e23, @loopback}, 0x10) 23:06:18 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x543, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:18 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='h%splus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:18 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0xf0ffffffffffff, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:18 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x6, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:18 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0xb, 0x4e23, @loopback}, 0x10) 23:06:18 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x600, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:19 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:19 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x100000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:19 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x608, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:19 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0xc, 0x4e23, @loopback}, 0x10) 23:06:19 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xd, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:19 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000040)) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000080)={0x0, 0x7}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000200)={r5, 0x1}, 0x8) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r1, 0x0, r3, 0x0, 0x100000000ffe0, 0x0) connect(r0, &(0x7f0000000240)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0xfffffffffffffd38) splice(r4, 0x0, r2, 0x0, 0xffffffffffffffc0, 0x0) 23:06:19 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='h.splus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:19 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x689, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:19 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x28, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:19 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x18, 0x4e23, @loopback}, 0x10) 23:06:19 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x200000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:19 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x29, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:19 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x806, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:19 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x22, 0x4e23, @loopback}, 0x10) 23:06:19 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x400000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:19 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='h/splus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:19 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2b, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:20 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000080)=""/36, &(0x7f0000000100)=0x24) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r2, &(0x7f00000014c0)=ANY=[@ANYRES16=0x0, @ANYRES32=r1, @ANYRESOCT=r3, @ANYRES32=r1, @ANYRES16=r3, @ANYRESOCT=0x0, @ANYBLOB="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"], 0x103a) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r1, 0x0, r3, 0x0, 0x100000000ffe0, 0x0) splice(r4, 0x0, r2, 0x0, 0xffffffffffffffc0, 0x0) 23:06:20 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x240, 0x4e23, @loopback}, 0x10) 23:06:20 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xd00, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:20 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2c, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:20 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x600000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:20 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='h\\splus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:20 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xe80, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:20 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2f, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:20 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x501, 0x4e23, @loopback}, 0x10) 23:06:20 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x800000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:20 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2800, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:20 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r3 = socket$inet_udplite(0x2, 0x2, 0x88) fsetxattr$security_smack_transmute(r3, &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000080)='TRUE', 0x4, 0x0) ioctl(r2, 0x49, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x0) splice(r3, 0x0, r1, 0x0, 0xffffffffffffffc0, 0x0) 23:06:20 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hf\nplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:20 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x806000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:20 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x51d, 0x4e23, @loopback}, 0x10) 23:06:20 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x3c, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:21 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2900, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:21 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0xd00000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:21 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0xfffffffe, 0x4e23, @loopback}, 0x10) 23:06:21 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x6c, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:21 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2b00, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:21 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x2800000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:21 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback=0x7f000002}, 0x10) 23:06:21 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hf#plus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:21 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xf0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:21 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2c00, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:21 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x2900000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:21 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback=0x7f000003}, 0x10) 23:06:21 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x543, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:21 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2f00, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:21 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r1, 0x0, r3, 0x0, 0x100000000ffe0, 0x0) mkdirat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x1ff) lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='com.apple.system.Security\x00', &(0x7f0000000180)=""/115, 0x73) splice(r4, 0x0, r2, 0x0, 0xffffffffffffffc0, 0x0) 23:06:21 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback=0x7f000004}, 0x10) 23:06:21 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x2b00000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:22 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x3580, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:22 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hf%plus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:22 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback=0x7f000005}, 0x10) 23:06:22 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x2c00000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:22 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x3c00, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:22 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x600, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:22 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x608, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:22 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback=0x7f000007}, 0x10) 23:06:22 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x4000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:22 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000000)={0x38, 0x711e, 0x8, 0x9, 0x8}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r3 = socket$inet_udplite(0x2, 0x2, 0x88) splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x0) splice(r3, 0x0, r1, 0x0, 0xffffffffffffffc0, 0x0) 23:06:22 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x2f00000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:22 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x689, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:22 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hf*plus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:22 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback=0x7f000008}, 0x10) 23:06:22 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x4305, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:23 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x4788, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:23 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback=0x7f000009}, 0x10) 23:06:23 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x3c00000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:23 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x806, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:23 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hf+plus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:23 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x3f00000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:23 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x0) splice(r3, 0x0, r1, 0x0, 0xffffffffffffffc0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x20000, 0x0) 23:06:23 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x4888, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:23 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xd00, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:23 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback=0x7f00000a}, 0x10) 23:06:23 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x4000000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:23 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hf-plus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:24 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xe80, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:24 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback=0x7f00000b}, 0x10) 23:06:24 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x6488, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:24 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x4305000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:24 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2800, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:24 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback=0x7f00000c}, 0x10) 23:06:24 executing program 1: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20ncci\x00', 0x40, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000001280)='/dev/snd/pcmC#D#p\x00', 0x0, 0x200) r2 = openat$cgroup_ro(r1, &(0x7f00000012c0)='cgroup.controllers\x00', 0x26e1, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r2, 0x29, 0x44, &(0x7f0000000100)={'ipvs\x00'}, &(0x7f0000000180)=0x1e) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@dev, @in6=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000000)=0xe8) open_tree(r1, &(0x7f00000000c0)='./file0\x00', 0x8000) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='memory.swap.current\x00', 0x7a05, 0x1700) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000340)={@dev={0xfe, 0x80, [], 0x5}, 0x9, 0x0, 0x0, 0x1, 0x9, 0x7fff}, 0x20) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r4 = socket$inet_udplite(0x2, 0x2, 0x88) pread64(r1, &(0x7f0000000400)=""/134, 0x86, 0x0) ioctl$VIDIOC_DBG_G_REGISTER(r3, 0xc0385650, &(0x7f0000000380)={{0x3, @addr=0x401}, 0x8, 0xd7, 0x5}) ioctl(r4, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") fsetxattr$trusted_overlay_redirect(r2, &(0x7f00000004c0)='trusted.overlay.redirect\x00', &(0x7f0000000500)='./file0\x00', 0x8, 0x3) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x100000000ffe0, 0x0) recvfrom$inet6(r3, &(0x7f0000001300)=""/4096, 0x5fa, 0x1ffd, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @remote, 0x2}, 0xffffff90) splice(r4, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffc0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r2, 0xc0086421, &(0x7f0000000300)={r5, 0x1}) 23:06:24 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x6c00, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:24 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x6c00000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:24 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hf.plus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:24 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2900, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:24 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback=0x7f000010}, 0x10) 23:06:25 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x800e000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:25 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2b00, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:25 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x800e, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:25 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback=0x7f00001c}, 0x10) 23:06:25 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f0000000040)={0x6, 0x2, 0x9, 0x2, 'syz0\x00', 0x101}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x0) splice(r3, 0x0, r1, 0x0, 0xffffffffffffffc0, 0x0) getsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000000180)=""/132, &(0x7f0000000080)=0x84) 23:06:25 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x8035000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:25 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2c00, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:25 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8035, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:25 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hf/plus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:25 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback=0x7f000300}, 0x10) 23:06:25 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2f00, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:25 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x8100000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:25 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8100, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:25 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback=0x7f000501}, 0x10) 23:06:25 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x3580, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:25 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x86ddffff00000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:26 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x5d72afb6) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x0) splice(r3, 0x0, r1, 0x0, 0xffffffffffffffc0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x1}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000100)={r4, 0x5}, &(0x7f0000000180)=0x8) 23:06:26 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hf0plus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:26 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x3c00, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:26 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8847, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:26 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback=0x7f00051d}, 0x10) 23:06:26 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x8847000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:26 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x8848000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:26 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:26 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8848, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:26 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x4000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:26 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x8864000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:26 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfXplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:27 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fsopen(&(0x7f0000000040)='aufs\x00', 0x1) splice(r0, 0x0, r2, 0x0, 0x66f, 0xffffffffffffffff) splice(r2, 0x0, r1, 0x0, 0xffffffffffffffc0, 0x0) 23:06:27 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x4305, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:27 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8864, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:27 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:27 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x88a8ffff00000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:27 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hf\\plus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:27 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x88caffff00000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:27 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8906, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:27 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x4788, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:27 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:27 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xf000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:27 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x8906000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:28 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x6c, &(0x7f0000000380)="0adc1f1244123f319bd0705bff469cac4339c4210bdeef5833704c1fb4ab444297c4ac903215d07209355a") ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000100)={0x0, 0xce8, 0x2, 0x0, 0x0, [{r0, 0x0, 0x9}, {r1, 0x0, 0xcba}]}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x100000000ffe0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$netlink(r3, 0x10e, 0xb, 0x0, &(0x7f0000001040)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000280)={{{@in=@multicast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000040)=0xe8) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000080)={@rand_addr="ce219ba09867e8c4af907e2f266e7ca3", 0x5c, r4}) splice(r2, 0x0, r1, 0x0, 0xffffffffffffffc0, 0x0) setsockopt$inet_opts(r2, 0x0, 0x9, &(0x7f0000000180)="a1e2038b342655bbbf4ca16dce647028017d7e7536bdcbb33f89202656508f980a69604b3103830434dbf6fb62f525209012f36447add3f0f7303b40a3ffeef43d139327edb848d35e19280071451c809d86eaf0acb60ebab1b3d7ff92d2424162c54d3c6554dfca3e2d711e8db8c83d5b9aa101e25bc0d5fef25ca2b111f116a69947b16daf123f527820682597cf18", 0x90) 23:06:28 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x4888, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:28 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfcplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:28 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:28 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xff00, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:28 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x89ffffff00000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:28 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x6488, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:28 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xf0ffff, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:28 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0xff00000000000000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:28 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:28 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0xfffffffffffff000, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:28 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x6c00, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:29 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x0) splice(r3, 0x0, r1, 0x0, 0xffffffffffffffc0, 0x0) 23:06:29 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x1000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:29 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfdplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:29 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:29 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x7, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:29 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x800e, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:29 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8035, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:29 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:29 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:29 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x108, 0x0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:29 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:29 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x4000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:30 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfiplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:30 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8100, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:30 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:30 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x4, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:30 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x6000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:30 executing program 1: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000280)={0x1f, 0xc, 0x1, 0x80000000, 0x0}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000300)={r1, 0x2}, &(0x7f0000000340)=0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xfffffc8f) syz_open_dev$swradio(&(0x7f0000000380)='/dev/swradio#\x00', 0x0, 0x2) write$USERIO_CMD_SEND_INTERRUPT(r4, &(0x7f0000000200)={0x2, 0x8000}, 0x2) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SG_GET_TIMEOUT(r3, 0x2202, 0x0) sendmmsg(r2, &(0x7f0000000700)=[{{&(0x7f00000003c0)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x3, 0x3, 0x0, 0x2}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000440)}], 0x1, &(0x7f00000004c0)=[{0x48, 0x6, 0x10001, "5579371a8f5f7cd22eb10921051a30e0aaf19c9e796935adc77916ff002f925c6c8659c16a0d1b26e58c421353c8e487c029"}, {0x28, 0x1, 0x80, "ef485eab84c4b782e2237f8b406ec7335c2efce7f54c9663"}, {0x40, 0x88, 0x5, "bb57ec0f0a8af586c9cb2e5f6474149eae4bf7ccb426bc81d14e121d3674d24bec0ac37cb371f8b8d0b208"}, {0x78, 0x13f, 0x3, "949ffde87c467b30ad334e7bdf4a9b4973b0f48818fec607df6f8b8a9d02c0930c4147c536253fa1b907439ddc5358f1cd36498350d5f2023662c58092e167bb35689b9458f6e8418af43f7298743892831cd7e5c93c4045dce3862e949d9d26b07230d19345"}, {0xe0, 0x108, 0x6, "cecc7e9ba8e096549a35410595564a51a6a6c04597869d2b4bd9fcbd94678a13ef4b8cd5f97d74461ee46c4b6a6b4d2ba25ad1cf9f2445993dc85e9fa26ce90367f4c9de9426dd755d269c13a6b4deda18bcf905ffd8ecb0cf09ed644b6bc606ad2dcc92f9ac3584785f5d31e637cc28d4f5ed28c609aa923e731cb2fb7fe6f0a0b8d907e83d94af10f423ef1fb5424f8118dd34b12c4580789c306ed7c1e927372bdb354a5e89741a537fe23ed064310bb7fd16764014fc000d947d18fe6c655f94ea2543771aedb3951d132cbb742c"}], 0x208}}], 0x1, 0x400c8c4) ioctl(r6, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r3, 0x0, r5, 0x0, 0x100000000ffe0, 0x0) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r7, 0x2, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000000}, 0x0) splice(r6, 0x0, r4, 0x0, 0xffffffffffffffc0, 0x0) 23:06:30 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x6, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:30 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8847, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:30 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:30 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:30 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:30 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8060000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:30 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hflplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:30 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:30 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8848, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:30 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xd, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:30 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:30 executing program 1: r0 = dup(0xffffffffffffff9c) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x101000, 0x0) splice(r1, 0x0, r1, 0x0, 0x100000000ffe0, 0x0) splice(r3, 0x0, r3, 0x0, 0xffffffffffffffc0, 0x0) 23:06:30 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8864, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:30 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xd000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:30 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:30 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x28, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:30 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfoplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:31 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8906, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:31 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x29, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:31 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:31 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x28000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:31 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xf000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:31 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x29000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:31 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r1, 0x0, r3, 0x0, 0x100000000ffe0, 0x0) splice(r4, 0x0, r2, 0x0, 0xffffffffffffffc0, 0x0) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000040), 0x4) socket$inet6(0xa, 0x80b, 0x7) 23:06:31 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfpplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:31 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2b, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:31 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2b000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:31 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:31 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xff00, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:32 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2c000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:32 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xf0ffff, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:32 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2c, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:32 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:32 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2f000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:32 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x1000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:32 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008916, &(0x7f0000000040)="0adc1f123c123f319bd070") splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x0) splice(r3, 0x0, r1, 0x0, 0xffffffffffffffc0, 0x0) 23:06:32 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2f, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:32 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfuplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:32 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:32 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x3c000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:32 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:33 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x4000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:33 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x40000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:33 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x3c, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:33 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:33 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x6000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:33 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x43050000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:33 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memo\xd2c.awen\a\xf2\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r2 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r2, 0x0, r0, 0x0, 0x20, 0x0) 23:06:33 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfxplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:33 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x6c, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:33 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:33 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:33 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x6c000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:34 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xf0, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:34 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x800e0000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:34 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:34 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8060000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:34 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x543, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:34 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x80350000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:34 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x28000, 0x0) getsockname$unix(r0, &(0x7f0000000180), &(0x7f0000000100)=0x6e) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x200000, 0x0) openat$cgroup_ro(r1, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$void(r2, 0xc0045c79) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r2, 0x0, r4, 0x0, 0x100000000ffe0, 0x0) splice(r5, 0x0, r3, 0x0, 0xffffffffffffffc0, 0x0) 23:06:34 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xd000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:34 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:34 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x600, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:34 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfs\nlus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:34 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x81000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:34 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x86ddffff, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:34 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x28000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:34 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x608, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:34 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:35 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x29000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:35 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x88470000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:35 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x0) splice(r2, 0x0, r1, 0x0, 0xffffffffffbfffc0, 0x0) 23:06:35 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfs#lus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:35 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x689, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:35 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:35 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2b000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:35 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x88480000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:35 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x806, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:35 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:35 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x88640000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:35 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2c000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:35 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xd00, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:35 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x88a8ffff, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:36 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:36 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2f000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:36 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfs%lus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:36 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xe80, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:36 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x88caffff, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:36 executing program 1: syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x3, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000380)='kemory.eve\x86\x01s\x00m\x81\x11\xa7\xf4\x1bkb\x94\xefj\xa2\x98j\x11\x14\xb6\a\xc3\x92\a\xe0\xe1\xaaY\x0e\x15\xd0\x80e^\x1e\x10c.`h\xe0N\x12\xf6N\xa8\x8aX\xfdO\x1d\xc0\r%9\x87\x04\x03\xcb\xc2e#\xad\a>\xa5A\xb1\xcc\xf1(3I\x87\xa3I\x8ewvJ\xadE', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f00000002c0), 0x0, 0x121, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ADDDEST(r4, 0x0, 0x487, &(0x7f0000000480)={{0xff, @multicast2, 0x4e23, 0x2, 'sed\x00', 0x10, 0x6, 0x54}, {@dev={0xac, 0x14, 0x14, 0x1c}, 0x4e21, 0x0, 0x4, 0x0, 0x6}}, 0x44) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r2, 0x0, r4, 0x0, 0x100000000ffe3, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r7 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00634040000000000000000000000000000000000000000000000000000000000000000018000000000000000800000000000000", @ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB="852a62730000000000000000000000000000000000000000852a62730000000000000000000000000000000000000000852a627300"/72], @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000008000000000000000000000000000002821fab208daea40162d34701acddcfd4de318f7"]], 0xfffffd49, 0x2, 0x0}) io_setup(0x8, &(0x7f0000000100)=0x0) io_cancel(r8, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0xea91, r1, &(0x7f0000000180)="ed3445da564002099d", 0x9, 0x81, 0x0, 0x2, r2}, &(0x7f0000000280)) splice(r7, 0x0, r3, 0x0, 0xffffffffffffffc0, 0x0) 23:06:36 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x89060000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:36 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x3c000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:36 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2800, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:36 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:36 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x89ffffff, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 559.943168][ T1163] binder: 1153:1163 ioctl c0306201 20000440 returned -14 23:06:36 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x40000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:36 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2900, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:37 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfs*lus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:37 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:37 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x43050000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:37 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xff000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:37 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x0) splice(r3, 0x0, r1, 0x0, 0xffffffffffffffc0, 0x0) 23:06:37 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2b00, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:37 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xffffa888, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:37 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x6c000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:37 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:37 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfs+lus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:37 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xffffca88, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:37 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:37 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x800e0000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:37 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2c00, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:38 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfs-lus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:38 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xffffdd86, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:38 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r0, 0x0, r2, 0x0, 0x10001, 0x0) splice(r3, 0x0, r1, 0x0, 0xffffffffffffffc0, 0x0) 23:06:38 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x80350000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:38 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2f00, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:38 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xfffff000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:38 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:38 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfs.lus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:38 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xffffff89, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:38 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x3580, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:38 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x81000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:38 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:38 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xf0ffffffffffff, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:38 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfs0lus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:39 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x100, 0x0) splice(r1, 0x0, r3, 0x0, 0x100000000ffe0, 0x0) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f0000000100)={0x4, &(0x7f0000000080), 0x0, r5, 0x1}) splice(r4, 0x0, r2, 0x0, 0xffffffffffffffc0, 0x0) 23:06:39 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x86ddffff, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:39 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x3c00, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:39 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:39 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x100000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:39 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsXlus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:39 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x88470000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:39 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x200000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:39 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x3f00, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:39 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:39 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x400000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:39 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x88480000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:40 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x4000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:40 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:40 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfs\\lus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:40 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x600000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:40 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x88640000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:40 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000500)={0xa, @win={{0xff8, 0xe521, 0x2, 0x76}, 0xf, 0x0, &(0x7f0000000440)={{0x0, 0x2, 0x3, 0x7}, &(0x7f0000000400)={{0x40, 0x3, 0x7ff}, &(0x7f0000000100)={{0x1, 0x1, 0x5a94af6b, 0x2d8}}}}, 0x401, &(0x7f0000000480)="6418bcfc84b38168a281059cf04b1dab5d2733fc390091b8b9ba2daf7551ea8cc2809a248cd91829b0c92b8ba3f924ab676ef9add1881d919607882aa24bb64998c53c7df4bc7e33495466c3f3eb07678340bd609507"}}) ioctl$UI_SET_PHYS(r2, 0x4008556c, &(0x7f0000000280)) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r1, 0x0, r3, 0x0, 0x100000000ffe0, 0x0) ioctl$VIDIOC_G_SLICED_VBI_CAP(r2, 0xc0745645, &(0x7f0000000380)={0xefe, [0x401, 0x7fff, 0x100000001, 0x3, 0x2, 0x5, 0x457, 0xf0, 0x7, 0x40, 0x6, 0x200, 0x3, 0x47, 0x7, 0xffff, 0x20, 0xffffffff, 0xfffffffffffffff9, 0x20, 0x9, 0xafae, 0x1000, 0x6, 0x6, 0x2, 0x7, 0x3, 0xfc3, 0xffffffffffffff01, 0x8, 0x7fffffff, 0x4, 0x6, 0x0, 0x101, 0x2, 0xf1e4, 0x100000001, 0xfffffffffffffffc, 0x5, 0x1, 0x1, 0xc8c, 0x6a96, 0x9, 0x3, 0x7], 0xb}) ioctl$BLKALIGNOFF(r2, 0x127a, &(0x7f0000000040)) write(r4, &(0x7f0000000180)="fefb19ea7b3b5457d1fc5e455413a756d797dfc6d567cbe2c1ef13d81f7928cbc8f6cc7fbe4d5d4b06289cae647b815ddcd38db14b261338e5539dcf9fb7f09585ea36cace1eb6606f74e9d403e95c5f3e5c0c6de19370094d8437090638f0b2d1873043a0a21c043674f4c667707c7dd07d0fd522931ff8a4ef7697c877d514cb3467052d87da4f689394098901eb342406ed9aa8a94c139759d50b87ad5d3731c127e327b9cd48621055", 0xab) splice(r4, 0x0, r2, 0x0, 0xffffffffffffffc0, 0x0) 23:06:40 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x800000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:40 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x4305, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:40 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x88a8ffff, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:40 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:40 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x806000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:40 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsclus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:40 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x88caffff, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:40 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x4788, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:40 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:40 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xd00000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:41 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x89060000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:41 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2800000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:41 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x4888, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:41 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsdlus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:41 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:41 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x89ffffff, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:41 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x0) set_tid_address(&(0x7f0000000040)) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) splice(r3, 0x0, r1, 0x0, 0xffffffffffffffc0, 0x0) 23:06:41 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x6488, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:41 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xff000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:41 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2900000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:41 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:41 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsilus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:41 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2b00000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:41 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xffffa888, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:41 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x6c00, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:41 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2c00000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:41 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:41 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xffffca88, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:42 executing program 1: syz_open_dev$cec(&(0x7f0000000300)='/dev/cec#\x00', 0x0, 0x2) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x2, 0x0) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) r1 = openat$cgroup_ro(r0, &(0x7f00000002c0)='hugetlb.2MB.usage_in_bytes\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r5 = socket$inet_udplite(0x2, 0x2, 0x88) accept$netrom(r1, 0x0, &(0x7f00000000c0)) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r2, 0x0, r4, 0x0, 0x100000000ffe0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000440)=""/12, 0xc}, {&(0x7f0000000480)=""/236, 0xec}, {&(0x7f0000000580)=""/226, 0xe2}, {&(0x7f0000000680)=""/96, 0x60}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000001700)=""/14, 0xe}], 0x6) ioctl$VIDIOC_G_EXT_CTRLS(r3, 0xc0205647, &(0x7f0000000200)={0xa20000, 0x6, 0x6565, [], &(0x7f00000001c0)={0x0, 0x727f, [], @string=&(0x7f0000000180)=0x7}}) splice(r2, 0x0, r3, 0x0, 0xffffffffffffffc0, 0x0) 23:06:42 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2f00000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:42 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x800e, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:42 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xffffdd86, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:42 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:42 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsllus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:42 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x3c00000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:42 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xfffff000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:42 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8035, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:42 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:42 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xffffff89, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:42 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x4000000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:43 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='meoory.events\x00\xb3\x04\xc4\xf41\fE\xab\xeeI(\xf2\x14\xb50\xda\x1b\x05\xe9\x8a\xbd{~-\xc69\xce\xde\xd7\xaf$', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x0) splice(r3, 0x0, r1, 0x0, 0xffffffffffffffc0, 0x0) 23:06:43 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8100, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:43 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:43 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsolus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:43 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xf0ffffffffffff, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:43 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x4305000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:43 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:43 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x6c00000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:43 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8847, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:43 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x100000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:43 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:43 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x200000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:44 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(r1, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r1, 0x0, r1, 0x0, 0x100000000ffe0, 0x0) splice(r2, 0x0, r0, 0x0, 0xffffffffffffffc0, 0x0) 23:06:44 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8848, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:44 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x800e000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:44 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:44 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x400000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:44 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsslus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:44 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x600000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:44 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8035000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:44 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8864, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:44 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:44 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x800000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:44 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8100000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:45 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.eveots\x00\x9f:\t\x95\x9a\x0f\xa3x\xd7\xf5\x95\xed\xba\xc2\x13\xc1\x8cOI\\\x92\xa3\xffv\xc1z\x9ce`o\xac\xbdJm\xfeQ\xf2\xea\xc38K\xea\xe0\xa5\a\xd9\xd3\x00\x9f\xfcJ\xb9so\x16<}\f\x00\xf5\xbf\xdd\xf3\xd3\x1d', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(r0, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r1, 0x0, r3, 0x0, 0x100000000ffe0, 0x0) splice(r4, 0x0, r2, 0x0, 0xffffffffffffffc0, 0x0) dup3(r0, r3, 0x80000) 23:06:45 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsulus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:45 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8906, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:45 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:45 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x806000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:45 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x86ddffff00000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:45 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8847000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:45 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:45 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xd00000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:45 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xf000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:45 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8848000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:45 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2800000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$VIDIOC_G_AUDOUT(r1, 0x80345631, &(0x7f0000000000)) ioctl(r4, 0x1000008912, &(0x7f0000000200)="0adc010000003f319bd070") setsockopt$TIPC_MCAST_BROADCAST(r0, 0x10f, 0x85) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f0000000180)={0x3ff, 0xfff, 0x6da, 0x9851, 0x1a, 0x4}) splice(r1, 0x0, r3, 0x0, 0x100000000ffe0, 0x0) splice(r4, 0x0, r2, 0x0, 0xffffffffffffffc0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r3, 0x0, 0x483, &(0x7f0000000040)={0x67, @broadcast, 0x4e24, 0x1, 'rr\x00', 0x10, 0x2, 0x31}, 0x2c) 23:06:46 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:46 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsxlus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:46 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xff00, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:46 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2900000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:46 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8864000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:46 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x88a8ffff00000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:46 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xf0ffff, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:46 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2b00000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:46 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:46 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x88caffff00000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:46 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsp\nus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:47 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:47 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x1000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:47 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2c00000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:47 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8906000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:47 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsp#us\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:47 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000180)={0x2, 0x7ff, 0xdb88, 'queue1\x00', 0x1}) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r1, 0x0, r3, 0x0, 0x100000000ffe0, 0x0) splice(r4, 0x0, r2, 0x0, 0xffffffffffffffc0, 0x0) 23:06:47 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2f00000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:47 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x89ffffff00000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:47 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:47 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:47 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsp%us\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:47 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x3c00000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:48 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) setsockopt$rose(r0, 0x104, 0x6, &(0x7f0000000040)=0x9, 0x4) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r1, 0x0, r3, 0x0, 0x100000000ffe0, 0x0) splice(r4, 0x0, r2, 0x0, 0xffffffffffffffc0, 0x0) 23:06:48 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x4000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:48 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:48 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xff00000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:48 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x4000000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:48 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsp*us\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:48 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x4305000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:48 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x6000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:48 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xfffffffffffff000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:48 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:48 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x6c00000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:48 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:49 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xfffffc8f) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x7) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r0, 0x0, r1, 0x0, 0x100000000ffe0, 0x0) splice(r2, 0x0, r0, 0x0, 0xffffffffffffffc0, 0x0) 23:06:49 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:49 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsp+us\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:49 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:49 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x800e000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:49 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8060000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:49 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x4, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:49 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:49 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8035000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:49 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xd000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:49 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x6, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:49 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8100000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:50 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYPTR64, @ANYPTR=&(0x7f0000000040)=ANY=[@ANYRES16=r2, @ANYRESHEX=r0, @ANYRESDEC=r0, @ANYRES16=r0], @ANYRESDEC=r1, @ANYRES16=r0, @ANYRES32=r2], 0x7336cff1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x0) splice(r3, 0x0, r1, 0x0, 0xffffffffffffffc0, 0x0) 23:06:50 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x28000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:50 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsp-us\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:50 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:50 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x86ddffff00000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:50 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:50 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xd, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:50 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8847000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:50 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x29000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:50 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:50 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsp.us\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:50 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x28, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:51 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8848000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:51 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:51 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2b000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:51 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x29, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:51 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsp/us\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:51 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000100), &(0x7f0000000180)=0x4) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$binfmt_aout(r3, &(0x7f0000000280)={{0xcc, 0x2, 0x9, 0x24b, 0x83, 0x0, 0x351, 0x3a}, "1c1441f36263bea3045cf0977e5d4d2863db643130d63ef1fcdfdcb27eb37a171c9e1d22e19636c518b99c0317581c0781c471b4d247727b436d4067972d5e6e8ce3dfc5f2d3501a5939ce51e77ef7fa7596e803cb49c9db5acfa799854dbd8f2b7f7d9e73078c8f615337197408d44ea4f25deeeeaa1cc6db6b31c89d21fd6c9807e8628618ef67e972d000b83ad8b2cdc8ed41505a0ca6d73515b13b55f2819929bd0aa9ac050a5d3011c02336a1c13825298744e980db0b96dc3ca3dc4809ceab4b7dee6858d5f758a3a3e26e8c3a442b79bb73fbbf1f8e9e483a03f6", [[], [], [], [], [], []]}, 0x6fe) getsockopt$ax25_int(r3, 0x101, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) splice(r1, 0x0, r3, 0x0, 0x100000000ffe0, 0x0) splice(r4, 0x0, r2, 0x0, 0xffffffffffffffc0, 0x0) 23:06:51 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2b, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:51 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2c000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:51 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8864000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:51 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:51 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2f000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:51 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2c, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:51 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsp0us\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:51 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x88a8ffff00000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:51 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:51 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x3c000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:51 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2f, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:52 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:52 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x88caffff00000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:52 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x3f000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:52 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x3c, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:52 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x0) splice(r3, 0x0, r1, 0x0, 0xffffffffffffffc0, 0x0) ioctl$KVM_GET_MSRS(r1, 0xc008ae88, &(0x7f0000000040)={0x2, 0x0, [{}, {}]}) 23:06:52 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfspLus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:52 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x6c, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:52 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8906000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:52 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x40000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:52 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:52 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x43050000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:52 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x89ffffff00000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:52 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xf0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:52 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfspXus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:52 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x543, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:52 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:53 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='\xd7\xeaM\xfd\xddt,3y\xb6\xdc\xc0\xa9\xab\x1a~\x9a\x0f\xc9n', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x0) splice(r3, 0x0, r1, 0x0, 0xffffffffffffffc0, 0x0) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000100), 0xffffffffffffff10) 23:06:53 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x6c000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:53 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x600, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:53 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xff00000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:53 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:53 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsp\\us\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:53 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xfffffffffffff000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:53 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x800e0000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:53 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:53 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x608, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:53 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:53 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x689, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:54 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(r0, &(0x7f0000000280)='cpuacct.usage_sys\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="500000000002000072f12817aa26646974de2d685ba6c490bc8a954dcfcb02fbef60d70a9bb32ce77b6298ff5750e73ae13b13e91202055429cf55789af7601b890a0439c6763409b77a7e2f78d67954"], &(0x7f0000000200), 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r4 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) openat$cgroup_subtree(r4, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r1, 0x0, r3, 0x0, 0x100000000ffe0, 0x0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0xffffffffffffffc0, 0x0) 23:06:54 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfspuus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:54 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x80350000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:54 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x806, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:54 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:54 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x4, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:54 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x81000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:54 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xd00, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:54 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x6, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:54 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:54 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x86ddffff, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:54 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xe80, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:55 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r1, 0x0, r3, 0x0, 0x100000000ffe0, 0x0) splice(r4, 0x0, r2, 0x0, 0xffffffffffffffc0, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000040), 0x0) 23:06:55 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:55 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:55 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfspl\ns\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:55 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x88470000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:55 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2800, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:55 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x88480000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:55 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2900, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:55 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xd, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:55 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:55 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x88640000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:55 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2b00, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:56 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x28, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:56 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfspl#s\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:56 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2c00, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:56 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:56 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x88a8ffff, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:56 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='s\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r1, 0x0, r3, 0x0, 0x100000000ffe0, 0x0) splice(r4, 0x0, r2, 0x0, 0xffffffffffffffc0, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x4, 0x70, 0xffffffff, 0x6, 0x7, 0x8, 0x0, 0x7, 0x1200, 0x0, 0x2, 0xf8cc800000000000, 0x2, 0x4c59, 0x3, 0x800, 0x7fff, 0x4, 0x7, 0x10000, 0x1ff, 0x6, 0xcef, 0x1, 0x7c, 0x2, 0x7, 0x1, 0xffffffffffff7fff, 0x9ab, 0x6, 0x7, 0x7898, 0x4d97, 0x9, 0xfffffffffffffe01, 0x8, 0x3, 0x0, 0x1ff, 0x4, @perf_config_ext={0x200, 0x6}, 0x2000, 0x1, 0x4, 0x6, 0x9, 0xfffffffffffffff7, 0x1}, r0, 0xb, r1, 0x6) 23:06:56 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2f00, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:56 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x88caffff, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:56 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:56 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x29, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:56 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x3580, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:56 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfspl%s\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:56 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x89060000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:56 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2b, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:56 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:56 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x3c00, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:56 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x89ffffff, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:57 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:57 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2c, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:57 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x4000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:57 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfspl*s\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:57 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r2, 0x0, r0, 0x0, 0x10000000000, 0x0) splice(r2, 0x0, r1, 0x0, 0xffffffffffffffc0, 0x0) 23:06:57 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xff000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:57 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x4305, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:57 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xffffa888, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:57 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2f, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:57 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:57 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x4788, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:57 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfspl+s\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:57 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xffffca88, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:57 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x3c, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:57 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x4888, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:57 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:58 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x0) splice(r3, 0x0, r1, 0x0, 0xffffffffffffffc0, 0x0) fallocate(r0, 0x40, 0x8, 0x0) 23:06:58 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xffffdd86, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:58 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x6488, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:58 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x6c, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:58 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:58 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfspl-s\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:58 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xfffff000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:58 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x6c00, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:58 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:58 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xf0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:58 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x800e, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:58 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfspl.s\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:59 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x543, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:59 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xffffff89, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:59 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:59 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8035, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:59 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfspl0s\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:59 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000280)=[{0x0, 0x0, [0x80000001, 0x10000, 0x30, 0x3, 0x9, 0x4, 0x2, 0xfffffffffffffffa, 0x0, 0x497350bd, 0x40, 0x3, 0x2, 0x81, 0x67e, 0x3]}, {0xc, 0x0, [0x8, 0xffff, 0x200, 0x6, 0x7, 0x0, 0x8, 0x3, 0x6, 0x5, 0x7fff, 0x101, 0x7fffffff, 0x0, 0xe6, 0x9]}, {0x15, 0x0, [0x6, 0x5, 0x3, 0x2, 0x8, 0x5ccd, 0x401, 0x80, 0xfffffffffffffffc, 0x100000000, 0x0, 0x10000, 0x81, 0x3ab, 0x8, 0x1]}, {0x5, 0x0, [0x100000001, 0x0, 0x6, 0xfffffffffffffffa, 0x0, 0x9, 0x750f353d, 0x3ff, 0xff, 0x0, 0x0, 0x0, 0x7fff, 0xffffffffffff7f7b, 0x9, 0x212be7f5]}, {0x1, 0x0, [0x7, 0x6, 0xfff, 0x10001, 0xfffffffffffffbff, 0x0, 0x5, 0x7, 0x74, 0x8, 0x8, 0x3ff, 0x213, 0x1, 0x931, 0xfffffffffffffffa]}, {0x16, 0x0, [0x5, 0xffff, 0x8000, 0xff, 0x7, 0x1, 0x100000000, 0x8, 0x6, 0x3e, 0x1, 0xfffffffffffffff7, 0x1, 0xa3, 0x2, 0xa4f1]}, {0x0, 0x0, [0xffffffffffffff2b, 0x7f, 0x81, 0xffffffff80000001, 0x5, 0x971c, 0x4d4, 0x8, 0x3, 0x933, 0x1, 0x35f2, 0xfffffffffffff801, 0x101, 0x8]}, {0x8, 0x0, [0x3, 0x4, 0x1, 0x3, 0x7, 0x6, 0x376, 0x8, 0x2e6, 0x1f, 0x3, 0x8b8, 0x6a, 0x2, 0x3, 0x3]}, {0x32, 0x0, [0x3, 0x0, 0x81, 0x100, 0x7, 0x101, 0x7, 0x3, 0xfff, 0x72, 0x3, 0x1ff, 0x6, 0x991bd92, 0x4, 0x1]}, {0x2, 0x0, [0x80000000, 0x5e0c330b, 0x6, 0x98a4, 0x2, 0xffffffffffff7fff, 0x80000000, 0x3b, 0x6, 0x542, 0x80000001, 0x5, 0x3, 0x0, 0xbc5, 0x7]}], r4, 0x1, 0x1, 0x2d0}}, 0x20) splice(r3, 0x0, r1, 0x0, 0xffffffffffffffc0, 0x0) 23:06:59 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x600, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:59 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xf0ffffffffffff, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:59 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8100, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:59 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:59 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8847, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:59 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x100000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:59 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x608, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:59 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplXs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:59 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:06:59 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8848, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:06:59 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x689, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:00 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8864, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:00 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x200000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:00 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:00 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x806, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:00 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfspl\\s\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:00 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$VIDIOC_G_SELECTION(r2, 0xc040565e, &(0x7f0000000080)={0x0, 0x102, 0x5, {0x2, 0xffffffff, 0x4, 0x9}}) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f00000001c0)={'icmp\x00'}, &(0x7f0000000200)=0x1e) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') splice(r1, 0x0, r0, 0x0, 0xffffffffffffffc0, 0x200000000) ioctl$PPPIOCGUNIT(r1, 0x80047456, &(0x7f0000000040)) 23:07:00 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xd00, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:00 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:00 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8906, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:00 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x400000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:00 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xf000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:00 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xe80, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:00 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x600000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:00 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:00 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplcs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:00 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2800, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:00 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x800000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:01 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x0) splice(r1, 0x0, r1, 0x0, 0xffffffffffffffc4, 0x0) 23:07:01 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xff00, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:01 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:01 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2900, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:01 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x806000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:01 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplds\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:01 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xf0ffff, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:01 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2b00, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:01 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xd00000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:01 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:01 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2800000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:01 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2c00, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:02 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='io.stat\x13', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000180)={{0x3, 0x10001}, 0x1, 0x6, 0x8, {0x4, 0x1}, 0x1f, 0x1}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) socket$inet_udplite(0x2, 0x2, 0x88) bind$llc(r2, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x2, 0x400, 0x3, @dev={[], 0x11}}, 0x10) ioctl(r1, 0x1000008914, &(0x7f0000000040)="0adc1f123c123f1b9bd070") splice(r1, 0x0, r3, 0x0, 0x100000000ffe0, 0x0) splice(r3, 0x0, r2, 0x0, 0xffffffffffffffc0, 0x8) 23:07:02 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplis\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:02 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x1000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:02 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:02 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2f00, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:02 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2900000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:02 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x3580, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:02 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:02 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2b00000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:02 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:02 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x4000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:02 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x3c00, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:03 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) ioctl$VIDIOC_S_SELECTION(r1, 0xc040565f, &(0x7f0000000040)={0x6, 0x0, 0x5, {0x7f, 0xffffffffadb0f84f, 0x2, 0x400}}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r0, 0x0, r3, 0x0, 0x100000000ffdf, 0x0) splice(r3, 0x0, r2, 0x0, 0xffffffffffffffc0, 0x0) 23:07:03 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2c00000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:03 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplls\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:03 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:03 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x4000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:03 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x6000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:03 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:03 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:03 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x4305, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:03 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x2f00000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:03 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8060000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:03 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x3c00000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:03 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r2, &(0x7f00000001c0)='cpuacct.usage_sys\x00', 0x7a05, 0x1700) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000040)={0x7, 0xfff, 0x7, 0x1}) splice(r1, 0x0, r3, 0x0, 0x100000000ffe0, 0x0) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f0000000080)) splice(r3, 0x0, r2, 0x0, 0xffffffffffffffc0, 0x0) 23:07:03 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x4788, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:03 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplos\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:03 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:03 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xd000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:03 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x3f00000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:04 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x4888, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:04 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x28000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:04 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x4000000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:04 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:04 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x29000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:04 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x6488, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:04 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod(&(0x7f0000000040)='./file0\x00', 0x1040, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) openat$dir(0xffffffffffffff9c, &(0x7f0000000cc0)='./file0\x00', 0x441, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r4, 0x15) open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x0) splice(r5, 0x0, r1, 0x0, 0xffffffffffffffc0, 0x0) 23:07:04 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x4305000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:04 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplps\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:04 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:04 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2b000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:04 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x6c00, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:04 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x800e, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:04 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x6c00000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:04 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2c000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:05 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:05 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8035, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:05 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2f000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:05 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r3, 0x111, 0x3, 0x0, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r1, 0x0, r3, 0x0, 0x100000000ffe0, 0x0) r5 = mq_open(&(0x7f0000000040)=']\x00', 0x800, 0x8, &(0x7f0000000080)={0x7f, 0x1, 0x2, 0x1, 0x9, 0x9, 0xf449, 0x9bf}) sendfile(r0, r5, &(0x7f0000000100), 0x100) splice(r4, 0x0, r2, 0x0, 0xffffffffffffffc0, 0x0) 23:07:05 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:05 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplss\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:05 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x800e000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:05 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8100, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:05 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x3c000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:06 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8035000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:06 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:06 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x40000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:06 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8847, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:06 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x43050000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:06 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8100000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:06 executing program 1: openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x200000, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r3, &(0x7f00000003c0)=ANY=[], 0xffca) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) splice(r1, 0x0, r3, 0x0, 0x100000000ffe0, 0x0) splice(r4, 0x0, r2, 0x0, 0xffffffffffffffc0, 0x0) 23:07:06 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:06 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplxs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:06 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8848, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:06 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x6c000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:06 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x86ddffff00000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:06 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x800e0000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:06 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8847000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:06 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8864, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:07 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:07 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x80350000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:07 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8906, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:07 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e23, @remote}}, 0x5f0, 0x8000}, &(0x7f0000000040)=0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x1000, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xa, 0x3}, 0x0, 0x0, &(0x7f0000000340)={0x3, 0x4, 0x6, 0x401}, &(0x7f0000000380)=0xfff, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x769e2e76}}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000280)={r2, 0x5de6, 0xae, "882501a73dc5d9d8061e2b10351cca8820a9e3113e92cfd99f6d097d4b3db332f11e0fb5a620cad15fee3287f2e21b8eb9cb49a238230cdce578307e1a952b187c7403245e75f0f508bed5f84f44c098ce8dee9d14b136e68710a962c445dda39fd321107ba73c2bb152e6d41f371083a12fc638130ee25484a4efa6417c1c997ac6646c13b053bdbe81e38e31f255581b70506460aabb52e49a2b57aa54dafae279fb8a376fa9e3faf1757d3b49"}, 0xb6) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r0, 0x0, r1, 0x0, 0x100000000ffe0, 0x0) splice(r3, 0x0, r0, 0x0, 0xffffffffffffffc0, 0x0) 23:07:07 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8848000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:07 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:07 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x81000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:07 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplu\n\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:07 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xf000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:07 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:07 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xff00, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:07 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x86ddffff, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:07 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8864000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:08 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xf0ffff, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:08 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:08 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='\x00'/14, 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f00000000c0)=0x5) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x100000000ffe0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000080)='selfem0lo\x00') splice(r2, 0x0, r1, 0x0, 0xffffffffffffffc0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) 23:07:08 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x88470000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:08 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplu#\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:08 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x88a8ffff00000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:08 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x1000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:08 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:08 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x88480000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:08 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x88caffff00000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:08 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:08 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:09 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x8906000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:09 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x88640000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:09 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:09 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x4000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:09 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplu%\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:09 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x89ffffff00000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:09 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$void(r2, 0xc0045c78) write$binfmt_misc(r2, &(0x7f0000000040)=ANY=[], 0xffffff9a) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r1, 0x0, r3, 0x0, 0x100000000ffe0, 0x4) splice(r4, 0x0, r2, 0x0, 0xffffffffffffffc0, 0x0) recvfrom$ax25(r2, &(0x7f0000000040)=""/51, 0x33, 0x10000, &(0x7f0000000180)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x7}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}, 0x48) fcntl$dupfd(r4, 0x0, r2) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f0000000380)={0x1, 0x80000000, 0xe042}) flock(r1, 0x7) ioctl(r2, 0x0, &(0x7f0000000280)="5a5fb19554b49812bf64ac3ab2956d4e500801e554618b0d07c9f6c4d3a1c50eea92e486df384538d6833fcd3523d8d2e21d80e1b200faa22764f145434e55e571639daf14b5b3ad546e6d2907228ad15d3a038c2ee2a9e9ea80858dbf5543cba92635719b9e2f97c01b6bc29b293989ec4de4fe4c61359f8d55e8b0865ec1abcd7dbe188fc35d0d40cb84166336e01ab64d780b5ca452d00eae95928dde160c85c29a5ba0b8dfd82061e348130b88597936869074d1f31b472306a0f330e837af8547f136f4df36407dbf38f5c751cfba554c392e4eeffca6ca1e9dc7a14e370a5152db0889c9c5361924ad4f87") 23:07:09 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x88a8ffff, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:09 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x88caffff, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:09 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:09 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xff00000000000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:09 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x6000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:09 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x89060000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:09 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplu*\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:09 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xfffffffffffff000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:09 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:09 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:10 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x89ffffff, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:10 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memorx.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ioctl$NBD_CLEAR_SOCK(r2, 0xab04) splice(r1, 0x0, r3, 0x0, 0x100000000ffe0, 0x0) splice(r4, 0x0, r2, 0x0, 0xffffffffffffffc0, 0x0) renameat(r0, &(0x7f0000000080)='\x00', r3, &(0x7f0000000100)='./file0\x00') ioctl$SIOCAX25OPTRT(r2, 0x89e7, &(0x7f0000000040)={@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x2, 0x20}) 23:07:10 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:10 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:10 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8060000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:10 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xff000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:10 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplu+\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:10 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xffffa888, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:10 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x4, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:10 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xd000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:10 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:10 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xffffca88, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:10 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x6, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:11 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x0) splice(r3, 0x0, r1, 0x0, 0xffffffffffffffc0, 0x0) 23:07:11 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x28000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:11 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:11 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplu-\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:11 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xffffdd86, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:11 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:11 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xfffff000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:11 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xd, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:11 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x29000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:11 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:11 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xffffff89, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:11 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x28, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:12 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) readv(r0, &(0x7f0000001840)=[{&(0x7f0000000440)=""/53, 0x35}, {&(0x7f0000000480)=""/77, 0x4d}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f0000000580)=""/27, 0x1b}, {&(0x7f00000005c0)=""/84, 0x54}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/244, 0xf4}, {&(0x7f0000001740)=""/252, 0xfc}], 0x8) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000001b00)={r0, 0x0, 0x800, 0x100000001, 0x10000}) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r2 = socket$inet_udplite(0x2, 0x2, 0x88) accept4$ax25(r0, &(0x7f0000000180)={{0x3, @netrom}, [@null, @bcast, @default, @null, @bcast, @remote, @remote, @netrom]}, &(0x7f0000000080)=0x48, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000200)=0xe8) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f0000001a00)=""/216) getresgid(&(0x7f0000000380), &(0x7f00000003c0)=0x0, &(0x7f0000000400)) ioperm(0x7, 0x2, 0x9) lchown(&(0x7f0000000100)='./file0\x00', r3, r4) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000018c0)={0x0, 0x3, 0x7, 0x8, 0x0, 0x3, 0x401, 0x1, {0x0, @in={{0x2, 0x4e21, @multicast2}}, 0x7fffffff, 0x6, 0x5, 0x9bd, 0x5}}, &(0x7f0000001980)=0xb0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000019c0)={0x7, 0x8200, 0x8, 0x3, r5}, 0x10) splice(r2, 0x0, r1, 0x0, 0xffffffffffffffc0, 0x0) 23:07:12 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplu.\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:12 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xf0ffffffffffff, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:12 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2b000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:12 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x29, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:12 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:12 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2c000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:12 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2b, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:12 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:12 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x100000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:12 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:12 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2c, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:13 executing program 1: r0 = socket(0xf, 0x2, 0x80000000000007) fsetxattr$security_ima(r0, &(0x7f0000000080)='security.ima\x00', &(0x7f0000000180)=@v2={0x3, 0x0, 0x4, 0xffffffffffff30e4, 0xad, "f771fd5e3db37cfc8e9e68df6ffb6b5ee311e40fd388ddf63934b2effc97090eef8a2dca5dab1f80dfe94c0db0c2ffd33c5bfb0fed1d81b76aeb884e2812e775b38e8238f63eb8c6d009b6f52f43dab5465b359ec72749c7bbfcb3a2e8a4061d8753cafcf2fbf0a44063f6ca3445ad253c3b34f3d62b9dc012fc1934c263a9a45a79aecf6af7696d9fbc8e86b171681b16d1161f49a4b0df490d2ec890af5d2c2389fe81608b545ab609b1f20a"}, 0xb7, 0x1) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r0, 0x111, 0x3, 0x1, 0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x2, 0x40000) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r1, 0x0, r3, 0x0, 0x100000000ffe0, 0x0) splice(r4, 0x0, r2, 0x0, 0xffffffffffffffc0, 0x0) 23:07:13 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2f000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:13 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplu/\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:13 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x200000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:13 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2f, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:13 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:13 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:13 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x3c000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:13 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x400000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:13 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x3c, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:13 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:13 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x600000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:14 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplu0\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:14 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x40000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:14 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x6c, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:14 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:14 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x800000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:14 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_dccp_buf(r0, 0x21, 0x8e, &(0x7f0000000040)="b8a6dabda5507725369c", 0xa) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x0) splice(r3, 0x0, r1, 0x0, 0xffffffffffffffc0, 0x0) 23:07:14 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x806000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:14 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xf0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:14 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x43050000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:14 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:14 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:14 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x6c000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:14 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfspluX\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:14 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xd00000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:14 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x543, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:14 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x800e0000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:14 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:15 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_GET_TSC_KHZ(r1, 0xaea3) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x0) splice(r3, 0x0, r1, 0x0, 0xffffffffffffffc0, 0x0) 23:07:15 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2800000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:15 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x600, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:15 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x80350000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:15 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:15 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplu\\\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:15 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x608, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:15 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2900000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:15 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x81000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:15 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0xa) 23:07:15 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2b00000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:15 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x86ddffff, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:16 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x0) getsockopt$inet_int(r2, 0x0, 0x0, &(0x7f0000000040), &(0x7f0000000080)=0x4) splice(r3, 0x0, r1, 0x0, 0xffffffffffffffc0, 0x0) 23:07:16 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0xf) 23:07:16 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfspluc\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:16 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x689, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:16 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2c00000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:16 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x88470000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:16 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2f00000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:16 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x806, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:16 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x14) 23:07:16 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x88480000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:16 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x3c00000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:16 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xd00, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:17 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r1, 0x0, r3, 0x0, 0x100000000ffe0, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x10000, 0x0) mmap$perf(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000000, 0x52, r0, 0x2) splice(r4, 0x0, r2, 0x0, 0xffffffffffffffc0, 0x0) 23:07:17 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xe80, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:17 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplud\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:17 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0xec) 23:07:17 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x88640000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:17 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x4000000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:17 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0xfc) 23:07:17 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x4305000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:17 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2800, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:17 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x88a8ffff, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:17 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x6c00000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:17 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2900, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:18 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r1, 0x0, r3, 0x0, 0x100000000ffe0, 0x0) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0xf) splice(r4, 0x0, r2, 0x0, 0xffffffffffffffc0, 0x0) 23:07:18 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplui\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:18 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x88caffff, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:18 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x7ffff) 23:07:18 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x800e000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:18 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2b00, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:18 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8035000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:18 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x89060000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:18 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2c00, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:18 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x20000310) 23:07:18 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x89ffffff, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:18 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8100000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:19 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='mem\x7fry.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x0) splice(r3, 0x0, r1, 0x0, 0xffffffffffffffc0, 0x0) 23:07:19 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2f00, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:19 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplul\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:19 executing program 3: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) write$vnet(r1, &(0x7f0000000100)={0x1, {&(0x7f0000000080)=""/28, 0x1c, &(0x7f00000000c0)=""/42, 0x3, 0x4}}, 0x68) r2 = socket$inet(0x2b, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000200)=0x64) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000180)={0x1, 0xffffffffffffffff, 0x10000, 0x8, 0x56, 0x12, 0xf, "72eac28e3c08f39d7a123712f0c65f79b0568f68", "a2a4728b5d69494bc42e0fb8932058a5ae2c329b"}) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000001c0)) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r2, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:19 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xff000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:19 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x86ddffff00000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:19 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xffffa888, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:19 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) gettid() ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCDELDLCI(r1, 0x8981, &(0x7f0000000040)={'gretap0\x00', 0x2}) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:19 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x3580, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:19 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8847000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:19 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfspluo\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:19 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xffffca88, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:20 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x0) setsockopt$inet_udp_int(r3, 0x11, 0xb, &(0x7f0000000040)=0xfffffffffffffffc, 0x4) splice(r3, 0x0, r1, 0x0, 0xffffffffffffffc0, 0x0) 23:07:20 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x3c00, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:20 executing program 3: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000040)={0x5}, 0x8, 0x0) fsync(r0) r1 = socket$inet(0x2b, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r1, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:20 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8848000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:20 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplup\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:20 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xffffdd86, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:20 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8864000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:20 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x3f00, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:20 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xfffff000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:20 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x1, 0x400) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:20 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x88a8ffff00000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:20 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x4000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:21 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x88caffff00000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:21 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfspluu\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:21 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xffffff89, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:21 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f0000000280)='\x00', 0x0, r0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x101004, 0x0) ioctl$SG_SET_TIMEOUT(r2, 0x2201, &(0x7f0000000380)=0xbdd5) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r2, &(0x7f0000000080)="968b34aa5f90560a224c4faa5e22e61e0c37b58b8385c9b27e16d800f92f950e599a3f099a197b834b51da9b38a379bf88e875d89a0fb257b0c016d69ad6e82745a1cabf4caa039f72019c50d687c242b2387412ab43da6f2368ea711e1460d41d7d2c5b62a7e34b24db62f7ee971d77c529f8664856d29566ba7fb2aac90a586fa16a4277434d7044e9c376cfeb40d999452034930688fb7f249cb10d2f0d2b2c1567351325e63314cdb9ae46491a3ae9ff16a9307b8c213cb93390a22f7f69b68708f08a6d2caffad7ce8b2c9d13a3ab6465693fa0", &(0x7f0000000180)="61d30126686a32500f1938b93c59d64873855b686be738369a2299e8bdf36f0222469fd2cae12789d33f33d34020e28c0a68c86aef17004b8bffab42107e7abf3b224903fa73c840c3414bde2a815bbc4c0350c8b4f4c5d240f9ee6b7b5d505ea990d322cacb9c30448d2d7dca3f7ef7701f74dae3e1b3e3d72a876f5e0b"}, 0x20) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) fsetxattr$security_evm(r3, &(0x7f00000002c0)='security.evm\x00', &(0x7f0000000340)=@md5={0x1, "18cd252c28d6cb9fb729cc7b3b984b60"}, 0x11, 0x1) 23:07:21 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x4305, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:21 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0xceea, &(0x7f0000000040)="b70789dc1f123c70") splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x0) splice(r3, 0x0, r1, 0x0, 0xffffffffffffffc0, 0x0) 23:07:21 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xf0ffffffffffff, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:21 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x4788, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:21 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8906000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:21 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ubi_ctrl\x00', 0x222080, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f00000001c0)={0x7, 0x1000, &(0x7f0000000340)="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"}) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x8082, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000140)={0x11, 0x92, &(0x7f0000000080)="6229188ff81b7ee2589810e34c378d030f9031a0b13f4026afda4e01ffe87926a58ffcad6db64ac4f396bf024ebb74c84ea0f834c59f59a9cc90f20949afdc37be38547176d0e88aafabf893d4a44ba7bb43be23766e00b9b3c60ce09c2fc49199055cace3ba783e17818a18c5682dbab75e168661ecc6250379a7f0c7bb21f927f0428d4de1d5b9a744c00a88077d518807"}) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:21 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplux\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:21 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x100000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:21 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x4888, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:21 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x89ffffff00000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:21 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="590000000000000093df70") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:21 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x200000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:21 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x6488, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:22 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x28100) splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x0) splice(r3, 0x0, r1, 0x0, 0xffffffffffffffc0, 0x0) 23:07:22 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xff00000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:22 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x02', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:22 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r2 = dup3(r0, r0, 0x0) bind$alg(r2, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha256\x00'}, 0x58) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000000c0)=[@window={0x3, 0xe5, 0x10000}, @mss={0x2, 0x9}], 0x2) 23:07:22 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x400000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:22 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x6c00, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:22 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x800e, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:22 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xfffffffffffff000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:22 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x2, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000080)={'nat\x00', 0xb9, "136461924d5f98fc1d5191c6bb3892e5cd0b1bd9ffd31f3da0638c9b8bf7aef4e844758b48eed67be31bcd170340ae44ddf884abbd36ff51d071875dc6fa6a38ad2247519a91cdfd36aad9294a1e7a1af609e871cc823fcb063f1e279c1a1b4689333c6d0b70d88e02456c0773e189497f3ef102d82cad8531a52e85040f561e08b8e72bc241414e89b22782703d3bc89e98008cfcda1018a2fd5d6182713274b93318008f9b8b43944ed4da512a57d3f87a2099df4189e75a"}, &(0x7f0000000180)=0xdd) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:22 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x600000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:22 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x2}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:22 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x03', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:23 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000040)=""/89) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r3, &(0x7f00000001c0)=ANY=[@ANYRES64=r1], 0xfffffffffffffe04) r4 = socket$inet_udplite(0x2, 0x2, 0x88) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video37\x00', 0x2, 0x0) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r1, 0x0, r3, 0x0, 0x100000000ffe0, 0x0) splice(r4, 0x0, r2, 0x0, 0xffffffffffffffc0, 0x0) 23:07:23 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8035, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:23 executing program 3: r0 = socket$inet(0x2b, 0x5, 0x10000010000004) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000080)="0cdc1f8e3c1200005751000070") bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xffffff19) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) prctl$PR_SVE_GET_VL(0x33, 0x10a17) r2 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x6, 0x10000) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r2, 0x40045532, &(0x7f0000000180)=0xa93) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f00000000c0)={0x4, {{0x2, 0x4e23, @broadcast}}}, 0x88) 23:07:23 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x800000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:23 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x8}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:23 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x04', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:23 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x806000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:23 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0xf}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:23 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8100, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:23 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, &(0x7f0000000140)=""/133, 0x85, 0x10122, &(0x7f0000000200)={0x2, 0x4e20, @loopback}, 0x10) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r2 = fcntl$dupfd(r1, 0x406, r0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r2, 0x28, 0x1, &(0x7f0000000100)=0x101, 0x8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x4b) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) socket$inet(0x2, 0x8080f, 0x9) 23:07:23 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xd00000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:23 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x05', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:24 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x0) splice(r3, 0x0, r1, 0x0, 0xffffffffffffffc0, 0x0) 23:07:24 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x12}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:24 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8847, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:24 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2800000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:24 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x06', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:24 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8848, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:24 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0xf000}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:24 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2900000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:24 executing program 3: prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000140)) r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r2, 0xc018620c, &(0x7f0000000080)={0x3}) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:24 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0xffffff1f}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:24 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\a', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:24 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2b00000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:25 executing program 1: pipe(&(0x7f0000000100)) r0 = creat(&(0x7f0000000200)='./file0\x00', 0x3a) openat$cgroup_ro(r0, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x26e1, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r4, 0x6, 0x21, &(0x7f0000000040)="33efc03d3c0f3966fb1fa9f940a6abd2", 0x10) splice(r1, 0x0, r3, 0x0, 0x100000000ffe0, 0x0) splice(r4, 0x0, r2, 0x0, 0xffffffffffffffc0, 0x0) 23:07:25 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:25 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8864, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:25 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$netlink(0x10, 0x3, 0xf) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40400000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r3, 0x400, 0x70bd2b, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000040) ioctl(r1, 0x80001000008912, &(0x7f0000000200)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:25 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2c00000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:25 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\b', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:25 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2f00000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:25 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8906, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:25 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x2, 0x0) accept4$rose(r2, 0x0, &(0x7f0000000240), 0x80000) ioctl$VIDIOC_QBUF(r2, 0xc058560f, &(0x7f00000000c0)={0x3f, 0xf, 0x4, 0x0, {0x77359400}, {0x2, 0xb, 0xf6e, 0x7, 0x8, 0x100000001, "c201d0ae"}, 0x4, 0x4, @planes=&(0x7f0000000080)={0x80000000, 0x1c1f, @fd, 0x100}, 0x4}) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000140)={0x0, 0x81}, &(0x7f0000000180)=0x8) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000280), 0x13f, 0x6}}, 0x20) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x73, &(0x7f00000001c0)={r3, 0x7fffffff, 0x30, 0xe5, 0x6}, &(0x7f0000000200)=0x18) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:25 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x4]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:25 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\t', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:25 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x3c00000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:26 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") splice(r0, 0x0, r2, 0x0, 0x100000000ffe0, 0x0) splice(r2, 0x0, r1, 0x0, 0x6, 0x0) 23:07:26 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xf000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:26 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x6]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:26 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x4000000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:26 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\n', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:26 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:26 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xff00, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:26 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x4305000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:26 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x20) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:26 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xd]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:26 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x6c00000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:26 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xf0ffff, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:27 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x600000000000000, 0xa00) ioctl$VIDIOC_S_HW_FREQ_SEEK(r0, 0x40305652, &(0x7f0000000080)={0x40, 0x7, 0xa284, 0x3, 0x6, 0x9a, 0x7fff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r4 = socket$inet_udplite(0x2, 0x2, 0x88) splice(r1, 0x0, r3, 0x0, 0x100000000ffe0, 0x0) splice(r4, 0x0, r2, 0x0, 0xffffffffffffffc0, 0x0) 23:07:27 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x80, 0x0) syncfs(r2) mq_timedreceive(r2, &(0x7f0000000080)=""/125, 0x7d, 0x3, &(0x7f0000000100)) ioctl$SIOCX25SCALLUSERDATA(r2, 0x89e5, &(0x7f0000000200)={0x14, "752e4e397de472d4806a02653e43fa68fe76779364de428e641b1c589612f99c019defe679ebe653e532a7f39d45d3765d4ac1e6f814f59010bfae5089868c3c17182feb76d6da64e797095a1feae28f729460cc3e6998ce35d07f3135897e6e6559aa58e4c316e07babd717df9acacdc86ce5b56437715aa1cb1e04d4b91ab6"}) 23:07:27 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\r', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:27 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x800e000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:27 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x28]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:27 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x1000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:27 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:27 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x29]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 610.656342][ T3273] Unknown ioctl 35301 23:07:27 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8035000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:27 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r2 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x30, 0x202) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r2, 0x40045542, &(0x7f0000000180)=0x86b) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f00000003c0)) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip6_mr_cache\x00') getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000000080)={'mangle\x00'}, &(0x7f0000000100)=0x54) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) setregid(r4, r5) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f00000001c0)={0xff, 0x1, {0x0, 0x3, 0x7f, 0x3, 0x8}}) 23:07:27 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x0e', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:27 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x4000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:28 executing program 1: 23:07:28 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8100000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:28 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x6000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:28 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2b]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:28 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000380)=0x14) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000003c0)={r2, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, 0xc) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) r3 = semget$private(0x0, 0x0, 0x640) semctl$SEM_INFO(r3, 0x2, 0x13, &(0x7f0000000040)=""/77) 23:07:28 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x10', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:28 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x86ddffff00000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:28 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2c]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:28 executing program 1: 23:07:28 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:28 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") getsockopt$inet_int(r0, 0x0, 0x2f, &(0x7f0000000000), &(0x7f0000000080)=0x4) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:28 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2f]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:28 executing program 1: 23:07:28 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8060000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:28 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r2 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) ioctl$TIOCGDEV(r2, 0x80045432, &(0x7f0000000140)) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x102) ioctl$KVM_GET_EMULATED_CPUID(r3, 0xc008ae09, &(0x7f0000000740)=""/4096) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) ioctl$DRM_IOCTL_AGP_ALLOC(r3, 0xc0206434, &(0x7f0000000080)={0x1f, 0x0, 0x10001, 0x1d}) ioctl$DRM_IOCTL_AGP_FREE(r3, 0x40206435, &(0x7f00000000c0)={0x4, r4, 0x10003, 0xffff}) 23:07:28 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8847000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:28 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus#', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:28 executing program 1: 23:07:28 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x3c]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:28 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xd000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:28 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) fstatfs(r0, &(0x7f00000000c0)=""/10) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x4000, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000040)={r1, r2}) openat$cgroup_int(r2, &(0x7f0000000080)='memory.max\x00', 0x2, 0x0) 23:07:28 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8848000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:28 executing program 1: 23:07:29 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x6c]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:29 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x28000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:29 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8864000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:29 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x110) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = socket$inet(0x2b, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r1, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:29 executing program 1: 23:07:29 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplusH', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:29 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xf0]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:29 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x88a8ffff00000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:29 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x29000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:29 executing program 1: 23:07:29 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x543]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:29 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x4400, 0x0) ioctl$VIDIOC_ENCODER_CMD(r1, 0xc028564d, &(0x7f0000000080)={0x3, 0x1, [0xfffffffffffffff9, 0x0, 0xa6, 0x1, 0x2, 0x9, 0x18000000000000, 0x6]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x80080, 0x0) ioctl$VIDIOC_S_MODULATOR(r1, 0x40445637, &(0x7f00000000c0)={0x4, "b70ef03c9626283d20d0e356b6901aeb42ab6b0c5e42b27ce047ca4c791ec64b", 0x20, 0x77ed4da1, 0x6, 0x6, 0x1}) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000140)={@mcast2, 0x1ff, 0x0, 0xff, 0xf, 0x0, 0xfffffffffffffff9}, &(0x7f0000000180)=0x20) 23:07:29 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x88caffff00000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:29 executing program 1: 23:07:29 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2b000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:29 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup3(r1, r0, 0x80000) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r2, 0xc08c5334, &(0x7f0000000040)={0x4, 0x1, 0x0, 'queue0\x00', 0x1000}) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$TIPC_MCAST_BROADCAST(r2, 0x10f, 0x85) connect$inet(r0, &(0x7f0000000140)={0x2, 0x4e23, @rand_addr=0x1}, 0x10) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r3, 0x8250aea6, &(0x7f0000000180)=""/157) 23:07:29 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x600]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:29 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplusL', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:29 executing program 1: 23:07:29 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8906000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:29 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2c000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:29 executing program 1: 23:07:29 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x608]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:29 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x24600, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x80000, 0x0) connect$l2tp(r0, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e20, @local}, 0x4, 0x3, 0x3, 0x4}}, 0x2e) r2 = socket$inet(0x2b, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r2, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:29 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x89ffffff00000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:29 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2f000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:29 executing program 1: 23:07:29 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x689]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:29 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xff00000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:29 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus`', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:29 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x3c000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:29 executing program 1: 23:07:29 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x806]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:29 executing program 3: r0 = socket$inet(0x2b, 0x2000000a04, 0x7e3a) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") getsockopt$inet_tcp_int(r0, 0x6, 0xf, &(0x7f0000000040), &(0x7f0000000080)=0x4) r2 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x3, 0x2) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r2, 0xc0305615, &(0x7f00000001c0)={0x0, {0x9, 0x9}}) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x6, &(0x7f00000000c0)="0adc1f123c123f319bd070") r4 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r4, 0x1, 0x8, &(0x7f0000b56f40)=""/192, &(0x7f0000000040)=0xc0) r5 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x0, 0x2) ioctl$EVIOCGRAB(r5, 0x40044590, &(0x7f0000000140)=0x80000000) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) ioctl$UFFDIO_API(r5, 0xc018aa3f, &(0x7f0000000200)={0xaa, 0x74}) 23:07:29 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x3f000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:29 executing program 1: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, &(0x7f0000000140)=""/133, 0x85, 0x10122, &(0x7f0000000200)={0x2, 0x4e20, @loopback}, 0x10) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r2 = fcntl$dupfd(r1, 0x406, r0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r2, 0x28, 0x1, &(0x7f0000000100)=0x101, 0x8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x4b) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) socket$inet(0x2, 0x8080f, 0x9) 23:07:30 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xfffffffffffff000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:30 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xd00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:30 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x40000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:30 executing program 3: r0 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext={0x0, 0x1}}, 0x0, 0x0, r0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r1, 0x0) r2 = socket$inet(0x2b, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000080)) connect$inet(r2, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f00000000c0)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_GET_NR_MMU_PAGES(r4, 0xae45, 0x5) ioctl$sock_SIOCADDDLCI(r5, 0x8980, &(0x7f0000000180)={'vlan0\x00'}) 23:07:30 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x2}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:30 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplush', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:30 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xe80]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:30 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x43050000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:30 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x8}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:30 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x6c000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:30 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2800]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:30 executing program 1: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x40000000, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:30 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0xf}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:30 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x800e0000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:30 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2900]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:30 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplusl', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:30 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x101000) setsockopt$bt_l2cap_L2CAP_CONNINFO(r2, 0x6, 0x2, &(0x7f0000000080)={0x7, 0x9, 0x9058, 0x4}, 0x6) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:30 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x80350000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:30 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x12}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:30 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2b00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:31 executing program 1: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0xd00, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:31 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2c00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:31 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x81000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:31 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x6, 0x8001) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x400, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f0000000340)={&(0x7f0000000200), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r3, 0x20, 0x70bd2a, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x4040010) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000080)=@nat={'nat\x00', 0x19, 0x6, 0xf3c, [0x20000740, 0x0, 0x0, 0x200009e4, 0x20000bc0], 0x0, &(0x7f0000000040), &(0x7f0000000740)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x2, [{0x11, 0x2e, 0x6004, 'bpq0\x00', 'bridge_slave_1\x00', 'erspan0\x00', 'bridge0\x00', @dev={[], 0x27}, [0xff, 0xff, 0x0, 0x0, 0x0, 0xff], @broadcast, [0xff, 0x0, 0xff, 0xff, 0x0, 0xff], 0x6e, 0xd6, 0x106, [], [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x1f}}}, @common=@mark={'mark\x00', 0x10, {{0xffffffc0, 0xfffffffffffffffd}}}], @common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0xffff}}}}, {0x5, 0x12, 0x600, 'hsr0\x00', 'netdevsim0\x00', 'bcsf0\x00', 'veth0_to_hsr\x00', @local, [0xff, 0x0, 0x0, 0x0, 0xff], @remote, [0xff, 0xff, 0x0, 0xff, 0x0, 0xff], 0xae, 0x11e, 0x16e, [@quota={'quota\x00', 0x18, {{0x0, 0x0, 0x1f, 0x9}}}], [@arpreply={'arpreply\x00', 0x10, {{@broadcast, 0xfffffffffffffffe}}}, @arpreply={'arpreply\x00', 0x10, {{@broadcast, 0xffffffffffffffff}}}], @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x3ff, 'syz0\x00', 0x20}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe, 0x2, [{0x0, 0x1, 0x200, 'nlmon0\x00', 'bcsf0\x00', 'team0\x00', 'sit0\x00', @empty, [0x0, 0xff, 0x0, 0xff, 0xff], @empty, [0x0, 0x0, 0x0, 0xff], 0x6e, 0xa6, 0xd6, [], [@snat={'snat\x00', 0x10, {{@dev={[], 0xf}, 0xfffffffffffffffc}}}], @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x1}}}}, {0x13, 0x1, 0x7, 'bpq0\x00', 'eql\x00', 'gretap0\x00', 'veth0_to_team\x00', @empty, [0xff, 0xff, 0x0, 0x0, 0xff, 0xff], @empty, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], 0x9e, 0x9e, 0xd6, [@vlan={'vlan\x00', 0x8, {{0x3, 0x4, 0xfafe, 0x1, 0x1}}}], [], @arpreply={'arpreply\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{0x13, 0x0, 0x22eb, 'ip6tnl0\x00', 'dummy0\x00', 'syzkaller1\x00', 'bcsh0\x00', @broadcast, [0x0, 0x0, 0xff, 0xff], @dev={[], 0xc}, [0x0, 0xff, 0x0, 0x0, 0xff, 0xff], 0x856, 0x8be, 0x8f6, [@u32={'u32\x00', 0x7c0, {{[{[{0x4, 0x3}, {0x8000}, {}, {0xfff, 0x1}, {0x401, 0x3}, {0x1, 0x3}, {0x4, 0x2}, {0x8, 0x1}, {0x1000}, {0x8000}, {0x4}], [{0x3, 0xb1}, {0x200, 0x10000}, {0x1, 0xcc9}, {0x4, 0x6}, {0x200, 0xf72}, {0x1c38600000, 0x5f}, {0x8, 0x7}, {0x7, 0xd93}, {0x7fffffff, 0x9d9}, {0x5, 0xfff}, {0x3, 0x8}], 0x2, 0x3}, {[{0x8}, {0x100, 0x3}, {0x9, 0x3}, {0x1, 0x3}, {0x5, 0x3}, {0x0, 0x1}, {0x7ff, 0x2}, {0x5, 0x2}, {0xfffffffffffffff7, 0x1}, {0x40, 0x1}, {0x1, 0x3}], [{0x7, 0xf9c}, {0x4, 0x10001}, {0x2, 0x81}, {0x1, 0x5167}, {0x4134, 0x6}, {0x9, 0x101}, {0xd5, 0xb32}, {0x1, 0x7}, {0x10001, 0xffffffffffffffff}, {0x5, 0xbd12}, {0x0, 0x7}], 0x5, 0x3}, {[{0x6000000, 0x1}, {0x9, 0x3}, {0x9, 0x1}, {0x2, 0x1}, {0x2, 0x2}, {0x5d3, 0x2}, {0x3f, 0x1}, {0x40, 0x3}, {0x40, 0x3}, {0xfffffffffffff1d5, 0x1}, {0x5, 0x3}], [{0x4, 0x2}, {0x4000000, 0x20}, {0x8001, 0x4}, {0xe38, 0x2}, {0x1ff, 0x3ff}, {0x3f, 0x1}, {0x5, 0x8000}, {0x1ff, 0x7}, {0x80000001, 0x1}, {0x400, 0x8}, {0xb45}], 0x8, 0x8}, {[{0x80, 0x3}, {0x1, 0x3}, {0x6dd2}, {0x5, 0x1}, {}, {0x401, 0x3}, {0x10000, 0x1}, {0x80000001}, {0x5}, {0x2, 0x1}, {0x100000001, 0x1}], [{0x420e, 0x4}, {0x1336, 0x32e}, {0x829a, 0x6}, {0xe6c, 0x3}, {0x3f, 0x7}, {0x2}, {0x0, 0x2}, {0x894, 0x9f4}, {0xff}, {0x2, 0xb48b}, {0xffffffffffff8001, 0x3ff}], 0xb, 0x8}, {[{0x94, 0x2}, {0x1, 0x2}, {0x6, 0x3}, {0xa305, 0x3}, {0x8aa, 0x3}, {0x100000000, 0x3}, {0x8, 0x2}, {0x8ebf, 0x1}, {0x1f, 0x1}, {0x100000000}, {0x101, 0x2}], [{0x4, 0x7f}, {0x2, 0x7f}, {0x40, 0x4}, {0x4311, 0x800}, {0x20, 0x9}, {0x8001, 0x80}, {0x0, 0x9}, {0x8, 0x7fff}, {0x6b709a18, 0x6}, {0x80000000, 0xe2}, {0x4, 0x2}], 0xa, 0x8}, {[{0x80000000, 0x3}, {0x7, 0x3}, {0x84, 0x1}, {0x2, 0x1}, {0xa0000000000, 0x1}, {0x3}, {0x8001, 0x2}, {0x8000, 0x1}, {0x20}, {0x3, 0x1}, {0x3ff, 0x1}], [{0x800, 0x40}, {0x7, 0xc49}, {0xffff, 0x6}, {0x5, 0xffffffffffffffc1}, {0x7, 0x1}, {0x80000001, 0x46}, {0x3, 0x3}, {0x40, 0x1}, {0x300000, 0x2}, {0x5, 0x401}, {0x401, 0xf8}], 0xa, 0x9}, {[{0x100000001}, {0x444, 0x3}, {0x8001, 0x2}, {0xfdc}, {0x1}, {0x10000, 0x2}, {0x18, 0x3}, {0x15, 0x2}, {0xffffffff, 0x1}, {0x1, 0x3}, {0x7}], [{0x1, 0x6}, {0x1, 0xffffffff}, {0x3}, {0xacb, 0xcb0}, {0x1}, {0x4a4, 0x1f}, {0x1, 0x5}, {0x101, 0x80}, {0x101, 0xfffffffffffffe01}, {0x8, 0xffff}, {0x51}], 0x9, 0x7}, {[{0x140000000, 0x1}, {0xffffffffffffffff, 0x3}, {0x6, 0x3}, {0x0, 0x1}, {0x4b0, 0x3}, {0x81, 0x3}, {0x101, 0x3}, {0x0, 0x3}, {0x9, 0x3}, {0x80000000000, 0x2}, {0x7, 0x3}], [{0x6d305fb3, 0x7}, {0xdf, 0x200}, {0x7, 0x3d9}, {0x2, 0xb4f}, {}, {}, {0x2, 0xfc43}, {0x101, 0x6}, {0xd1e0, 0x1000}, {0x6, 0x4}, {0x0, 0x1f}], 0x0, 0x1}, {[{0x7f}, {0x4, 0x1}, {0xfffffffffffffff9, 0x3}, {0x2031e024, 0x3}, {0x9, 0x3}, {0x7, 0x3}, {0x9, 0x2}, {0x10001, 0x3}, {0x10001, 0x1}, {0x1, 0x2}, {0x5da3, 0x3}], [{0xec9, 0xfde}, {0x8001, 0x3}, {0x7ff, 0xdd}, {0xb5, 0x8}, {0x200, 0xffff}, {0x0, 0x2}, {0x3ff, 0x7fff}, {0x3ff, 0x40}, {0x1, 0x7f}, {0x2, 0x379}, {0x6, 0x4}], 0x4, 0x1}, {[{0x1, 0x2}, {0x1, 0x3}, {0x2f, 0x3}, {0x4, 0x3}, {0x2, 0x3}, {0x5, 0x3}, {0x5}, {0x4}, {0x3, 0x3}, {0x7f, 0x3}, {0x80}], [{0x5}, {0x8, 0x920}, {0x80000000, 0x6}, {0x4}, {0x80, 0x18}, {0x51, 0x7}, {0x5, 0x800}, {0x9, 0x3f}, {0x6, 0x8001}, {0xfff, 0x80000000}, {0x8, 0x9}], 0x5, 0x3}, {[{0x3, 0x3}, {0x9}, {0x800, 0x3}, {0x7, 0x3}, {0x7ff, 0x3}, {0x1, 0x2}, {0xfec}, {0x1b800000}, {0x6, 0x2}, {0xfffff80000000000, 0x3}, {0x4, 0x3}], [{0x101, 0x80000001}, {0xff, 0x9}, {0xfffffffffffffff9, 0x1}, {0x3, 0x1}, {0xfffffffffffffff7, 0x78}, {0x9, 0x67}, {0x8, 0x45a}, {0x7f}, {0x7, 0x9}, {0x8, 0x14}, {0x7, 0x101}], 0xb, 0x4}], 0x2, 0x1}}}], [@common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x1}}}, @arpreply={'arpreply\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, 0xffffffffffffffff}}}], @snat={'snat\x00', 0x10, {{@broadcast, 0x10}}}}]}, {0x0, '\x00', 0x5, 0xffffffffffffffff, 0x1, [{0x13, 0x48, 0x601b, 'team_slave_1\x00', 'ipddp0\x00', 'ip6_vti0\x00', 'dummy0\x00', @random="0978e98cac04", [0xff, 0x0, 0xff, 0xff, 0x0, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0xff, 0x0, 0xff, 0x0, 0x0, 0xff], 0xbe, 0x12e, 0x166, [@ipvs={'ipvs\x00', 0x28, {{@ipv4=@broadcast, [0xff, 0xffffffff, 0xffffffff, 0xffffffff], 0x4e21, 0x1, 0x7, 0x4e21, 0x10}}}], [@snat={'snat\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}}}, @snat={'snat\x00', 0x10, {{@remote, 0xffffffffffffffff}}}], @arpreply={'arpreply\x00', 0x10, {{@link_local, 0xfffffffffffffffd}}}}]}]}, 0xfb4) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") ioctl$VIDIOC_SUBDEV_G_SELECTION(r2, 0xc040563d, &(0x7f0000000440)={0x1, 0x0, 0x100, 0x2, {0x2, 0xffffffffffffff2c, 0x6, 0x6}}) bind$inet(r0, &(0x7f0000000140)={0x2, 0x8000000000004e23, @broadcast}, 0xfffffffffffffef6) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x37694bbe087457e2, 0x0) getpeername$netlink(r4, &(0x7f0000000100), &(0x7f0000000180)=0xc) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000380)={'broute\x00'}, &(0x7f0000000400)=0x78) 23:07:31 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0xf000}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:31 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplust', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:31 executing program 1: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x4, 0x0, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:31 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0xffffff1f}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:31 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x80, 0x0) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000540)={0x0, 0xffc5, "1a293ee066d216722ac6349bd2d6b5fba05b8a6ac093d7c3a1581abf1da1c54aa7746c690b9718cbc27e401d3718d070c0617dee355c7d94e8ad3338704070a611483b6a11b55b1417a063371dca1441bbf01ca5606590f417a22b6831f49c39769206c51a3140acb9b28b07347b6ffd923df28922fb0954b15a07ddad224f1b0bf74a5c7b50e0ba6803147e1519a5b52adc4ba940c17a0a9986b6da53bb5184399eb5ac77e04d041956b6a6258d572a26a588d5786b102542890db13dd360ae0138e0a675ca56fed1b40562"}, &(0x7f0000000100)=0xd4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000140)={0x9, 0x2, 0x4, 0x401, r2}, &(0x7f0000000180)=0x10) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") signalfd4(r0, &(0x7f0000000040)={0x8001}, 0x8, 0x800) bind$inet(r0, &(0x7f0000000000)={0x2, 0x200004e23, @rand_addr=0x200}, 0xfffffffffffffea6) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:31 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2f00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:31 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x86ddffff, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:31 executing program 1 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:07:31 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:31 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x3580]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 614.447496][ T3552] FAULT_INJECTION: forcing a failure. [ 614.447496][ T3552] name failslab, interval 1, probability 0, space 0, times 0 [ 614.479727][ T3552] CPU: 0 PID: 3552 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 614.488716][ T3552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 614.499047][ T3552] Call Trace: [ 614.502456][ T3552] dump_stack+0x172/0x1f0 [ 614.506817][ T3552] should_fail.cold+0xa/0x15 [ 614.511424][ T3552] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 614.517608][ T3552] ? ___might_sleep+0x163/0x280 [ 614.522632][ T3552] __should_failslab+0x121/0x190 [ 614.527581][ T3552] should_failslab+0x9/0x14 [ 614.532092][ T3552] __kmalloc+0x2d9/0x740 [ 614.536432][ T3552] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 614.542845][ T3552] ? fput_many+0x12c/0x1a0 [ 614.547265][ T3552] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 614.553603][ T3552] ? strnlen_user+0x1ed/0x2e0 [ 614.558281][ T3552] ? __x64_sys_memfd_create+0x13c/0x470 [ 614.563847][ T3552] __x64_sys_memfd_create+0x13c/0x470 [ 614.569319][ T3552] ? memfd_fcntl+0x1820/0x1820 [ 614.574094][ T3552] ? do_syscall_64+0x26/0x680 [ 614.578775][ T3552] ? lockdep_hardirqs_on+0x418/0x5d0 [ 614.584060][ T3552] ? trace_hardirqs_on+0x67/0x220 [ 614.589203][ T3552] do_syscall_64+0xfd/0x680 [ 614.593724][ T3552] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 614.599888][ T3552] RIP: 0033:0x459279 [ 614.603787][ T3552] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 614.623958][ T3552] RSP: 002b:00007f34331e1a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 614.632551][ T3552] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459279 [ 614.640530][ T3552] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be16c 23:07:31 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x88470000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 614.648525][ T3552] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 614.656604][ T3552] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f34331e26d4 [ 614.664619][ T3552] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:07:31 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplusz', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:31 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x4]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:31 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x5, 0x101000) getsockname$unix(r0, &(0x7f00000001c0)=@abs, &(0x7f0000000240)=0x6e) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) socketpair(0xd, 0x0, 0x4, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54) syz_mount_image$xfs(&(0x7f0000000280)='xfs\x00', &(0x7f00000002c0)='./file0\x00', 0x1, 0x0, &(0x7f0000000300), 0x20, &(0x7f0000000340)=ANY=[@ANYBLOB="737973763925976e77b7dc16d124e93288ae3167726f7570732c6e6f626172726965722c"]) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x104e23, @multicast2}, 0x55) 23:07:31 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x3c00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:31 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x88480000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:31 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x6]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:31 executing program 1 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:07:31 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x88640000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:31 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 614.975944][ T3585] FAULT_INJECTION: forcing a failure. [ 614.975944][ T3585] name failslab, interval 1, probability 0, space 0, times 0 [ 615.000669][ T3585] CPU: 0 PID: 3585 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 615.009787][ T3585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 615.019944][ T3585] Call Trace: [ 615.023258][ T3585] dump_stack+0x172/0x1f0 [ 615.027627][ T3585] should_fail.cold+0xa/0x15 [ 615.032325][ T3585] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 615.038150][ T3585] ? ___might_sleep+0x163/0x280 [ 615.043016][ T3585] __should_failslab+0x121/0x190 [ 615.047966][ T3585] ? shmem_destroy_inode+0x80/0x80 [ 615.053163][ T3585] should_failslab+0x9/0x14 [ 615.057698][ T3585] kmem_cache_alloc+0x2af/0x6f0 [ 615.062642][ T3585] ? find_held_lock+0x35/0x130 [ 615.067405][ T3585] ? __alloc_fd+0x44d/0x560 [ 615.072000][ T3585] ? shmem_destroy_inode+0x80/0x80 [ 615.077550][ T3585] shmem_alloc_inode+0x1c/0x50 [ 615.082319][ T3585] alloc_inode+0x68/0x1e0 [ 615.086659][ T3585] new_inode_pseudo+0x19/0xf0 [ 615.091337][ T3585] new_inode+0x1f/0x40 [ 615.095413][ T3585] shmem_get_inode+0x84/0x7e0 [ 615.100103][ T3585] __shmem_file_setup.part.0+0x7e/0x2b0 [ 615.105660][ T3585] shmem_file_setup+0x66/0x90 [ 615.110350][ T3585] __x64_sys_memfd_create+0x2a2/0x470 [ 615.115824][ T3585] ? memfd_fcntl+0x1820/0x1820 [ 615.120651][ T3585] ? do_syscall_64+0x26/0x680 [ 615.125340][ T3585] ? lockdep_hardirqs_on+0x418/0x5d0 [ 615.130629][ T3585] ? trace_hardirqs_on+0x67/0x220 [ 615.135660][ T3585] do_syscall_64+0xfd/0x680 [ 615.140177][ T3585] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 615.146152][ T3585] RIP: 0033:0x459279 [ 615.150134][ T3585] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 23:07:32 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:32 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x4000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 615.169835][ T3585] RSP: 002b:00007f34331e1a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 615.178346][ T3585] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459279 [ 615.186548][ T3585] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be16c [ 615.194715][ T3585] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 615.202785][ T3585] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f34331e26d4 [ 615.210756][ T3585] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:07:32 executing program 1 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:07:32 executing program 3: r0 = socket$inet(0x2b, 0x5, 0x9) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") openat$userio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/userio\x00', 0x2, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f0000000540)={'broute\x00'}, &(0x7f0000000440)=0x78) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r2 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000340), &(0x7f0000000380)=0x4) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) r3 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x1, 0x100) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r3, 0x6, 0x15, &(0x7f0000000480)=0x1, 0x4) sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800020}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB="e0000000", @ANYRES16=r4, @ANYBLOB="00012dbd7000fbdbdf250a00000008000400710000004000010008000b007369700014000300ac1e010100000000000000000000000008000600736564000800060064680000080004004e23000008000b52db8d69000800edff00000000080006001f000000080004007f0000002400020008000400080000000800040076000000080002004e23000008000b0002000000280001000c0006006e6f6e6500000000080006006c6300000800010002750000080006007365646300000000000000000900000014000300ff010000000000000000000000000001"], 0xe0}}, 0x0) 23:07:32 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x88a8ffff, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:32 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x4305]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:32 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xd]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 615.356614][ T3596] hfsplus: unable to find HFS+ superblock [ 615.383279][ T3602] FAULT_INJECTION: forcing a failure. [ 615.383279][ T3602] name failslab, interval 1, probability 0, space 0, times 0 [ 615.415566][ T3602] CPU: 0 PID: 3602 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 615.424642][ T3602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 615.434911][ T3602] Call Trace: [ 615.434940][ T3602] dump_stack+0x172/0x1f0 [ 615.442825][ T3602] should_fail.cold+0xa/0x15 [ 615.447711][ T3602] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 615.453563][ T3602] ? ___might_sleep+0x163/0x280 [ 615.458518][ T3602] __should_failslab+0x121/0x190 [ 615.463467][ T3602] should_failslab+0x9/0x14 [ 615.467983][ T3602] kmem_cache_alloc+0x2af/0x6f0 [ 615.467996][ T3602] ? current_time+0x6b/0x140 [ 615.468015][ T3602] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 615.483301][ T3602] ? lockdep_hardirqs_on+0x418/0x5d0 [ 615.488622][ T3602] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 615.494902][ T3602] ? timespec64_trunc+0xf0/0x180 [ 615.499860][ T3602] __d_alloc+0x2e/0x8c0 [ 615.504035][ T3602] d_alloc_pseudo+0x1e/0x70 [ 615.508731][ T3602] alloc_file_pseudo+0xe2/0x280 23:07:32 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = getpgrp(0xffffffffffffffff) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000140)=0x0) r3 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x3, 0x0) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f00000001c0)={r3, r0, 0x8}) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000200)=0xfc0000, 0x4) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) accept$inet(r4, 0x0, &(0x7f0000000040)) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) r5 = shmget(0x1, 0x2000, 0x100, &(0x7f0000ffb000/0x2000)=nil) write$P9_RMKNOD(r3, &(0x7f0000000240)={0x14, 0x13, 0x1, {0x28, 0x0, 0x5}}, 0x14) shmctl$IPC_STAT(r5, 0x2, &(0x7f0000000080)=""/136) [ 615.513854][ T3602] ? alloc_file+0x4d0/0x4d0 [ 615.513875][ T3602] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 615.513898][ T3602] __shmem_file_setup.part.0+0x108/0x2b0 [ 615.513917][ T3602] shmem_file_setup+0x66/0x90 [ 615.524776][ T3602] __x64_sys_memfd_create+0x2a2/0x470 [ 615.524794][ T3602] ? memfd_fcntl+0x1820/0x1820 [ 615.524810][ T3602] ? do_syscall_64+0x26/0x680 [ 615.524826][ T3602] ? lockdep_hardirqs_on+0x418/0x5d0 [ 615.524846][ T3602] ? trace_hardirqs_on+0x67/0x220 [ 615.555272][ T3602] do_syscall_64+0xfd/0x680 [ 615.555295][ T3602] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 615.555305][ T3602] RIP: 0033:0x459279 [ 615.555323][ T3602] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 615.575152][ T3602] RSP: 002b:00007f34331e1a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 615.575168][ T3602] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459279 23:07:32 executing program 1 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:07:32 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x28]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:32 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2040, 0x0) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f0000000080)=""/128, &(0x7f0000000100)=0x80) r1 = socket$inet(0x2b, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000180)={0x0, 0x7}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000200)={r3, 0xffffffff}, 0x8) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e27, @dev={0xac, 0x14, 0x14, 0x25}}, 0xfffffffffffffef1) connect$inet(r1, &(0x7f0000000300)={0x2, 0x4e26, @loopback}, 0x10) times(&(0x7f0000000140)) [ 615.575177][ T3602] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be16c [ 615.575186][ T3602] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 615.575195][ T3602] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f34331e26d4 [ 615.575203][ T3602] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 [ 615.666156][ T3615] hfsplus: unable to find HFS+ superblock [ 615.728011][ T3621] FAULT_INJECTION: forcing a failure. [ 615.728011][ T3621] name failslab, interval 1, probability 0, space 0, times 0 [ 615.764245][ T3621] CPU: 0 PID: 3621 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 615.773232][ T3621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 615.773239][ T3621] Call Trace: [ 615.773262][ T3621] dump_stack+0x172/0x1f0 [ 615.773284][ T3621] should_fail.cold+0xa/0x15 [ 615.773305][ T3621] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 615.786777][ T3621] ? ___might_sleep+0x163/0x280 [ 615.786800][ T3621] __should_failslab+0x121/0x190 [ 615.786814][ T3621] should_failslab+0x9/0x14 [ 615.786827][ T3621] kmem_cache_alloc+0x2af/0x6f0 [ 615.786849][ T3621] __alloc_file+0x27/0x300 [ 615.786864][ T3621] alloc_empty_file+0x72/0x170 [ 615.786877][ T3621] alloc_file+0x5e/0x4d0 [ 615.786892][ T3621] alloc_file_pseudo+0x189/0x280 [ 615.786909][ T3621] ? alloc_file+0x4d0/0x4d0 [ 615.843613][ T3621] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 615.849869][ T3621] __shmem_file_setup.part.0+0x108/0x2b0 [ 615.855594][ T3621] shmem_file_setup+0x66/0x90 [ 615.860970][ T3621] __x64_sys_memfd_create+0x2a2/0x470 [ 615.866535][ T3621] ? memfd_fcntl+0x1820/0x1820 [ 615.871395][ T3621] ? do_syscall_64+0x26/0x680 [ 615.876433][ T3621] ? lockdep_hardirqs_on+0x418/0x5d0 [ 615.881726][ T3621] ? trace_hardirqs_on+0x67/0x220 [ 615.886763][ T3621] do_syscall_64+0xfd/0x680 [ 615.891282][ T3621] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 615.897174][ T3621] RIP: 0033:0x459279 [ 615.901070][ T3621] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 23:07:32 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:32 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x88caffff, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:32 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x4788]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:32 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x29]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 615.920850][ T3621] RSP: 002b:00007f34331e1a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 615.929454][ T3621] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459279 [ 615.929464][ T3621] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be16c [ 615.929473][ T3621] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 615.929480][ T3621] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f34331e26d4 [ 615.929494][ T3621] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:07:32 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:33 executing program 1 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:07:33 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x4888]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:33 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2b]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:33 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x89060000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 616.151866][ T3636] FAULT_INJECTION: forcing a failure. [ 616.151866][ T3636] name failslab, interval 1, probability 0, space 0, times 0 [ 616.179583][ T3640] hfsplus: unable to find HFS+ superblock [ 616.186257][ T3636] CPU: 0 PID: 3636 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 23:07:33 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") r2 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) ioctl$sock_bt_hci(r2, 0xc00448dd, &(0x7f0000000080)="4850fd434218285afc4d586474ed13ecc2a0b2badb122f96c5725010b323c1801f1baa68e1fd3f17599d1f9c7d10476025e40530c1607123d67ea2e2378f6529702bfc70ea84d6b390a0cec3277aa2310050c2447275aab657d999af3dd74dd333d320a83cb61728e5aa7c1b9a6cdfdc3b6afb81e7cde4b6b27a2990189ddcca97d39e269ac8d13eb010f412c130b2daf4328924d0b8c8fb895a44e24108017926b9cfa9416bb6b5f7d03291c8622e5faafd5ee04d50c6fb64d87c32f39dee8b02e14b74a54e4423d2d3edd842301c13e3") bind$inet(r0, &(0x7f0000000000)={0x2, 0x800000004e23, @rand_addr=0xfffffffffffffff9}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) [ 616.195215][ T3636] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 616.207786][ T3636] Call Trace: [ 616.207813][ T3636] dump_stack+0x172/0x1f0 [ 616.207834][ T3636] should_fail.cold+0xa/0x15 [ 616.207852][ T3636] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 616.207869][ T3636] ? ___might_sleep+0x163/0x280 [ 616.207888][ T3636] __should_failslab+0x121/0x190 [ 616.207903][ T3636] should_failslab+0x9/0x14 [ 616.207917][ T3636] kmem_cache_alloc+0x2af/0x6f0 [ 616.207932][ T3636] ? rcu_read_lock_sched_held+0x110/0x130 [ 616.207944][ T3636] ? kmem_cache_alloc+0x32b/0x6f0 [ 616.207961][ T3636] security_file_alloc+0x39/0x170 [ 616.207977][ T3636] __alloc_file+0xac/0x300 [ 616.207994][ T3636] alloc_empty_file+0x72/0x170 [ 616.208010][ T3636] alloc_file+0x5e/0x4d0 [ 616.208028][ T3636] alloc_file_pseudo+0x189/0x280 [ 616.208044][ T3636] ? alloc_file+0x4d0/0x4d0 [ 616.208061][ T3636] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 616.208083][ T3636] __shmem_file_setup.part.0+0x108/0x2b0 [ 616.261609][ T3636] shmem_file_setup+0x66/0x90 [ 616.261632][ T3636] __x64_sys_memfd_create+0x2a2/0x470 [ 616.275028][ T3636] ? memfd_fcntl+0x1820/0x1820 [ 616.275044][ T3636] ? do_syscall_64+0x26/0x680 [ 616.275063][ T3636] ? lockdep_hardirqs_on+0x418/0x5d0 [ 616.321088][ T3636] ? trace_hardirqs_on+0x67/0x220 [ 616.326207][ T3636] do_syscall_64+0xfd/0x680 [ 616.330716][ T3636] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 616.336702][ T3636] RIP: 0033:0x459279 [ 616.340594][ T3636] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 616.360634][ T3636] RSP: 002b:00007f34331e1a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 616.370922][ T3636] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459279 [ 616.378901][ T3636] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be16c [ 616.386876][ T3636] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 616.394861][ T3636] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f34331e26d4 23:07:33 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x6488]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:33 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2c]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 616.402842][ T3636] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 [ 616.523575][ T3649] hfsplus: unable to find HFS+ superblock 23:07:33 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:33 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x89ffffff, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:33 executing program 3: r0 = socket$inet(0x2b, 0x10000000080001, 0x144f35f8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x200, 0x1) ioctl$ASHMEM_GET_PIN_STATUS(r2, 0x7709, 0x0) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") setsockopt$bt_hci_HCI_DATA_DIR(r2, 0x0, 0x1, &(0x7f00000000c0)=0x3ff, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) openat$cgroup_ro(r2, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x0, 0x0) 23:07:33 executing program 1 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:07:33 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2f]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:33 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x6c00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:33 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xff000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 616.647769][ T3662] FAULT_INJECTION: forcing a failure. [ 616.647769][ T3662] name failslab, interval 1, probability 0, space 0, times 0 [ 616.683848][ T3662] CPU: 0 PID: 3662 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 23:07:33 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x3c]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 616.692851][ T3662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 616.703011][ T3662] Call Trace: [ 616.706329][ T3662] dump_stack+0x172/0x1f0 [ 616.710686][ T3662] should_fail.cold+0xa/0x15 [ 616.715495][ T3662] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 616.721325][ T3662] ? ___might_sleep+0x163/0x280 [ 616.726187][ T3662] __should_failslab+0x121/0x190 [ 616.731155][ T3662] should_failslab+0x9/0x14 [ 616.735665][ T3662] __kmalloc+0x2d9/0x740 [ 616.739928][ T3662] ? tomoyo_realpath_from_path+0xc0/0x7a0 23:07:33 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x800e]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:33 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/qat_adf_ctl\x00', 0x800, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000340)={{0x6d, 0x5}, 'port0\x00', 0x50, 0x400, 0x4a, 0x73, 0x0, 0xca92, 0xbfe, 0x0, 0x3}) ioctl(0xffffffffffffffff, 0x6, &(0x7f0000000400)="75b6177c0af01f704d09a8412eba73") vmsplice(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000040)="d578", 0x2}, {&(0x7f0000000080)="b6652bd10f90f58a9ae7fc144ec98d279431f7a99e9937c66b673c48bb0f5650ff7452bdf01decb789becedc0b2208f4416b642a92c8f95aa2abbebd7f69a4d349b7eb507bf12f9c4c40aac94db51c95c7043e89bb722aec0660b71f65f23d43132f871e45d467ff862fbd35c0e86624f40e639e3c1e98eb8a993383b3dd2d80a96872b545bb9fda3d930e3c7ca62f", 0x8f}], 0x2, 0x2) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="a600000088416d1fdccf8429a68e1eb9196d74234d2b50dcf1f4452db62585eb15a0a3555d21afb7bd94431f11eb4a806065e0606f87027e3293036d5b34195ac5290545b9f275862b4458463c26f95b36cc2fb05e09a1eeb00f13d9e70812c00443070539f91fb28ce4ceb447205bb30b13f985384e63da25d1c66cc513daf86cb7fe8c2e850006574dec6c2df5398bbc91ef8448d8201c2615e1452d34d837fe16b93e6636888afb31"], &(0x7f0000000240)=0xae) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000280)={r1, 0x80}, 0x8) [ 616.745663][ T3662] ? rcu_read_lock_sched_held+0x110/0x130 [ 616.751391][ T3662] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 616.757233][ T3662] tomoyo_realpath_from_path+0xcd/0x7a0 [ 616.762794][ T3662] ? tomoyo_path_perm+0x1cb/0x430 [ 616.767848][ T3662] tomoyo_path_perm+0x230/0x430 [ 616.772711][ T3662] ? tomoyo_path_perm+0x1cb/0x430 [ 616.777752][ T3662] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 616.783841][ T3662] ? find_held_lock+0x35/0x130 [ 616.788628][ T3662] ? lock_downgrade+0x880/0x880 [ 616.793489][ T3662] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 616.799777][ T3662] tomoyo_path_truncate+0x1d/0x30 [ 616.804992][ T3662] security_path_truncate+0xf2/0x150 [ 616.810309][ T3662] do_sys_ftruncate+0x3d9/0x550 [ 616.815187][ T3662] __x64_sys_ftruncate+0x59/0x80 [ 616.820149][ T3662] do_syscall_64+0xfd/0x680 [ 616.824676][ T3662] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 616.828880][ T3671] QAT: Invalid ioctl [ 616.830652][ T3662] RIP: 0033:0x459247 23:07:33 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8035]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 616.830670][ T3662] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 616.830678][ T3662] RSP: 002b:00007f34331e1a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 616.830691][ T3662] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459247 [ 616.830705][ T3662] RDX: 0000000020000228 RSI: 0000000000020000 RDI: 0000000000000004 [ 616.849760][ T3672] QAT: Invalid ioctl [ 616.858065][ T3662] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 23:07:33 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x6c]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 616.858074][ T3662] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 616.858081][ T3662] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 [ 616.970914][ T3673] hfsplus: unable to find HFS+ superblock [ 617.055659][ T3662] ERROR: Out of memory at tomoyo_realpath_from_path. [ 617.079778][ T3682] hfsplus: unable to find HFS+ superblock 23:07:34 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:34 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xffffa888, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:34 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x880, 0x0) ioctl$VIDIOC_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f0000000140)={0x0, 0x0, [], @bt={0xffff, 0x560a, 0x8000, 0xa6, 0xfffffffffffffffb, 0x5, 0x10, 0x2}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x200, 0x0) ioctl$VHOST_NET_SET_BACKEND(r3, 0x4008af30, &(0x7f0000000080)={0x0, 0xffffffffffffff9c}) ioctl$SNDRV_TIMER_IOCTL_TREAD(r3, 0x40045402, &(0x7f00000000c0)=0x1) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:34 executing program 1 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:07:34 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8100]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:34 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xf0]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:34 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x543]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:34 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xffffca88, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:34 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8847]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:34 executing program 3: lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=@md5={0x1, "c20fcdb8bc7851eade7d5ecc3ee5d7d6"}, 0x11, 0x1) r0 = socket$inet(0x2b, 0xfffffffffffffffc, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) [ 617.286986][ T3704] FAULT_INJECTION: forcing a failure. [ 617.286986][ T3704] name failslab, interval 1, probability 0, space 0, times 0 [ 617.328698][ T3704] CPU: 0 PID: 3704 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 617.337672][ T3704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 617.347821][ T3704] Call Trace: [ 617.351117][ T3704] dump_stack+0x172/0x1f0 [ 617.355467][ T3704] should_fail.cold+0xa/0x15 [ 617.360080][ T3704] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 617.365902][ T3704] ? ___might_sleep+0x163/0x280 [ 617.370781][ T3704] __should_failslab+0x121/0x190 [ 617.375733][ T3704] should_failslab+0x9/0x14 [ 617.380245][ T3704] kmem_cache_alloc+0x2af/0x6f0 [ 617.385107][ T3704] ? rcu_read_lock_sched_held+0x110/0x130 [ 617.390832][ T3704] ? kmem_cache_alloc+0x32b/0x6f0 [ 617.395885][ T3704] security_file_alloc+0x39/0x170 [ 617.400922][ T3704] __alloc_file+0xac/0x300 [ 617.405365][ T3704] alloc_empty_file+0x72/0x170 [ 617.410136][ T3704] alloc_file+0x5e/0x4d0 [ 617.414483][ T3704] alloc_file_pseudo+0x189/0x280 [ 617.419428][ T3704] ? alloc_file+0x4d0/0x4d0 23:07:34 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xffffdd86, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:34 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8848]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 617.423980][ T3704] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 617.430238][ T3704] __shmem_file_setup.part.0+0x108/0x2b0 [ 617.435877][ T3704] shmem_file_setup+0x66/0x90 [ 617.440557][ T3704] __x64_sys_memfd_create+0x2a2/0x470 [ 617.445927][ T3704] ? memfd_fcntl+0x1820/0x1820 [ 617.450783][ T3704] ? do_syscall_64+0x26/0x680 [ 617.455461][ T3704] ? lockdep_hardirqs_on+0x418/0x5d0 [ 617.460763][ T3704] ? trace_hardirqs_on+0x67/0x220 [ 617.465802][ T3704] do_syscall_64+0xfd/0x680 [ 617.470317][ T3704] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 617.476207][ T3704] RIP: 0033:0x459279 [ 617.480106][ T3704] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 617.499716][ T3704] RSP: 002b:00007f34331e1a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 617.508129][ T3704] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459279 [ 617.508137][ T3704] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be16c [ 617.508146][ T3704] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 617.508153][ T3704] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f34331e26d4 [ 617.508160][ T3704] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 [ 617.548513][ T3699] hfsplus: unable to find HFS+ superblock [ 617.601278][ T3719] hfsplus: unable to find HFS+ superblock 23:07:34 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:34 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x8, &(0x7f0000000080)="cba674fbe37c0507659bf9ffffffffff") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:34 executing program 1 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:07:34 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x600]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:34 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xfffff000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:34 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8864]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:34 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xffffff89, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:34 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x608]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 617.759763][ T3728] FAULT_INJECTION: forcing a failure. [ 617.759763][ T3728] name failslab, interval 1, probability 0, space 0, times 0 [ 617.801116][ T3728] CPU: 0 PID: 3728 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 617.810120][ T3728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 617.810133][ T3728] Call Trace: [ 617.823482][ T3728] dump_stack+0x172/0x1f0 [ 617.827829][ T3728] should_fail.cold+0xa/0x15 [ 617.832426][ T3728] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 617.832447][ T3728] ? ___might_sleep+0x163/0x280 [ 617.843072][ T3728] __should_failslab+0x121/0x190 [ 617.843090][ T3728] should_failslab+0x9/0x14 [ 617.852502][ T3728] __kmalloc+0x2d9/0x740 [ 617.852519][ T3728] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 617.852536][ T3728] ? simple_dname+0xd1/0x1f0 [ 617.867565][ T3728] ? tomoyo_encode2.part.0+0xf5/0x400 [ 617.872940][ T3728] tomoyo_encode2.part.0+0xf5/0x400 [ 617.878141][ T3728] tomoyo_encode+0x2b/0x50 [ 617.882555][ T3728] tomoyo_realpath_from_path+0x1d3/0x7a0 [ 617.888193][ T3728] ? tomoyo_path_perm+0x1cb/0x430 [ 617.893231][ T3728] tomoyo_path_perm+0x230/0x430 23:07:34 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xf0ffffffffffff, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 617.898105][ T3728] ? tomoyo_path_perm+0x1cb/0x430 [ 617.903145][ T3728] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 617.909229][ T3728] ? find_held_lock+0x35/0x130 [ 617.914008][ T3728] ? lock_downgrade+0x880/0x880 [ 617.918868][ T3728] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 617.925149][ T3728] tomoyo_path_truncate+0x1d/0x30 [ 617.930179][ T3728] security_path_truncate+0xf2/0x150 [ 617.935469][ T3728] do_sys_ftruncate+0x3d9/0x550 [ 617.940356][ T3728] __x64_sys_ftruncate+0x59/0x80 [ 617.945301][ T3728] do_syscall_64+0xfd/0x680 [ 617.945321][ T3728] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 617.945336][ T3728] RIP: 0033:0x459247 [ 617.959612][ T3728] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 617.979400][ T3728] RSP: 002b:00007f34331e1a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 617.979414][ T3728] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459247 23:07:34 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000040)={'bridge_slave_1\x00', {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:34 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8906]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 617.979423][ T3728] RDX: 0000000020000228 RSI: 0000000000020000 RDI: 0000000000000004 [ 617.979432][ T3728] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 617.979439][ T3728] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 617.979446][ T3728] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:07:35 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xf000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 618.051611][ T3738] hfsplus: unable to find HFS+ superblock [ 618.079732][ T3728] ERROR: Out of memory at tomoyo_realpath_from_path. [ 618.140086][ T3748] hfsplus: unable to find HFS+ superblock 23:07:35 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:35 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x689]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:35 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x100000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:35 executing program 3: openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/fscreate\x00', 0x2, 0x0) r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000100)=[@window={0x3, 0x8, 0x1}, @mss={0x2, 0xa358}, @sack_perm, @sack_perm, @window={0x3, 0x80, 0x5}], 0x5) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000080)=0x4) 23:07:35 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xff00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:35 executing program 1 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:07:35 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x200000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:35 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xf0ffff]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:35 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x806]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 618.300667][ T3758] FAULT_INJECTION: forcing a failure. [ 618.300667][ T3758] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 618.375137][ T3758] CPU: 0 PID: 3758 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 618.384124][ T3758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 618.394191][ T3758] Call Trace: [ 618.397585][ T3758] dump_stack+0x172/0x1f0 [ 618.402115][ T3758] should_fail.cold+0xa/0x15 [ 618.406722][ T3758] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 618.412546][ T3758] ? ___might_sleep+0x163/0x280 [ 618.417433][ T3758] should_fail_alloc_page+0x50/0x60 23:07:35 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xd00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 618.422725][ T3758] __alloc_pages_nodemask+0x1a1/0x8d0 [ 618.428115][ T3758] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 618.433848][ T3758] ? mark_held_locks+0xf0/0xf0 [ 618.438617][ T3758] ? mark_held_locks+0xf0/0xf0 [ 618.443412][ T3758] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 618.449663][ T3758] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 618.455926][ T3758] alloc_pages_vma+0xdd/0x540 [ 618.460621][ T3758] shmem_alloc_page+0xc0/0x180 [ 618.465391][ T3758] ? shmem_swapin+0x1a0/0x1a0 [ 618.470189][ T3758] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 618.475915][ T3758] ? __vm_enough_memory+0x17e/0x3a0 [ 618.481126][ T3758] shmem_alloc_and_acct_page+0x165/0x970 [ 618.486960][ T3758] shmem_getpage_gfp+0x43b/0x2500 [ 618.492003][ T3758] ? shmem_unuse_inode+0x1010/0x1010 [ 618.497811][ T3758] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 618.503620][ T3758] ? current_time+0x6b/0x140 [ 618.508386][ T3758] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 618.514281][ T3758] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 23:07:35 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x400000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 618.520537][ T3758] ? iov_iter_fault_in_readable+0x22c/0x450 [ 618.526451][ T3758] shmem_write_begin+0x105/0x1e0 [ 618.531411][ T3758] generic_perform_write+0x22a/0x520 [ 618.536716][ T3758] ? page_endio+0x780/0x780 [ 618.541234][ T3758] ? current_time+0x140/0x140 [ 618.545919][ T3758] ? lock_acquire+0x16f/0x3f0 [ 618.551035][ T3758] __generic_file_write_iter+0x25e/0x630 [ 618.556671][ T3758] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 618.562569][ T3758] generic_file_write_iter+0x360/0x610 [ 618.568405][ T3758] ? __generic_file_write_iter+0x630/0x630 23:07:35 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x1000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 618.574237][ T3758] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 618.580751][ T3758] ? iov_iter_init+0xee/0x220 [ 618.585433][ T3758] new_sync_write+0x4d3/0x770 [ 618.590121][ T3758] ? new_sync_read+0x800/0x800 [ 618.595220][ T3758] ? lock_downgrade+0x880/0x880 [ 618.600107][ T3758] __vfs_write+0xe1/0x110 [ 618.604535][ T3758] vfs_write+0x268/0x5d0 [ 618.608800][ T3758] ksys_pwrite64+0x183/0x1c0 [ 618.613410][ T3758] ? __ia32_sys_pread64+0xf0/0xf0 [ 618.618447][ T3758] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 618.624004][ T3758] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 618.629469][ T3758] ? do_syscall_64+0x26/0x680 [ 618.634149][ T3758] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 618.640309][ T3758] ? do_syscall_64+0x26/0x680 [ 618.644992][ T3758] __x64_sys_pwrite64+0x97/0xf0 [ 618.649847][ T3758] do_syscall_64+0xfd/0x680 [ 618.654355][ T3758] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 618.660852][ T3758] RIP: 0033:0x4131c7 [ 618.664929][ T3758] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 618.684654][ T3758] RSP: 002b:00007f34331e1a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 618.693164][ T3758] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004131c7 [ 618.701145][ T3758] RDX: 0000000000000048 RSI: 0000000020000240 RDI: 0000000000000004 [ 618.709118][ T3758] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 618.717090][ T3758] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 618.725060][ T3758] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 [ 618.765811][ T3769] hfsplus: unable to find HFS+ superblock 23:07:35 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:35 executing program 3: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x80000001, 0x4100) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000100)={0xe, 0x5, 0x8, 0x7, 0x68, "e6abcb543439d518286e5e04361049bd4ca5e32c9defc45425cddfea38101cf2be7f69d4980dcf6db2fb85d4e01223c62b486d25195264d5ad7a5ce60b79d4f88834d51d91725354144306895c2cdc65e6783ac03f269f75c379c623d3077c1851baf2a5f225c7c9"}, 0x74) r1 = socket$inet(0x2b, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) getsockopt$bt_hci(r2, 0x0, 0x3, &(0x7f0000000040)=""/48, &(0x7f0000000080)=0x30) connect$inet(r1, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:35 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xe80]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:35 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:35 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x600000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:35 executing program 1 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 618.883046][ T3769] hfsplus: unable to find HFS+ superblock 23:07:35 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x800000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 618.981375][ T3790] FAULT_INJECTION: forcing a failure. [ 618.981375][ T3790] name fail_page_alloc, interval 1, probability 0, space 0, times 0 23:07:36 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2800]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:36 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x4000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 619.022323][ T3790] CPU: 0 PID: 3790 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 619.031307][ T3790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 619.041405][ T3790] Call Trace: [ 619.044705][ T3790] dump_stack+0x172/0x1f0 [ 619.049054][ T3790] should_fail.cold+0xa/0x15 [ 619.053661][ T3790] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 619.059482][ T3790] ? ___might_sleep+0x163/0x280 [ 619.064351][ T3790] should_fail_alloc_page+0x50/0x60 23:07:36 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xffffffffffffc207, 0x10042) [ 619.069561][ T3790] __alloc_pages_nodemask+0x1a1/0x8d0 [ 619.075030][ T3790] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 619.080764][ T3790] ? mark_held_locks+0xf0/0xf0 [ 619.085640][ T3790] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 619.092290][ T3790] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 619.098640][ T3790] alloc_pages_vma+0xdd/0x540 [ 619.103439][ T3790] shmem_alloc_page+0xc0/0x180 [ 619.108482][ T3790] ? shmem_swapin+0x1a0/0x1a0 [ 619.113196][ T3790] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 619.118930][ T3790] ? __vm_enough_memory+0x17e/0x3a0 [ 619.124154][ T3790] shmem_alloc_and_acct_page+0x165/0x970 [ 619.129805][ T3790] shmem_getpage_gfp+0x43b/0x2500 [ 619.134856][ T3790] ? shmem_unuse_inode+0x1010/0x1010 [ 619.140162][ T3790] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 619.145989][ T3790] ? current_time+0x6b/0x140 [ 619.150581][ T3790] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 619.156393][ T3790] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 619.156413][ T3790] ? iov_iter_fault_in_readable+0x22c/0x450 23:07:36 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x6000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 619.156434][ T3790] shmem_write_begin+0x105/0x1e0 [ 619.156453][ T3790] generic_perform_write+0x22a/0x520 [ 619.156473][ T3790] ? page_endio+0x780/0x780 [ 619.156487][ T3790] ? current_time+0x140/0x140 [ 619.156505][ T3790] ? lock_acquire+0x16f/0x3f0 [ 619.156524][ T3790] __generic_file_write_iter+0x25e/0x630 [ 619.198285][ T3790] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 619.204022][ T3790] generic_file_write_iter+0x360/0x610 [ 619.209581][ T3790] ? __generic_file_write_iter+0x630/0x630 [ 619.212194][ T3795] hfsplus: unable to find HFS+ superblock 23:07:36 executing program 3: r0 = socket$inet(0x2b, 0x801, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x6) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_PIT(r2, 0x8048ae66, &(0x7f0000000040)={[{0x1, 0x6, 0x8, 0x2, 0x400, 0xa, 0x1000, 0x1, 0x8, 0x6, 0x5, 0x1, 0x40}, {0xf5, 0x0, 0x5, 0x8, 0x0, 0xffffffffffff7fff, 0x2, 0x694, 0x200, 0x3, 0x9, 0x2, 0x9}, {0x200, 0x3, 0xffffffffffffff80, 0x2, 0x6, 0x7f, 0x5, 0x1, 0x6, 0x3, 0x0, 0x1, 0x1}], 0x2}) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) [ 619.215421][ T3790] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 619.215439][ T3790] ? iov_iter_init+0xee/0x220 [ 619.215455][ T3790] new_sync_write+0x4d3/0x770 [ 619.215471][ T3790] ? new_sync_read+0x800/0x800 [ 619.215484][ T3790] ? lock_downgrade+0x880/0x880 [ 619.215517][ T3790] __vfs_write+0xe1/0x110 [ 619.241819][ T3790] vfs_write+0x268/0x5d0 [ 619.255386][ T3790] ksys_pwrite64+0x183/0x1c0 [ 619.259987][ T3790] ? __ia32_sys_pread64+0xf0/0xf0 [ 619.265025][ T3790] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 619.265042][ T3790] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 619.265058][ T3790] ? do_syscall_64+0x26/0x680 [ 619.265075][ T3790] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 619.265093][ T3790] ? do_syscall_64+0x26/0x680 [ 619.280669][ T3790] __x64_sys_pwrite64+0x97/0xf0 [ 619.280690][ T3790] do_syscall_64+0xfd/0x680 [ 619.280709][ T3790] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 619.280725][ T3790] RIP: 0033:0x4131c7 [ 619.296617][ T3790] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 619.296625][ T3790] RSP: 002b:00007f34331e1a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 619.296640][ T3790] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004131c7 [ 619.296649][ T3790] RDX: 0000000000000048 RSI: 0000000020000240 RDI: 0000000000000004 [ 619.296658][ T3790] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 619.296666][ T3790] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 [ 619.296673][ T3790] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 [ 619.456948][ T3795] hfsplus: unable to find HFS+ superblock 23:07:36 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:36 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:36 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2900]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:36 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x806000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:36 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:36 executing program 1 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:07:36 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8060000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 619.629873][ T3822] FAULT_INJECTION: forcing a failure. [ 619.629873][ T3822] name failslab, interval 1, probability 0, space 0, times 0 [ 619.665911][ T3822] CPU: 0 PID: 3822 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 619.674995][ T3822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 619.685150][ T3822] Call Trace: [ 619.688461][ T3822] dump_stack+0x172/0x1f0 [ 619.692810][ T3822] should_fail.cold+0xa/0x15 [ 619.697424][ T3822] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 619.703252][ T3822] ? ___might_sleep+0x163/0x280 [ 619.708114][ T3822] __should_failslab+0x121/0x190 [ 619.713054][ T3822] should_failslab+0x9/0x14 [ 619.717572][ T3822] kmem_cache_alloc+0x2af/0x6f0 [ 619.722577][ T3822] ? stack_trace_save+0xac/0xe0 [ 619.727428][ T3822] ? stack_trace_consume_entry+0x190/0x190 [ 619.733330][ T3822] __alloc_file+0x27/0x300 [ 619.737750][ T3822] alloc_empty_file+0x72/0x170 [ 619.742528][ T3822] path_openat+0xef/0x46d0 [ 619.746945][ T3822] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 619.752930][ T3822] ? __lock_acquire+0x54f/0x5490 [ 619.757870][ T3822] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 619.764040][ T3822] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 619.769425][ T3822] ? __alloc_fd+0x44d/0x560 [ 619.774025][ T3822] do_filp_open+0x1a1/0x280 [ 619.778538][ T3822] ? may_open_dev+0x100/0x100 [ 619.783219][ T3822] ? lock_downgrade+0x880/0x880 [ 619.788235][ T3822] ? kasan_check_read+0x11/0x20 [ 619.794225][ T3822] ? do_raw_spin_unlock+0x57/0x270 [ 619.799973][ T3822] ? _raw_spin_unlock+0x2d/0x50 [ 619.806657][ T3822] ? __alloc_fd+0x44d/0x560 [ 619.811436][ T3822] do_sys_open+0x3fe/0x5d0 [ 619.816119][ T3822] ? filp_open+0x80/0x80 [ 619.820384][ T3822] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 619.825840][ T3822] ? do_syscall_64+0x26/0x680 23:07:36 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x401, 0x401) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000100)={r1, 0x0, 0x3, 0x7, 0x6}) r2 = socket$inet(0x2b, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r2, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7, 0x40000) ioctl$NBD_CLEAR_SOCK(r4, 0xab04) [ 619.830783][ T3822] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 619.837110][ T3822] ? do_syscall_64+0x26/0x680 [ 619.841790][ T3822] __x64_sys_open+0x7e/0xc0 [ 619.846397][ T3822] do_syscall_64+0xfd/0x680 [ 619.850921][ T3822] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 619.856826][ T3822] RIP: 0033:0x413161 [ 619.860729][ T3822] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 23:07:36 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xd00000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:36 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2b00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 619.881214][ T3822] RSP: 002b:00007f34331e1a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 619.889995][ T3822] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413161 [ 619.897968][ T3822] RDX: 00007f34331e1b0a RSI: 0000000000000002 RDI: 00007f34331e1b00 [ 619.905936][ T3822] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 619.914084][ T3822] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 619.922061][ T3822] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:07:36 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xd000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 619.994599][ T3828] hfsplus: unable to find HFS+ superblock 23:07:37 executing program 1 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 620.084668][ T3837] hfsplus: unable to find HFS+ superblock [ 620.128803][ T3842] FAULT_INJECTION: forcing a failure. [ 620.128803][ T3842] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 620.142135][ T3842] CPU: 0 PID: 3842 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 620.151072][ T3842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 620.161226][ T3842] Call Trace: [ 620.168981][ T3842] dump_stack+0x172/0x1f0 [ 620.179650][ T3842] should_fail.cold+0xa/0x15 [ 620.184237][ T3842] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 620.190048][ T3842] ? mark_held_locks+0xf0/0xf0 [ 620.194895][ T3842] should_fail_alloc_page+0x50/0x60 [ 620.200081][ T3842] __alloc_pages_nodemask+0x1a1/0x8d0 [ 620.208093][ T3842] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 620.213722][ T3842] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 620.219421][ T3842] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 620.225035][ T3842] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 620.231272][ T3842] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 620.237064][ T3842] cache_grow_begin+0x9d/0x650 [ 620.241808][ T3842] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 620.248060][ T3842] kmem_cache_alloc+0x628/0x6f0 [ 620.252901][ T3842] ? lock_downgrade+0x880/0x880 [ 620.257749][ T3842] getname_flags+0xd6/0x5b0 [ 620.262260][ T3842] getname+0x1a/0x20 [ 620.266284][ T3842] do_sys_open+0x2c9/0x5d0 [ 620.270692][ T3842] ? filp_open+0x80/0x80 [ 620.274920][ T3842] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 620.280454][ T3842] ? do_syscall_64+0x26/0x680 [ 620.285345][ T3842] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 620.291397][ T3842] ? do_syscall_64+0x26/0x680 [ 620.296059][ T3842] __x64_sys_open+0x7e/0xc0 [ 620.300542][ T3842] do_syscall_64+0xfd/0x680 [ 620.305043][ T3842] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 620.310949][ T3842] RIP: 0033:0x413161 [ 620.315105][ T3842] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 620.334896][ T3842] RSP: 002b:00007f34331e1a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 620.343290][ T3842] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413161 [ 620.351264][ T3842] RDX: 00007f34331e1b0a RSI: 0000000000000002 RDI: 00007f34331e1b00 [ 620.359224][ T3842] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 620.369022][ T3842] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 23:07:37 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus ', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:37 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2c00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:37 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2800000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:37 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000040)=0x1a, 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x4e22, @loopback}, 0x10) 23:07:37 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x28000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 620.377075][ T3842] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:07:37 executing program 3: r0 = socket$inet(0x2b, 0x5, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e21, @multicast1}, 0xfe23) 23:07:37 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x29000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:37 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2f00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:37 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2900000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:37 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2b000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:37 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x3580]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:37 executing program 1 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:07:37 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:37 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000001ec0)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000080)=""/48, 0x30}, {&(0x7f00000000c0)=""/95, 0x5f}, {&(0x7f0000000140)=""/247, 0xf7}, {&(0x7f0000000240)=""/34, 0x22}, {&(0x7f0000000340)=""/247, 0xf7}, {&(0x7f0000000280)=""/108, 0x6c}, {&(0x7f0000000440)=""/160, 0xa0}, {&(0x7f0000000500)=""/158, 0x9e}, {&(0x7f00000005c0)=""/19, 0x13}], 0x9, &(0x7f0000000740)=""/190, 0xbe}}, {{&(0x7f0000000800)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000001900)=[{&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/71, 0x47}, {&(0x7f00000006c0)=""/13, 0xd}], 0x3}, 0x7fffffff}, {{&(0x7f0000001940)=@ipx, 0x80, &(0x7f0000001d40)=[{&(0x7f00000019c0)=""/195, 0xc3}, {&(0x7f0000001ac0)=""/121, 0x79}, {&(0x7f0000001b40)=""/202, 0xca}, {&(0x7f0000001c40)=""/171, 0xab}, {&(0x7f0000001d00)=""/13, 0xd}], 0x5, &(0x7f0000001dc0)=""/201, 0xc9}, 0x7fffffff}], 0x3, 0x2000, &(0x7f0000001f80)={0x0, 0x1c9c380}) sendto$rose(r0, &(0x7f0000001fc0)="ec60cee14dfc1a5dd6f613b53e52ea1370ed217147d5d878faa4711290829b779cced0ab5a45166bc2da3259ed8f6edc21e7ecaa3161c0e1d2b2e3143d7788e367281a631c1179f3e203bff972cd1c28665e5a251e367ff5729a5482a57d63f66607c2cd0d2529fe53f1f973c891ca", 0x6f, 0x20000080, &(0x7f0000002040)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x1, @null}, 0x1c) r1 = socket$inet(0x2b, 0x8000f, 0x4) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000040)=0x0) r3 = getpid() tgkill(r2, r3, 0x2a) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000002080), 0x4) ioctl(0xffffffffffffffff, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) pipe2(&(0x7f00000020c0)={0xffffffffffffffff}, 0x80000) sendto$unix(r0, &(0x7f00000021c0)="0e21ec6d067a76d05f39da759cecdcfd1b9e3d00fb9f9bc517377bf8c27498dea39f344164d10e9097487a9a1711e891c22e525ad54ba60eb394e98f8ee57f187ee3c19bc51f3959854247f369bba1d0293ef84f3dce64cc4afe607640ca6e3e4d80d8147f658a1b577423a44dab0e3e366a72a2fbb939ccf32ae122dd43fbd57c9f327c8d223efc6ab772da328fcc0102de86e0c776df7a058a286f894a0b8a35b251e38d4c98eedcc2c68b939958bf0e294068702064267fbfc0bfcfe6076aac", 0xc1, 0x40014, &(0x7f00000022c0)=@file={0x1, './file0\x00'}, 0x6e) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002180)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r4, &(0x7f0000002100)='rdma.current\x00', 0x0, 0x0) connect$inet(r1, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x25, &(0x7f0000002340)={@remote, @multicast2, @loopback}, &(0x7f0000002380)=0xc) ioctl$SG_GET_SG_TABLESIZE(r4, 0x227f, &(0x7f0000002140)) 23:07:37 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2b00000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:37 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2c000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 620.786893][ T3879] FAULT_INJECTION: forcing a failure. [ 620.786893][ T3879] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 620.800141][ T3879] CPU: 0 PID: 3879 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 620.809160][ T3879] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 620.819224][ T3879] Call Trace: [ 620.822524][ T3879] dump_stack+0x172/0x1f0 [ 620.826875][ T3879] should_fail.cold+0xa/0x15 [ 620.831475][ T3879] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 620.837288][ T3879] ? mark_held_locks+0xf0/0xf0 [ 620.842055][ T3879] should_fail_alloc_page+0x50/0x60 [ 620.847257][ T3879] __alloc_pages_nodemask+0x1a1/0x8d0 [ 620.852628][ T3879] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 620.858282][ T3879] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 620.864008][ T3879] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 620.869645][ T3879] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 620.875895][ T3879] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 620.881704][ T3879] cache_grow_begin+0x9d/0x650 [ 620.886472][ T3879] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 620.892711][ T3879] kmem_cache_alloc+0x628/0x6f0 [ 620.897559][ T3879] ? kasan_check_read+0x11/0x20 [ 620.902420][ T3879] getname_flags+0xd6/0x5b0 [ 620.906925][ T3879] getname+0x1a/0x20 [ 620.910816][ T3879] do_sys_open+0x2c9/0x5d0 [ 620.915236][ T3879] ? filp_open+0x80/0x80 [ 620.919492][ T3879] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 620.925036][ T3879] ? do_syscall_64+0x26/0x680 [ 620.929710][ T3879] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 620.935769][ T3879] ? do_syscall_64+0x26/0x680 [ 620.940445][ T3879] __x64_sys_open+0x7e/0xc0 [ 620.944961][ T3879] do_syscall_64+0xfd/0x680 [ 620.949482][ T3879] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 620.955371][ T3879] RIP: 0033:0x413161 [ 620.959266][ T3879] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 620.978875][ T3879] RSP: 002b:00007f34331e1a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 23:07:37 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2f000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:37 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x800, 0x0) accept$alg(r2, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:38 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2c00000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:38 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x3c00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 620.987299][ T3879] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413161 [ 620.995283][ T3879] RDX: 00007f34331e1b0a RSI: 0000000000000002 RDI: 00007f34331e1b00 [ 621.003261][ T3879] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 621.011239][ T3879] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 621.019219][ T3879] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:07:38 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x4000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:38 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x2f00000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:38 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x3c000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 621.148381][ T3890] hfsplus: unable to find HFS+ superblock [ 621.240809][ T3900] hfsplus: unable to find HFS+ superblock 23:07:38 executing program 1 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:07:38 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x101000, 0x0) ioctl$KVM_GET_NESTED_STATE(r2, 0xc080aebe, &(0x7f0000000740)={0x0, 0x0, 0x2080}) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:38 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x3c00000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:38 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x4305]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:38 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x40000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:38 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x10', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:38 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x3f00000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:38 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x43050000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:38 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x4788]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:38 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) [ 621.509488][ T3922] FAULT_INJECTION: forcing a failure. [ 621.509488][ T3922] name failslab, interval 1, probability 0, space 0, times 0 [ 621.554981][ T3922] CPU: 0 PID: 3922 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 621.563966][ T3922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 621.574032][ T3922] Call Trace: [ 621.577424][ T3922] dump_stack+0x172/0x1f0 [ 621.581764][ T3922] should_fail.cold+0xa/0x15 [ 621.586365][ T3922] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 621.592184][ T3922] ? ___might_sleep+0x163/0x280 [ 621.597047][ T3922] __should_failslab+0x121/0x190 [ 621.601996][ T3922] should_failslab+0x9/0x14 [ 621.606501][ T3922] kmem_cache_alloc+0x2af/0x6f0 [ 621.611355][ T3922] ? rcu_read_lock_sched_held+0x110/0x130 [ 621.617086][ T3922] ? kmem_cache_alloc+0x32b/0x6f0 [ 621.622112][ T3922] security_file_alloc+0x39/0x170 [ 621.627173][ T3922] __alloc_file+0xac/0x300 [ 621.631596][ T3922] alloc_empty_file+0x72/0x170 [ 621.636367][ T3922] path_openat+0xef/0x46d0 [ 621.640954][ T3922] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 621.646861][ T3922] ? __lock_acquire+0x54f/0x5490 [ 621.651802][ T3922] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 621.659274][ T3922] ? mark_held_locks+0xf0/0xf0 [ 621.664149][ T3922] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 621.669794][ T3922] ? cache_grow_end+0xa4/0x190 [ 621.674563][ T3922] ? __alloc_fd+0x44d/0x560 [ 621.679087][ T3922] do_filp_open+0x1a1/0x280 [ 621.683594][ T3922] ? may_open_dev+0x100/0x100 [ 621.688301][ T3922] ? lock_downgrade+0x880/0x880 [ 621.693182][ T3922] ? kasan_check_read+0x11/0x20 [ 621.698049][ T3922] ? do_raw_spin_unlock+0x57/0x270 23:07:38 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x6c000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 621.703178][ T3922] ? _raw_spin_unlock+0x2d/0x50 [ 621.708142][ T3922] ? __alloc_fd+0x44d/0x560 [ 621.712673][ T3922] do_sys_open+0x3fe/0x5d0 [ 621.717103][ T3922] ? filp_open+0x80/0x80 [ 621.721394][ T3922] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 621.726868][ T3922] ? do_syscall_64+0x26/0x680 [ 621.731556][ T3922] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 621.737639][ T3922] ? do_syscall_64+0x26/0x680 [ 621.742759][ T3922] __x64_sys_open+0x7e/0xc0 [ 621.747282][ T3922] do_syscall_64+0xfd/0x680 23:07:38 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x4888]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 621.751806][ T3922] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 621.757785][ T3922] RIP: 0033:0x413161 [ 621.761684][ T3922] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 621.781386][ T3922] RSP: 002b:00007f34331e1a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 621.789993][ T3922] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413161 [ 621.798002][ T3922] RDX: 00007f34331e1b0a RSI: 0000000000000002 RDI: 00007f34331e1b00 [ 621.805980][ T3922] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 621.814331][ T3922] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 621.822393][ T3922] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:07:38 executing program 1 (fault-call:0 fault-nth:14): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:07:38 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:38 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x4000000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:38 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x6488]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:38 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x18000100000890f, &(0x7f0000000480)="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") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:38 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x800e0000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 621.957418][ T3937] FAULT_INJECTION: forcing a failure. [ 621.957418][ T3937] name failslab, interval 1, probability 0, space 0, times 0 [ 622.005573][ T3937] CPU: 0 PID: 3937 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 622.014563][ T3937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 622.024717][ T3937] Call Trace: [ 622.028017][ T3937] dump_stack+0x172/0x1f0 [ 622.032377][ T3937] should_fail.cold+0xa/0x15 [ 622.036984][ T3937] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 622.042816][ T3937] ? ___might_sleep+0x163/0x280 [ 622.047681][ T3937] __should_failslab+0x121/0x190 23:07:39 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x4305000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 622.052803][ T3937] should_failslab+0x9/0x14 [ 622.057314][ T3937] kmem_cache_alloc+0x2af/0x6f0 [ 622.062184][ T3937] ? rcu_read_lock_sched_held+0x110/0x130 [ 622.067909][ T3937] ? kmem_cache_alloc+0x32b/0x6f0 [ 622.072953][ T3937] security_file_alloc+0x39/0x170 [ 622.077988][ T3937] __alloc_file+0xac/0x300 [ 622.082505][ T3937] alloc_empty_file+0x72/0x170 [ 622.087285][ T3937] path_openat+0xef/0x46d0 [ 622.091709][ T3937] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 622.097527][ T3937] ? __lock_acquire+0x54f/0x5490 23:07:39 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x6c00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 622.102476][ T3937] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 622.108561][ T3937] ? mark_held_locks+0xf0/0xf0 [ 622.113335][ T3937] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 622.118722][ T3937] ? cache_grow_end+0xa4/0x190 [ 622.123587][ T3937] ? __alloc_fd+0x44d/0x560 [ 622.128153][ T3937] do_filp_open+0x1a1/0x280 [ 622.132760][ T3937] ? may_open_dev+0x100/0x100 [ 622.137452][ T3937] ? lock_downgrade+0x880/0x880 [ 622.142332][ T3937] ? kasan_check_read+0x11/0x20 [ 622.147197][ T3937] ? do_raw_spin_unlock+0x57/0x270 [ 622.152317][ T3937] ? _raw_spin_unlock+0x2d/0x50 [ 622.155759][ T3940] hfsplus: unable to find HFS+ superblock [ 622.157209][ T3937] ? __alloc_fd+0x44d/0x560 [ 622.157235][ T3937] do_sys_open+0x3fe/0x5d0 [ 622.185495][ T3937] ? filp_open+0x80/0x80 [ 622.189762][ T3937] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 622.195229][ T3937] ? do_syscall_64+0x26/0x680 23:07:39 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x80350000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:39 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @remote}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:39 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x6c00000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 622.202446][ T3937] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 622.202461][ T3937] ? do_syscall_64+0x26/0x680 [ 622.202479][ T3937] __x64_sys_open+0x7e/0xc0 [ 622.202494][ T3937] do_syscall_64+0xfd/0x680 [ 622.202509][ T3937] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 622.202520][ T3937] RIP: 0033:0x413161 [ 622.202537][ T3937] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 23:07:39 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x81000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 622.202545][ T3937] RSP: 002b:00007f34331e1a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 622.202564][ T3937] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413161 [ 622.268100][ T3937] RDX: 00007f34331e1b0a RSI: 0000000000000002 RDI: 00007f34331e1b00 [ 622.276078][ T3937] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 622.276086][ T3937] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 622.276094][ T3937] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:07:39 executing program 1 (fault-call:0 fault-nth:15): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 622.342860][ T3959] hfsplus: unable to find HFS+ superblock 23:07:39 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplusH', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:39 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x800e]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:39 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x800e000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:39 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x80000, 0x0) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000080), 0x4) 23:07:39 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x86ddffff]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:39 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8035000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:39 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8035]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 622.490924][ T3970] FAULT_INJECTION: forcing a failure. [ 622.490924][ T3970] name failslab, interval 1, probability 0, space 0, times 0 [ 622.550832][ T3970] CPU: 0 PID: 3970 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 622.559814][ T3970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 622.569880][ T3970] Call Trace: [ 622.573196][ T3970] dump_stack+0x172/0x1f0 [ 622.577640][ T3970] should_fail.cold+0xa/0x15 [ 622.582245][ T3970] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 622.588065][ T3970] ? ___might_sleep+0x163/0x280 [ 622.592933][ T3970] __should_failslab+0x121/0x190 [ 622.597968][ T3970] should_failslab+0x9/0x14 [ 622.602558][ T3970] __kmalloc+0x2d9/0x740 [ 622.606803][ T3970] ? tomoyo_realpath_from_path+0xc0/0x7a0 [ 622.612534][ T3970] ? rcu_read_lock_sched_held+0x110/0x130 [ 622.618260][ T3970] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 622.623988][ T3970] tomoyo_realpath_from_path+0xcd/0x7a0 [ 622.629538][ T3970] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 622.635788][ T3970] tomoyo_check_open_permission+0x2a8/0x3f0 [ 622.641686][ T3970] ? tomoyo_path_number_perm+0x520/0x520 23:07:39 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000740)='/dev/ubi_ctrl\x00', 0x40041, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e21, @loopback}, 0x10) r3 = getuid() getresgid(&(0x7f0000000340), &(0x7f00000003c0), &(0x7f0000000400)=0x0) ioctl$sock_ax25_SIOCDELRT(r2, 0x890c, &(0x7f00000012c0)={@bcast, @null, 0x5, [@default, @null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000900)=0x0, &(0x7f0000000940), &(0x7f0000000980)) getresuid(&(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40)=0x0) lstat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getuid() stat(&(0x7f0000000b40)='./file0\x00', &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000c00)={{{@in=@broadcast, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000d00)=0xe8) getgroups(0x5, &(0x7f0000000d40)=[0xee00, 0xee01, 0x0, 0xffffffffffffffff, 0xffffffffffffffff]) fstat(r2, &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000e00), &(0x7f0000000e40), &(0x7f0000000e80)=0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000ec0)={0x3e0, 0x0, 0x5, [{{0x3, 0x3, 0x10001, 0x3ff, 0x40, 0x3, {0x0, 0xd59, 0x5, 0x0, 0x8, 0x7, 0x9, 0x5, 0x80, 0x6, 0x106, r3, r4, 0xc8, 0x40}}, {0x3, 0x7fff, 0x0, 0x800}}, {{0x3, 0x2, 0x2, 0x5, 0x401, 0xffffffff, {0x5, 0x9af5, 0x80000000, 0x8f9, 0x57, 0x3, 0x2e4, 0x5, 0x7, 0x4, 0x401, r5, r6, 0x8000, 0x6}}, {0x0, 0x80000000, 0x6, 0x7fff, 'erofs\x00'}}, {{0x3, 0x1, 0x0, 0x80000001, 0x4, 0x4, {0x5, 0x4, 0x0, 0x7, 0x200, 0x200, 0x2e, 0x0, 0x7ff, 0x1000, 0x4, r7, r8, 0x3, 0x1541}}, {0x5, 0x101, 0x0, 0x7}}, {{0x5, 0x1, 0x7, 0xf3d, 0x7ff, 0x4, {0x5, 0x0, 0x7, 0x3f, 0x4b, 0x7, 0x1, 0x52b3, 0x8000, 0x5, 0x100000001, r9, r10, 0xffffffffffffd1ae, 0x6}}, {0x4, 0x10001, 0x14, 0x100000001, 'trusted:-bdev*system'}}, {{0x3, 0x2, 0xffffffffffffd396, 0x0, 0x81, 0x4, {0x6, 0x80000001, 0x7fffffff, 0xa745, 0x3ff, 0x2, 0x9, 0x9, 0xf43, 0x400, 0x1d5, r11, r12, 0x8001, 0x2}}, {0x4, 0x10000, 0x6, 0xff, 'erofs\x00'}}, {{0x6, 0x3, 0x3, 0x4, 0x7, 0x0, {0x5, 0x0, 0x5, 0xfff, 0x1000, 0x80000001, 0x101, 0x4, 0x3, 0x40, 0x6, r13, r14, 0x6, 0x585}}, {0x2, 0x9, 0x18, 0x16, '*#-[vmnet0cpuset.system['}}]}, 0x3e0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000440)={0x0, 0x0}, &(0x7f0000000480)=0x39c) syz_mount_image$erofs(&(0x7f0000000080)='erofs\x00', &(0x7f00000000c0)='./file0\x00', 0x20, 0x3, &(0x7f0000000280)=[{&(0x7f0000000100)="d846f4268343d6e262dad4ad3a3ddb694d468e8b61ae190ea0f6b7c4b1955efed7da93ae5545b6f0fc69d4bae7ff130a4073896c42646adbf5ebd6a7b11ad1f7b4d6096459f22d73bbb81d86c8df8e6808e9ad01d349ff62318fbbba34edf828a228fb7b1f440b6107ddda7abe6a16569c96cb5984ef28f15dbd579a001d4f197dad1ef2d03bfd6e8d6b168dba6c26628bb9e61e4fe451b600000000", 0x9c, 0x5c1f}, {&(0x7f00000001c0)="a88283d849cfedd927140c6e75a38a98ee49212892bbe6505439c18ddc56a93162490f8ff8b4f6c2bbf1e3a8801d94727dc6ff474cf89119abe40a225d4eb91ca73300c8d86de2adeea575a3a62172192a35f474d15cf63459b0c970321b6f323b703aed32b0b9c38875310a5c08e60b1cd6ad5bf24d161c0dd8c963be010a8ccbd164090b0fc9180a", 0x89, 0x200}, {&(0x7f0000000780)="b573e016afe3759108738cbd4e214b3c246493ae21e9e0191a8ddfbe572bfeda60dd9d17faa9b71b398272febdae4d483384ccf3bd58f2dbe8f55ce1e7c8eb25df1f61e1a2892276bfe8b6e3c6ed35439848d8cdb5f26b64aba4a18ca5db9b4b8d94c30d1cff52332c5b11887ca7ec129621f7dd36b0758f1fbecebb72fd8f7576d79b9e7dfe20732a24bb8aa9e4bdf645a7c95570fd8017ff51650232040703d4ae37fdda379035fce240aa46fd8f692134cac0130915c7bed486399e6cf00bd430e4a1b354430abf4d9f0c", 0xcc, 0x800}], 0x80080, &(0x7f0000000500)=ANY=[@ANYBLOB="61636c2c646566636f6e746578743d757365725f752c0100000065723ce70b7ae43a310b951d22e201f80ce0b558ece9e82e1319316dd93217d4c5b95cd819c6eb3e4a28bec1260d411123943a8dd9ae0d17dbf264f7fea9e09f61574810fb624124c3ab8109883ae6cc3775961d31dbcf1ccbb55c712189ca292a6ddefa3b332f9aad733dc4a35ca48536a35978950a358d78014f7c2aa2c731c29563fa367d7b3512f9f0e563884760f7b7ed1cd380d7de7879f8bc8b8a81c052560368ac1f360487ac0bfe9e6618cf122025d44301423ba21367f1fd5c5e6efa91654d73bbd732c50ea8e7687ed62da9c346ee73e41d00d27bdb68507835f12aa520ebfbb8dbb3febde2d5a42a65d76529f6ea8ce5ed499bec8c176b09c1234428a04244b1468e925e39574a7d03af1100", @ANYRESDEC=r15, @ANYBLOB="2c61756469742c646f6e745f6d6561737572652c00cc1206f99bf80db034f231694af72fb1103b35a05b2ef7003cc16167e2aaed221974056d51eedbb60350546c43a0dec162d3a4bbe6ccae2aed79951588784bb86f53fe41225fad8475be131661b0a393e4956a16184a25e2be01b4349420a983c6aebadeec10df8bcbcd58e42848bf"]) ioctl$TIOCGSOFTCAR(r2, 0x5419, &(0x7f0000000380)) [ 622.647357][ T3970] ? lock_downgrade+0x880/0x880 [ 622.652393][ T3970] tomoyo_file_open+0xa9/0xd0 [ 622.657081][ T3970] security_file_open+0x71/0x300 [ 622.662130][ T3970] do_dentry_open+0x373/0x1250 [ 622.666900][ T3970] ? kasan_check_read+0x11/0x20 [ 622.671855][ T3970] ? chown_common+0x5c0/0x5c0 [ 622.676547][ T3970] ? inode_permission+0xb4/0x560 [ 622.681500][ T3970] vfs_open+0xa0/0xd0 [ 622.685494][ T3970] path_openat+0x10e9/0x46d0 [ 622.690092][ T3970] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 622.695932][ T3970] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 622.701316][ T3970] ? __alloc_fd+0x44d/0x560 [ 622.705825][ T3970] do_filp_open+0x1a1/0x280 [ 622.710330][ T3970] ? may_open_dev+0x100/0x100 [ 622.715017][ T3970] ? kasan_check_read+0x11/0x20 [ 622.719880][ T3970] ? do_raw_spin_unlock+0x57/0x270 [ 622.724992][ T3970] ? _raw_spin_unlock+0x2d/0x50 [ 622.729842][ T3970] ? __alloc_fd+0x44d/0x560 [ 622.734370][ T3970] do_sys_open+0x3fe/0x5d0 [ 622.738796][ T3970] ? filp_open+0x80/0x80 [ 622.743072][ T3970] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 622.748533][ T3970] ? do_syscall_64+0x26/0x680 [ 622.753220][ T3970] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 622.759293][ T3970] ? do_syscall_64+0x26/0x680 [ 622.763978][ T3970] __x64_sys_open+0x7e/0xc0 [ 622.768485][ T3970] do_syscall_64+0xfd/0x680 [ 622.773007][ T3970] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 622.778900][ T3970] RIP: 0033:0x413161 [ 622.782795][ T3970] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 622.802408][ T3970] RSP: 002b:00007f34331e1a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 622.810830][ T3970] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413161 [ 622.818813][ T3970] RDX: 00007f34331e1b0a RSI: 0000000000000002 RDI: 00007f34331e1b00 [ 622.826870][ T3970] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 622.834838][ T3970] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 622.842807][ T3970] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:07:39 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8100000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:39 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x88470000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 622.876138][ T3970] ERROR: Out of memory at tomoyo_realpath_from_path. 23:07:39 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8100]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:40 executing program 1 (fault-call:0 fault-nth:16): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:07:40 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x86ddffff00000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:40 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x88480000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:40 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:40 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8847]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:40 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x88640000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 623.196486][ T4010] FAULT_INJECTION: forcing a failure. [ 623.196486][ T4010] name failslab, interval 1, probability 0, space 0, times 0 [ 623.209938][ T4004] hfsplus: unable to find HFS+ superblock [ 623.211357][ T4010] CPU: 0 PID: 4010 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 623.224633][ T4010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 623.224646][ T4010] Call Trace: [ 623.238085][ T4010] dump_stack+0x172/0x1f0 [ 623.242435][ T4010] should_fail.cold+0xa/0x15 [ 623.247141][ T4010] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 623.252970][ T4010] ? ___might_sleep+0x163/0x280 [ 623.257917][ T4010] __should_failslab+0x121/0x190 [ 623.257933][ T4010] should_failslab+0x9/0x14 [ 623.267448][ T4010] __kmalloc+0x2d9/0x740 [ 623.267466][ T4010] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 623.267479][ T4010] ? d_absolute_path+0x11b/0x170 [ 623.267492][ T4010] ? __d_path+0x140/0x140 [ 623.267507][ T4010] ? tomoyo_encode2.part.0+0xf5/0x400 [ 623.267522][ T4010] tomoyo_encode2.part.0+0xf5/0x400 [ 623.267540][ T4010] tomoyo_encode+0x2b/0x50 [ 623.267554][ T4010] tomoyo_realpath_from_path+0x1d3/0x7a0 [ 623.267568][ T4010] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 623.267591][ T4010] tomoyo_check_open_permission+0x2a8/0x3f0 [ 623.267608][ T4010] ? tomoyo_path_number_perm+0x520/0x520 [ 623.267649][ T4010] ? lock_downgrade+0x880/0x880 [ 623.278087][ T4010] tomoyo_file_open+0xa9/0xd0 [ 623.278103][ T4010] security_file_open+0x71/0x300 [ 623.278123][ T4010] do_dentry_open+0x373/0x1250 [ 623.287370][ T4010] ? kasan_check_read+0x11/0x20 [ 623.287393][ T4010] ? chown_common+0x5c0/0x5c0 [ 623.287409][ T4010] ? inode_permission+0xb4/0x560 [ 623.287426][ T4010] vfs_open+0xa0/0xd0 [ 623.287440][ T4010] path_openat+0x10e9/0x46d0 [ 623.287454][ T4010] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 623.287486][ T4010] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 623.287509][ T4010] ? __alloc_fd+0x44d/0x560 [ 623.287525][ T4010] do_filp_open+0x1a1/0x280 [ 623.287544][ T4010] ? may_open_dev+0x100/0x100 [ 623.302684][ T4010] ? kasan_check_read+0x11/0x20 [ 623.302700][ T4010] ? do_raw_spin_unlock+0x57/0x270 [ 623.302719][ T4010] ? _raw_spin_unlock+0x2d/0x50 [ 623.408495][ T4010] ? __alloc_fd+0x44d/0x560 [ 623.413013][ T4010] do_sys_open+0x3fe/0x5d0 [ 623.417442][ T4010] ? filp_open+0x80/0x80 [ 623.421775][ T4010] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 623.427234][ T4010] ? do_syscall_64+0x26/0x680 [ 623.431912][ T4010] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 623.437979][ T4010] ? do_syscall_64+0x26/0x680 [ 623.442665][ T4010] __x64_sys_open+0x7e/0xc0 [ 623.447179][ T4010] do_syscall_64+0xfd/0x680 [ 623.451696][ T4010] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 623.457585][ T4010] RIP: 0033:0x413161 [ 623.461483][ T4010] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 623.481095][ T4010] RSP: 002b:00007f34331e1a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 623.489517][ T4010] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413161 23:07:40 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8847000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:40 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8848]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:40 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x400, &(0x7f0000000080)="0adc3f123c123f319bd0705cdfea1f4e3ed6a4f8ee0e82c8573f057d4300a1080c98206d428a7ce4682783334717dd6b04183dd09b3d18a1d0169339c4ea4f5c13b71ad793ad0485134ff0f2ce26f9daffabef8dafad3ba76212e6121d77e7c700046cb27973e0826afbc7bfd96316b38e1ba16bee5a45f04208cf70987079dbde77") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) 23:07:40 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x88a8ffff]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 623.497490][ T4010] RDX: 00007f34331e1b0a RSI: 0000000000000002 RDI: 00007f34331e1b00 [ 623.505550][ T4010] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 623.513611][ T4010] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 623.521671][ T4010] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:07:40 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8848000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:40 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8864]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 623.590207][ T4004] hfsplus: unable to find HFS+ superblock [ 623.619753][ T4010] ERROR: Out of memory at tomoyo_realpath_from_path. 23:07:40 executing program 1 (fault-call:0 fault-nth:17): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:07:40 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x880, 0x0) write$P9_RFSYNC(r2, &(0x7f0000000080)={0x7, 0x33, 0x2}, 0x7) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) 23:07:40 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:40 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8864000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:40 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x88caffff]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:40 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8906]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 623.827139][ T4034] FAULT_INJECTION: forcing a failure. [ 623.827139][ T4034] name failslab, interval 1, probability 0, space 0, times 0 [ 623.845662][ T4031] hfsplus: unable to find HFS+ superblock 23:07:40 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x89060000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 623.875617][ T4034] CPU: 0 PID: 4034 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 623.884599][ T4034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 623.894753][ T4034] Call Trace: [ 623.898060][ T4034] dump_stack+0x172/0x1f0 [ 623.902408][ T4034] should_fail.cold+0xa/0x15 [ 623.907022][ T4034] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 623.912866][ T4034] ? ___might_sleep+0x163/0x280 [ 623.917753][ T4034] __should_failslab+0x121/0x190 [ 623.922700][ T4034] should_failslab+0x9/0x14 [ 623.927217][ T4034] __kmalloc+0x2d9/0x740 [ 623.931475][ T4034] ? tomoyo_realpath_from_path+0xc0/0x7a0 [ 623.937204][ T4034] ? rcu_read_lock_sched_held+0x110/0x130 [ 623.942926][ T4034] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 623.948658][ T4034] tomoyo_realpath_from_path+0xcd/0x7a0 [ 623.954307][ T4034] ? tomoyo_path_number_perm+0x193/0x520 [ 623.960124][ T4034] tomoyo_path_number_perm+0x1dd/0x520 [ 623.965756][ T4034] ? tomoyo_path_number_perm+0x193/0x520 [ 623.971656][ T4034] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 623.977549][ T4034] ? debug_check_no_obj_freed+0x211/0x444 [ 623.983280][ T4034] ? __fget+0x35a/0x550 [ 623.987454][ T4034] ? __fget+0x381/0x550 [ 623.991617][ T4034] ? ksys_dup3+0x3e0/0x3e0 [ 623.996311][ T4034] ? do_sys_open+0x31d/0x5d0 [ 624.001033][ T4034] tomoyo_file_ioctl+0x23/0x30 [ 624.006264][ T4034] security_file_ioctl+0x77/0xc0 [ 624.011378][ T4034] ksys_ioctl+0x57/0xd0 [ 624.015548][ T4034] __x64_sys_ioctl+0x73/0xb0 [ 624.020241][ T4034] do_syscall_64+0xfd/0x680 [ 624.024754][ T4034] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 624.031093][ T4034] RIP: 0033:0x4590e7 [ 624.034989][ T4034] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 624.054685][ T4034] RSP: 002b:00007f34331e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 624.063105][ T4034] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004590e7 23:07:41 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_int(r1, 0x1, 0x3b, &(0x7f0000000040)=0x4e8, 0x4) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:41 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x88a8ffff00000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 624.071086][ T4034] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 624.079062][ T4034] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 624.087185][ T4034] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 624.095337][ T4034] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:07:41 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xf000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:41 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:41 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x89ffffff]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 624.140691][ T4040] hfsplus: unable to find HFS+ superblock [ 624.189366][ T4034] ERROR: Out of memory at tomoyo_realpath_from_path. 23:07:41 executing program 1 (fault-call:0 fault-nth:18): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:07:41 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplusD', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:41 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xff00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:41 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001200)={0x0, 0x0, 0x2}, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000001e80)="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", 0xbe3) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000001880)={0x0, 0x9, 0x5, [0x9, 0x0, 0x3f, 0x0, 0x8]}, &(0x7f00000018c0)=0x12) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) ioctl(r1, 0x0, &(0x7f00000000c0)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:41 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xff000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:41 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x88caffff00000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:41 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xf0ffff]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 624.451345][ T4071] FAULT_INJECTION: forcing a failure. [ 624.451345][ T4071] name failslab, interval 1, probability 0, space 0, times 0 23:07:41 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xffffa888]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:41 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x8906000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 624.492502][ T4071] CPU: 0 PID: 4071 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 624.501489][ T4071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 624.511809][ T4071] Call Trace: [ 624.515132][ T4071] dump_stack+0x172/0x1f0 [ 624.519486][ T4071] should_fail.cold+0xa/0x15 [ 624.524106][ T4071] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 624.529929][ T4071] ? ___might_sleep+0x163/0x280 [ 624.534882][ T4071] __should_failslab+0x121/0x190 [ 624.539949][ T4071] should_failslab+0x9/0x14 [ 624.544631][ T4071] __kmalloc+0x2d9/0x740 [ 624.548876][ T4071] ? tomoyo_realpath_from_path+0xc0/0x7a0 [ 624.554612][ T4071] ? rcu_read_lock_sched_held+0x110/0x130 [ 624.560801][ T4071] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 624.569146][ T4071] tomoyo_realpath_from_path+0xcd/0x7a0 [ 624.579389][ T4071] ? tomoyo_path_number_perm+0x193/0x520 [ 624.585898][ T4071] tomoyo_path_number_perm+0x1dd/0x520 [ 624.591544][ T4071] ? tomoyo_path_number_perm+0x193/0x520 [ 624.597279][ T4071] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 624.603199][ T4071] ? debug_check_no_obj_freed+0x211/0x444 [ 624.609020][ T4071] ? __fget+0x35a/0x550 [ 624.613291][ T4071] ? __fget+0x381/0x550 [ 624.617803][ T4071] ? ksys_dup3+0x3e0/0x3e0 [ 624.622250][ T4071] ? do_sys_open+0x31d/0x5d0 [ 624.626845][ T4071] tomoyo_file_ioctl+0x23/0x30 [ 624.631616][ T4071] security_file_ioctl+0x77/0xc0 [ 624.636570][ T4071] ksys_ioctl+0x57/0xd0 [ 624.640734][ T4071] __x64_sys_ioctl+0x73/0xb0 [ 624.645331][ T4071] do_syscall_64+0xfd/0x680 [ 624.649843][ T4071] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 624.655804][ T4071] RIP: 0033:0x4590e7 [ 624.659706][ T4071] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 624.679486][ T4071] RSP: 002b:00007f34331e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 624.687902][ T4071] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004590e7 [ 624.695882][ T4071] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 624.704294][ T4071] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 624.712967][ T4071] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 624.721129][ T4071] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 [ 624.758197][ T4064] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:07:41 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x1000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:41 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x89ffffff00000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:41 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplusB', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 624.899925][ T4071] ERROR: Out of memory at tomoyo_realpath_from_path. 23:07:41 executing program 1 (fault-call:0 fault-nth:19): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:07:42 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xffffca88]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:42 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 625.003890][ T4072] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:07:42 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x5) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:42 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xff00000000000000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:42 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xffffdd86]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 625.132175][ T4100] FAULT_INJECTION: forcing a failure. [ 625.132175][ T4100] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 625.145420][ T4100] CPU: 0 PID: 4100 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 625.154460][ T4100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 625.164607][ T4100] Call Trace: [ 625.167917][ T4100] dump_stack+0x172/0x1f0 [ 625.172266][ T4100] should_fail.cold+0xa/0x15 [ 625.172287][ T4100] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 625.172305][ T4100] ? lock_downgrade+0x880/0x880 [ 625.187717][ T4100] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 625.194140][ T4100] should_fail_alloc_page+0x50/0x60 [ 625.194157][ T4100] __alloc_pages_nodemask+0x1a1/0x8d0 [ 625.194179][ T4100] ? __lock_acquire+0x54f/0x5490 [ 625.210027][ T4100] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 625.215765][ T4100] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 625.215787][ T4100] cache_grow_begin+0x9d/0x650 [ 625.215803][ T4100] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 23:07:42 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x4000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 625.215818][ T4100] __kmalloc+0x67a/0x740 [ 625.215838][ T4100] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 625.215860][ T4100] tomoyo_realpath_from_path+0xcd/0x7a0 [ 625.236981][ T4100] ? tomoyo_path_number_perm+0x193/0x520 [ 625.237006][ T4100] tomoyo_path_number_perm+0x1dd/0x520 [ 625.237016][ T4100] ? tomoyo_path_number_perm+0x193/0x520 [ 625.237035][ T4100] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 625.270764][ T4100] ? debug_check_no_obj_freed+0x211/0x444 [ 625.276580][ T4100] ? __fget+0x35a/0x550 23:07:42 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) flistxattr(r1, &(0x7f0000000040)=""/6, 0x6) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) [ 625.276611][ T4100] ? __fget+0x381/0x550 [ 625.276632][ T4100] ? ksys_dup3+0x3e0/0x3e0 [ 625.276646][ T4100] ? do_sys_open+0x31d/0x5d0 [ 625.276665][ T4100] tomoyo_file_ioctl+0x23/0x30 [ 625.276683][ T4100] security_file_ioctl+0x77/0xc0 [ 625.289384][ T4100] ksys_ioctl+0x57/0xd0 [ 625.289405][ T4100] __x64_sys_ioctl+0x73/0xb0 [ 625.312475][ T4100] do_syscall_64+0xfd/0x680 [ 625.317001][ T4100] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 625.322902][ T4100] RIP: 0033:0x4590e7 [ 625.326994][ T4100] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 625.346867][ T4100] RSP: 002b:00007f34331e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 625.346882][ T4100] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004590e7 [ 625.346889][ T4100] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 625.346895][ T4100] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 23:07:42 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xfffff000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:42 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0xfffffffffffff000, @mcast1, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:42 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x6000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 625.346902][ T4100] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 625.346910][ T4100] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:07:42 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:42 executing program 1 (fault-call:0 fault-nth:20): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:07:42 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") getsockopt$inet_buf(r0, 0x0, 0x9, &(0x7f0000000100)=""/213, &(0x7f0000000200)=0xd5) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20\x00', 0x101000, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000040)='./file0\x00', r2}, 0x10) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$TIPC_NODE_RECVQ_DEPTH(r3, 0x10f, 0x83, &(0x7f0000000080), &(0x7f00000000c0)=0x4) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:42 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x2}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:42 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:42 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xffffff89]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:42 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8060000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:42 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xf0ffffffffffff]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:42 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000040)="0a123f219bd0705e8cdda30e24804355f5f092942e2f678d8986d09518c4e5b347") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:42 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x8}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 625.734780][ T4132] hfsplus: unable to find HFS+ superblock [ 625.744144][ T4134] FAULT_INJECTION: forcing a failure. [ 625.744144][ T4134] name failslab, interval 1, probability 0, space 0, times 0 [ 625.770035][ T4134] CPU: 0 PID: 4134 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 625.779218][ T4134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 625.789988][ T4134] Call Trace: [ 625.793293][ T4134] dump_stack+0x172/0x1f0 [ 625.797640][ T4134] should_fail.cold+0xa/0x15 [ 625.802236][ T4134] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 625.808043][ T4134] ? ___might_sleep+0x163/0x280 [ 625.808063][ T4134] __should_failslab+0x121/0x190 [ 625.808078][ T4134] ? loop_info64_to_compat+0x6d0/0x6d0 [ 625.808090][ T4134] should_failslab+0x9/0x14 [ 625.808108][ T4134] kmem_cache_alloc_trace+0x2ce/0x750 23:07:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) [ 625.823328][ T4134] ? lockdep_init_map+0x1be/0x6d0 [ 625.823352][ T4134] ? loop_info64_to_compat+0x6d0/0x6d0 [ 625.843670][ T4134] __kthread_create_on_node+0xf2/0x460 [ 625.849142][ T4134] ? lo_ioctl+0x1c4/0x2320 [ 625.853655][ T4134] ? kthread_parkme+0xb0/0xb0 [ 625.858332][ T4134] ? lo_ioctl+0x1c4/0x2320 [ 625.862735][ T4134] ? kasan_check_read+0x11/0x20 [ 625.867568][ T4134] ? loop_info64_to_compat+0x6d0/0x6d0 [ 625.873014][ T4134] kthread_create_on_node+0xbb/0xf0 [ 625.878286][ T4134] ? __kthread_create_on_node+0x460/0x460 [ 625.884111][ T4134] ? lockdep_init_map+0x1be/0x6d0 [ 625.889133][ T4134] ? lockdep_init_map+0x1be/0x6d0 [ 625.894148][ T4134] lo_ioctl+0xaf2/0x2320 [ 625.898384][ T4134] ? lo_rw_aio+0x1120/0x1120 [ 625.903076][ T4134] blkdev_ioctl+0xece/0x1c10 [ 625.907756][ T4134] ? blkpg_ioctl+0xa90/0xa90 [ 625.912422][ T4134] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 625.918229][ T4134] ? __fget+0x35a/0x550 [ 625.922549][ T4134] block_ioctl+0xee/0x130 [ 625.926945][ T4134] ? blkdev_fallocate+0x410/0x410 [ 625.932046][ T4134] do_vfs_ioctl+0xdb6/0x13e0 [ 625.936796][ T4134] ? ioctl_preallocate+0x210/0x210 [ 625.941890][ T4134] ? __fget+0x381/0x550 [ 625.946035][ T4134] ? ksys_dup3+0x3e0/0x3e0 [ 625.950440][ T4134] ? do_sys_open+0x31d/0x5d0 [ 625.955035][ T4134] ? tomoyo_file_ioctl+0x23/0x30 [ 625.959992][ T4134] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 625.966211][ T4134] ? security_file_ioctl+0x8d/0xc0 [ 625.971306][ T4134] ksys_ioctl+0xab/0xd0 [ 625.975458][ T4134] __x64_sys_ioctl+0x73/0xb0 [ 625.980052][ T4134] do_syscall_64+0xfd/0x680 [ 625.984540][ T4134] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 625.990424][ T4134] RIP: 0033:0x4590e7 [ 625.994300][ T4134] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 626.013893][ T4134] RSP: 002b:00007f34331e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 626.022393][ T4134] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004590e7 23:07:43 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xd000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 626.031422][ T4134] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 626.039377][ T4134] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 626.047330][ T4134] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 626.055284][ T4134] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 [ 626.219438][ T4140] hfsplus: unable to find HFS+ superblock 23:07:43 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus+', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:43 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) setsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000080)={0x0, 0x9}, 0x2) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:43 executing program 1 (fault-call:0 fault-nth:21): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:07:43 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0xf}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:43 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x100000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:43 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x28000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 626.386597][ T4158] FAULT_INJECTION: forcing a failure. [ 626.386597][ T4158] name failslab, interval 1, probability 0, space 0, times 0 [ 626.414573][ T4158] CPU: 0 PID: 4158 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 626.423559][ T4158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 23:07:43 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000040)=0x7503, 0x4) [ 626.433980][ T4158] Call Trace: [ 626.437293][ T4158] dump_stack+0x172/0x1f0 [ 626.441645][ T4158] should_fail.cold+0xa/0x15 [ 626.446258][ T4158] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 626.452266][ T4158] ? ___might_sleep+0x163/0x280 [ 626.457149][ T4158] __should_failslab+0x121/0x190 [ 626.462190][ T4158] should_failslab+0x9/0x14 [ 626.466704][ T4158] kmem_cache_alloc+0x2af/0x6f0 [ 626.471654][ T4158] ? find_held_lock+0x35/0x130 [ 626.476429][ T4158] ? __schedule+0x106e/0x1560 [ 626.481124][ T4158] __kernfs_new_node+0xf0/0x6c0 [ 626.485991][ T4158] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 626.491458][ T4158] ? __lock_acquire+0x54f/0x5490 [ 626.496394][ T4158] ? _raw_spin_unlock_irq+0x5e/0x90 [ 626.501679][ T4158] ? __schedule+0x106e/0x1560 [ 626.506467][ T4158] kernfs_new_node+0x96/0x120 [ 626.511429][ T4158] kernfs_create_dir_ns+0x52/0x160 [ 626.517763][ T4158] internal_create_group+0x7f4/0xc40 [ 626.523068][ T4158] ? remove_files.isra.0+0x190/0x190 [ 626.528869][ T4158] ? bd_set_size+0x3f/0xb0 [ 626.533299][ T4158] ? kasan_check_write+0x14/0x20 [ 626.538416][ T4158] ? up_write+0xbe/0x1e0 [ 626.542665][ T4158] sysfs_create_group+0x20/0x30 [ 626.547601][ T4158] lo_ioctl+0x1128/0x2320 [ 626.551936][ T4158] ? lo_rw_aio+0x1120/0x1120 [ 626.556533][ T4158] blkdev_ioctl+0xece/0x1c10 [ 626.561123][ T4158] ? blkpg_ioctl+0xa90/0xa90 [ 626.565714][ T4158] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 626.571533][ T4158] ? __fget+0x35a/0x550 [ 626.575694][ T4158] block_ioctl+0xee/0x130 [ 626.580022][ T4158] ? blkdev_fallocate+0x410/0x410 [ 626.585052][ T4158] do_vfs_ioctl+0xdb6/0x13e0 [ 626.589650][ T4158] ? ioctl_preallocate+0x210/0x210 [ 626.594757][ T4158] ? __fget+0x381/0x550 [ 626.598938][ T4158] ? ksys_dup3+0x3e0/0x3e0 [ 626.603372][ T4158] ? tomoyo_file_ioctl+0x23/0x30 [ 626.608483][ T4158] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 626.614725][ T4158] ? security_file_ioctl+0x8d/0xc0 [ 626.619930][ T4158] ksys_ioctl+0xab/0xd0 [ 626.624100][ T4158] __x64_sys_ioctl+0x73/0xb0 [ 626.628693][ T4158] do_syscall_64+0xfd/0x680 [ 626.633223][ T4158] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 626.639118][ T4158] RIP: 0033:0x4590e7 [ 626.643016][ T4158] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 626.662623][ T4158] RSP: 002b:00007f34331e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 626.671475][ T4158] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004590e7 [ 626.679823][ T4158] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 23:07:43 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x12}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:43 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x29000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:43 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x200000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 626.687790][ T4158] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 626.695930][ T4158] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 626.704079][ T4158] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:07:43 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2b000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:43 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0xf000}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:43 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplusX', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:43 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x400000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:43 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r2 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x80000001, 0x8100) r3 = getpgrp(0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000140)=r3) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) ioctl$EVIOCSKEYCODE(r2, 0x40084504, &(0x7f0000000100)=[0x5fc7d8c2, 0x7f]) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000080)={{0xaf, @local, 0x4e22, 0x1, 'lblcr\x00', 0x2, 0x4cf76fad, 0x5f}, {@local, 0x4e23, 0x2, 0x8, 0xffffffff, 0x101}}, 0x44) 23:07:43 executing program 1 (fault-call:0 fault-nth:22): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:07:43 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0xffffff1f}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:43 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2c000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 627.038697][ T4187] IPVS: set_ctl: invalid protocol: 175 172.20.20.170:20002 [ 627.062289][ T4190] FAULT_INJECTION: forcing a failure. [ 627.062289][ T4190] name failslab, interval 1, probability 0, space 0, times 0 [ 627.075350][ T4190] CPU: 0 PID: 4190 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 23:07:44 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x600000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 627.084296][ T4190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 627.094444][ T4190] Call Trace: [ 627.097745][ T4190] dump_stack+0x172/0x1f0 [ 627.098841][ T4196] IPVS: set_ctl: invalid protocol: 175 172.20.20.170:20002 [ 627.102090][ T4190] should_fail.cold+0xa/0x15 [ 627.113996][ T4190] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 627.119808][ T4190] ? stack_trace_save+0xac/0xe0 [ 627.124663][ T4190] ? stack_trace_consume_entry+0x190/0x190 [ 627.130562][ T4190] __should_failslab+0x121/0x190 23:07:44 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:44 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2f000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 627.135513][ T4190] should_failslab+0x9/0x14 [ 627.140130][ T4190] kmem_cache_alloc+0x47/0x6f0 [ 627.145072][ T4190] ? save_stack+0x5c/0x90 [ 627.150341][ T4190] ? save_stack+0x23/0x90 [ 627.154771][ T4190] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 627.161505][ T4190] ? kasan_slab_alloc+0xf/0x20 [ 627.173946][ T4190] ? kmem_cache_alloc+0x11a/0x6f0 [ 627.180975][ T4190] radix_tree_node_alloc.constprop.0+0x1eb/0x340 23:07:44 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x6, 0x0) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0xffffffffffffff70) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x4080, 0x0) write$FUSE_POLL(r2, &(0x7f0000000180)={0x18, 0x0, 0x4, {0x8000}}, 0x18) accept(r1, &(0x7f0000000080)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f0000000100)=0x80) [ 627.188713][ T4190] idr_get_free+0x474/0x890 [ 627.193421][ T4190] idr_alloc_u32+0x19e/0x330 [ 627.198915][ T4190] ? __fprop_inc_percpu_max+0x230/0x230 [ 627.205031][ T4190] idr_alloc_cyclic+0x132/0x270 [ 627.210260][ T4190] ? idr_alloc+0x150/0x150 [ 627.214945][ T4190] __kernfs_new_node+0x172/0x6c0 [ 627.220167][ T4190] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 627.225641][ T4190] ? __lock_acquire+0x54f/0x5490 [ 627.230599][ T4190] ? _raw_spin_unlock_irq+0x5e/0x90 [ 627.235814][ T4190] ? __schedule+0x106e/0x1560 [ 627.240529][ T4190] kernfs_new_node+0x96/0x120 [ 627.245388][ T4190] kernfs_create_dir_ns+0x52/0x160 [ 627.250506][ T4190] internal_create_group+0x7f4/0xc40 [ 627.255810][ T4190] ? remove_files.isra.0+0x190/0x190 [ 627.261101][ T4190] ? bd_set_size+0x3f/0xb0 [ 627.265518][ T4190] ? kasan_check_write+0x14/0x20 [ 627.270554][ T4190] ? up_write+0xbe/0x1e0 [ 627.274895][ T4190] sysfs_create_group+0x20/0x30 [ 627.279757][ T4190] lo_ioctl+0x1128/0x2320 [ 627.284091][ T4190] ? lo_rw_aio+0x1120/0x1120 [ 627.288684][ T4190] blkdev_ioctl+0xece/0x1c10 [ 627.293274][ T4190] ? blkpg_ioctl+0xa90/0xa90 [ 627.297912][ T4190] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 627.304042][ T4190] ? __fget+0x35a/0x550 [ 627.308208][ T4190] block_ioctl+0xee/0x130 [ 627.312625][ T4190] ? blkdev_fallocate+0x410/0x410 [ 627.317653][ T4190] do_vfs_ioctl+0xdb6/0x13e0 [ 627.322250][ T4190] ? ioctl_preallocate+0x210/0x210 [ 627.327360][ T4190] ? __fget+0x381/0x550 [ 627.331525][ T4190] ? ksys_dup3+0x3e0/0x3e0 [ 627.335941][ T4190] ? do_sys_open+0x31d/0x5d0 [ 627.340623][ T4190] ? tomoyo_file_ioctl+0x23/0x30 [ 627.345576][ T4190] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 627.351875][ T4190] ? security_file_ioctl+0x8d/0xc0 [ 627.357058][ T4190] ksys_ioctl+0xab/0xd0 [ 627.361409][ T4190] __x64_sys_ioctl+0x73/0xb0 [ 627.366087][ T4190] do_syscall_64+0xfd/0x680 [ 627.370810][ T4190] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 627.376711][ T4190] RIP: 0033:0x4590e7 [ 627.383215][ T4190] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 627.403099][ T4190] RSP: 002b:00007f34331e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 627.411691][ T4190] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004590e7 [ 627.419854][ T4190] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 627.427912][ T4190] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 627.435884][ T4190] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 627.443858][ T4190] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:07:44 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x800000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:44 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x4]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:44 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:44 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000040)={0x0, 0xefd4132, 0x5, 0x2a, 0x3f, 0x401, 0x1, 0x1, {0x0, @in={{0x2, 0x4e21, @multicast1}}, 0x4, 0x4, 0x8, 0x84e3, 0x80000000}}, &(0x7f0000000100)=0xb0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0xffffffff, 0xffffffffa5dc0414, 0x0, 0x101, 0x0, 0x1, 0x20, 0x0, r2}, 0x20) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") r3 = syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x7fffffff, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r3, 0xae44, 0xfffffffffffffff9) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r4 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x400000) ioctl$EVIOCGABS3F(r4, 0x8018457f, &(0x7f00000001c0)=""/39) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:44 executing program 1 (fault-call:0 fault-nth:23): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:07:44 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x3c000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:44 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x806000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:44 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x6]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:44 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xd00000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:44 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008914, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) getpeername$inet(r1, &(0x7f0000000080)={0x2, 0x0, @broadcast}, &(0x7f00000000c0)=0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) [ 627.726706][ T4222] FAULT_INJECTION: forcing a failure. [ 627.726706][ T4222] name failslab, interval 1, probability 0, space 0, times 0 23:07:44 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:44 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x40000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 627.787031][ T4222] CPU: 0 PID: 4222 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 627.796007][ T4222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 627.806153][ T4222] Call Trace: [ 627.809448][ T4222] dump_stack+0x172/0x1f0 [ 627.813863][ T4222] should_fail.cold+0xa/0x15 [ 627.818476][ T4222] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 627.824288][ T4222] ? ___might_sleep+0x163/0x280 [ 627.829139][ T4222] __should_failslab+0x121/0x190 [ 627.834088][ T4222] should_failslab+0x9/0x14 [ 627.838581][ T4222] kmem_cache_alloc+0x2af/0x6f0 [ 627.843432][ T4222] ? lock_downgrade+0x880/0x880 [ 627.848291][ T4222] __kernfs_new_node+0xf0/0x6c0 [ 627.853144][ T4222] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 627.858790][ T4222] ? wait_for_completion+0x440/0x440 [ 627.864189][ T4222] ? mutex_unlock+0xd/0x10 [ 627.868609][ T4222] ? kernfs_activate+0x192/0x1f0 [ 627.873549][ T4222] kernfs_new_node+0x96/0x120 [ 627.878240][ T4222] __kernfs_create_file+0x51/0x340 [ 627.883359][ T4222] sysfs_add_file_mode_ns+0x222/0x560 [ 627.888738][ T4222] internal_create_group+0x359/0xc40 [ 627.894042][ T4222] ? remove_files.isra.0+0x190/0x190 [ 627.899326][ T4222] ? bd_set_size+0x3f/0xb0 [ 627.903928][ T4222] ? kasan_check_write+0x14/0x20 [ 627.908869][ T4222] ? up_write+0xbe/0x1e0 [ 627.913116][ T4222] sysfs_create_group+0x20/0x30 [ 627.917970][ T4222] lo_ioctl+0x1128/0x2320 [ 627.922306][ T4222] ? lo_rw_aio+0x1120/0x1120 [ 627.926899][ T4222] blkdev_ioctl+0xece/0x1c10 [ 627.931490][ T4222] ? blkpg_ioctl+0xa90/0xa90 [ 627.936168][ T4222] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 627.942080][ T4222] ? __fget+0x35a/0x550 [ 627.946505][ T4222] block_ioctl+0xee/0x130 [ 627.952416][ T4222] ? blkdev_fallocate+0x410/0x410 [ 627.957713][ T4222] do_vfs_ioctl+0xdb6/0x13e0 [ 627.962653][ T4222] ? ioctl_preallocate+0x210/0x210 [ 627.967949][ T4222] ? __fget+0x381/0x550 [ 627.972109][ T4222] ? ksys_dup3+0x3e0/0x3e0 [ 627.976524][ T4222] ? do_sys_open+0x31d/0x5d0 [ 627.981118][ T4222] ? tomoyo_file_ioctl+0x23/0x30 [ 627.986067][ T4222] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 627.992303][ T4222] ? security_file_ioctl+0x8d/0xc0 [ 627.997415][ T4222] ksys_ioctl+0xab/0xd0 [ 628.001570][ T4222] __x64_sys_ioctl+0x73/0xb0 [ 628.006166][ T4222] do_syscall_64+0xfd/0x680 [ 628.010675][ T4222] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 628.016570][ T4222] RIP: 0033:0x4590e7 [ 628.020461][ T4222] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 628.040063][ T4222] RSP: 002b:00007f34331e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 628.048562][ T4222] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004590e7 [ 628.056533][ T4222] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 628.064501][ T4222] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 628.072467][ T4222] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 628.080434][ T4222] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:07:45 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2800000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:45 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xd]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 628.205993][ T4234] hfsplus: unable to find HFS+ superblock [ 628.282625][ T4244] hfsplus: unable to find HFS+ superblock 23:07:45 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplusP', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:45 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x43050000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:45 executing program 1 (fault-call:0 fault-nth:24): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:07:45 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x3) 23:07:45 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2900000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:45 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x28]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 628.405800][ T4256] FAULT_INJECTION: forcing a failure. [ 628.405800][ T4256] name failslab, interval 1, probability 0, space 0, times 0 [ 628.429929][ T4256] CPU: 0 PID: 4256 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 628.438918][ T4256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 628.449071][ T4256] Call Trace: 23:07:45 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x29]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 628.452376][ T4256] dump_stack+0x172/0x1f0 [ 628.456714][ T4256] should_fail.cold+0xa/0x15 [ 628.461324][ T4256] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 628.467499][ T4256] ? ___might_sleep+0x163/0x280 [ 628.472368][ T4256] __should_failslab+0x121/0x190 [ 628.477312][ T4256] should_failslab+0x9/0x14 [ 628.481818][ T4256] kmem_cache_alloc+0x2af/0x6f0 [ 628.486675][ T4256] ? find_held_lock+0x35/0x130 [ 628.491448][ T4256] ? kernfs_activate+0x192/0x1f0 [ 628.496405][ T4256] __kernfs_new_node+0xf0/0x6c0 [ 628.501264][ T4256] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 628.506725][ T4256] ? mutex_trylock+0x1e0/0x1e0 [ 628.511491][ T4256] ? lock_downgrade+0x880/0x880 [ 628.516436][ T4256] ? kasan_check_write+0x14/0x20 [ 628.521374][ T4256] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 628.526921][ T4256] ? wait_for_completion+0x440/0x440 [ 628.532210][ T4256] kernfs_new_node+0x96/0x120 [ 628.536891][ T4256] __kernfs_create_file+0x51/0x340 [ 628.542006][ T4256] sysfs_add_file_mode_ns+0x222/0x560 [ 628.547391][ T4256] internal_create_group+0x359/0xc40 [ 628.552699][ T4256] ? remove_files.isra.0+0x190/0x190 [ 628.557983][ T4256] ? bd_set_size+0x3f/0xb0 [ 628.562405][ T4256] ? kasan_check_write+0x14/0x20 [ 628.567340][ T4256] ? up_write+0xbe/0x1e0 [ 628.571593][ T4256] sysfs_create_group+0x20/0x30 [ 628.576444][ T4256] lo_ioctl+0x1128/0x2320 [ 628.580879][ T4256] ? lo_rw_aio+0x1120/0x1120 [ 628.585474][ T4256] blkdev_ioctl+0xece/0x1c10 [ 628.590158][ T4256] ? blkpg_ioctl+0xa90/0xa90 [ 628.594751][ T4256] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 628.600573][ T4256] ? __fget+0x35a/0x550 [ 628.604742][ T4256] block_ioctl+0xee/0x130 [ 628.609081][ T4256] ? blkdev_fallocate+0x410/0x410 [ 628.614114][ T4256] do_vfs_ioctl+0xdb6/0x13e0 [ 628.618714][ T4256] ? ioctl_preallocate+0x210/0x210 [ 628.623928][ T4256] ? __fget+0x381/0x550 [ 628.628104][ T4256] ? ksys_dup3+0x3e0/0x3e0 [ 628.632523][ T4256] ? do_sys_open+0x31d/0x5d0 [ 628.637204][ T4256] ? tomoyo_file_ioctl+0x23/0x30 [ 628.642150][ T4256] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 628.648390][ T4256] ? security_file_ioctl+0x8d/0xc0 [ 628.653513][ T4256] ksys_ioctl+0xab/0xd0 [ 628.657684][ T4256] __x64_sys_ioctl+0x73/0xb0 [ 628.662277][ T4256] do_syscall_64+0xfd/0x680 [ 628.666790][ T4256] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 628.672691][ T4256] RIP: 0033:0x4590e7 [ 628.676592][ T4256] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 628.696204][ T4256] RSP: 002b:00007f34331e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 23:07:45 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x6c000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:45 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f00000000c0)={0xff, @multicast2, 0x4e21, 0x3, 'lc\x00', 0x20, 0x8bf, 0x29}, 0x2c) getpeername$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast2}, &(0x7f0000000080)=0x10) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:45 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2b00000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 628.704617][ T4256] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004590e7 [ 628.712591][ T4256] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 628.720567][ T4256] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 628.728536][ T4256] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 628.736506][ T4256] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:07:45 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2b]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:45 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2c00000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 628.850076][ T4273] IPVS: set_ctl: invalid protocol: 255 224.0.0.2:20001 [ 628.882966][ T4273] IPVS: set_ctl: invalid protocol: 255 224.0.0.2:20001 23:07:46 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplusM', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:46 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x800e0000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:46 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f00000001c0)={'nat\x00', 0x0, 0x4, 0xa8, [], 0xa, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000100)=""/168}, &(0x7f0000000240)=0x78) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000280)='/dev/cachefiles\x00', 0x10000, 0x0) ioctl$EVIOCGKEYCODE_V2(r2, 0x80284504, &(0x7f0000000740)=""/4096) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:46 executing program 1 (fault-call:0 fault-nth:25): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:07:46 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2c]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:46 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2f00000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:46 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) accept4(r0, &(0x7f0000000040)=@in={0x2, 0x0, @local}, &(0x7f00000000c0)=0x80, 0x0) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) [ 629.112703][ T4290] FAULT_INJECTION: forcing a failure. [ 629.112703][ T4290] name failslab, interval 1, probability 0, space 0, times 0 [ 629.145643][ T4290] CPU: 0 PID: 4290 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 629.154635][ T4290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 629.164882][ T4290] Call Trace: [ 629.168214][ T4290] dump_stack+0x172/0x1f0 [ 629.172562][ T4290] should_fail.cold+0xa/0x15 [ 629.177174][ T4290] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 629.182996][ T4290] ? ___might_sleep+0x163/0x280 [ 629.187871][ T4290] __should_failslab+0x121/0x190 [ 629.192854][ T4290] should_failslab+0x9/0x14 [ 629.197364][ T4290] kmem_cache_alloc+0x2af/0x6f0 [ 629.202228][ T4290] ? lock_downgrade+0x880/0x880 [ 629.207093][ T4290] __kernfs_new_node+0xf0/0x6c0 [ 629.211956][ T4290] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 629.217421][ T4290] ? wait_for_completion+0x440/0x440 [ 629.223234][ T4290] ? mutex_unlock+0xd/0x10 [ 629.227744][ T4290] ? kernfs_activate+0x192/0x1f0 [ 629.232693][ T4290] kernfs_new_node+0x96/0x120 [ 629.237381][ T4290] __kernfs_create_file+0x51/0x340 [ 629.242494][ T4290] sysfs_add_file_mode_ns+0x222/0x560 [ 629.247880][ T4290] internal_create_group+0x359/0xc40 [ 629.253178][ T4290] ? remove_files.isra.0+0x190/0x190 [ 629.258464][ T4290] ? bd_set_size+0x3f/0xb0 [ 629.262910][ T4290] ? kasan_check_write+0x14/0x20 [ 629.267846][ T4290] ? up_write+0xbe/0x1e0 [ 629.272190][ T4290] sysfs_create_group+0x20/0x30 [ 629.277044][ T4290] lo_ioctl+0x1128/0x2320 [ 629.281377][ T4290] ? lo_rw_aio+0x1120/0x1120 [ 629.285969][ T4290] blkdev_ioctl+0xece/0x1c10 [ 629.290562][ T4290] ? blkpg_ioctl+0xa90/0xa90 [ 629.295163][ T4290] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 629.300982][ T4290] ? __fget+0x35a/0x550 [ 629.305147][ T4290] block_ioctl+0xee/0x130 [ 629.309477][ T4290] ? blkdev_fallocate+0x410/0x410 [ 629.314504][ T4290] do_vfs_ioctl+0xdb6/0x13e0 [ 629.319101][ T4290] ? ioctl_preallocate+0x210/0x210 [ 629.324227][ T4290] ? __fget+0x381/0x550 [ 629.328407][ T4290] ? ksys_dup3+0x3e0/0x3e0 [ 629.332825][ T4290] ? do_sys_open+0x31d/0x5d0 [ 629.337425][ T4290] ? tomoyo_file_ioctl+0x23/0x30 [ 629.342365][ T4290] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 629.348610][ T4290] ? security_file_ioctl+0x8d/0xc0 [ 629.353845][ T4290] ksys_ioctl+0xab/0xd0 [ 629.358012][ T4290] __x64_sys_ioctl+0x73/0xb0 [ 629.362618][ T4290] do_syscall_64+0xfd/0x680 [ 629.367127][ T4290] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 629.373020][ T4290] RIP: 0033:0x4590e7 [ 629.376916][ T4290] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 629.396521][ T4290] RSP: 002b:00007f34331e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 629.404938][ T4290] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004590e7 23:07:46 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2f]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:46 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x80350000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:46 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x3c00000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 629.413004][ T4290] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 629.420987][ T4290] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 629.428962][ T4290] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 629.436938][ T4290] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:07:46 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x3c]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:46 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x81000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:46 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplusT', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:46 executing program 3: r0 = socket$inet(0x2b, 0x1, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$sock_timeval(r1, 0x1, 0x14, &(0x7f0000000140), &(0x7f0000000100)=0xffffff2e) 23:07:46 executing program 1 (fault-call:0 fault-nth:26): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:07:46 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x4000000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:46 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x86ddffff]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:46 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x6c]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 629.738533][ T4318] FAULT_INJECTION: forcing a failure. [ 629.738533][ T4318] name failslab, interval 1, probability 0, space 0, times 0 [ 629.754363][ T4318] CPU: 0 PID: 4318 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 629.763333][ T4318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 629.773394][ T4318] Call Trace: [ 629.776703][ T4318] dump_stack+0x172/0x1f0 [ 629.781040][ T4318] should_fail.cold+0xa/0x15 23:07:46 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, 0x0, &(0x7f0000000200)) r3 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x7, 0x400) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000200)={0x0, 0x81}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000280)={r4, 0x4, 0x5, [0x7ff, 0x81, 0x4, 0x4, 0x3]}, &(0x7f00000002c0)=0x12) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x86, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000080)={0x0, 0x2}, &(0x7f0000000040)=0x160) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000000c0)={r6, 0x7fff}, 0x8) ioctl$CAPI_GET_PROFILE(r3, 0xc0404309, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r5, 0x84, 0x73, &(0x7f0000000100)={r6, 0x5, 0x30, 0x43, 0x20004}, &(0x7f0000000140)=0x18) r7 = dup2(r1, r0) r8 = syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000b00)={{{@in=@multicast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000c00)=0xe8) accept$packet(r3, &(0x7f0000000c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000c80)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r7, &(0x7f0000000e00)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x23002000}, 0xc, &(0x7f0000000dc0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="d8000000", @ANYRES16=r8, @ANYBLOB="000226bd7000", @ANYRES32=r9, @ANYBLOB="bc00020038000100240001006e6f746966795f70656572735f696e74657276616c000000000000000000000008000300030000000800040007000000400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000000000008000600", @ANYRES32=r10, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b00000008000400a30000000800070000000000"], 0xd8}, 0x1, 0x0, 0x0, 0x400c0}, 0x40) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x100, 0x4) 23:07:46 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x88470000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:46 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x4305000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 629.785639][ T4318] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 629.791456][ T4318] ? ___might_sleep+0x163/0x280 [ 629.796323][ T4318] __should_failslab+0x121/0x190 [ 629.801259][ T4318] should_failslab+0x9/0x14 [ 629.805791][ T4318] kmem_cache_alloc+0x2af/0x6f0 [ 629.810652][ T4318] ? lock_downgrade+0x880/0x880 [ 629.815512][ T4318] __kernfs_new_node+0xf0/0x6c0 [ 629.820439][ T4318] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 629.825905][ T4318] ? wait_for_completion+0x440/0x440 [ 629.831197][ T4318] ? mutex_unlock+0xd/0x10 [ 629.835614][ T4318] ? kernfs_activate+0x192/0x1f0 [ 629.840557][ T4318] kernfs_new_node+0x96/0x120 [ 629.845238][ T4318] __kernfs_create_file+0x51/0x340 [ 629.850385][ T4318] sysfs_add_file_mode_ns+0x222/0x560 [ 629.855772][ T4318] internal_create_group+0x359/0xc40 [ 629.861163][ T4318] ? remove_files.isra.0+0x190/0x190 [ 629.866455][ T4318] ? bd_set_size+0x3f/0xb0 [ 629.870877][ T4318] ? kasan_check_write+0x14/0x20 [ 629.875815][ T4318] ? up_write+0xbe/0x1e0 [ 629.880059][ T4318] sysfs_create_group+0x20/0x30 [ 629.884911][ T4318] lo_ioctl+0x1128/0x2320 [ 629.889252][ T4318] ? lo_rw_aio+0x1120/0x1120 [ 629.893841][ T4318] blkdev_ioctl+0xece/0x1c10 [ 629.898429][ T4318] ? blkpg_ioctl+0xa90/0xa90 [ 629.903030][ T4318] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 629.908930][ T4318] ? __fget+0x35a/0x550 [ 629.913088][ T4318] block_ioctl+0xee/0x130 [ 629.917420][ T4318] ? blkdev_fallocate+0x410/0x410 [ 629.922443][ T4318] do_vfs_ioctl+0xdb6/0x13e0 [ 629.927038][ T4318] ? ioctl_preallocate+0x210/0x210 [ 629.932145][ T4318] ? __fget+0x381/0x550 [ 629.936307][ T4318] ? ksys_dup3+0x3e0/0x3e0 [ 629.940720][ T4318] ? do_sys_open+0x31d/0x5d0 [ 629.945313][ T4318] ? tomoyo_file_ioctl+0x23/0x30 [ 629.950255][ T4318] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 629.956496][ T4318] ? security_file_ioctl+0x8d/0xc0 [ 629.961612][ T4318] ksys_ioctl+0xab/0xd0 [ 629.965772][ T4318] __x64_sys_ioctl+0x73/0xb0 [ 629.970369][ T4318] do_syscall_64+0xfd/0x680 [ 629.974883][ T4318] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 629.980775][ T4318] RIP: 0033:0x4590e7 [ 629.984671][ T4318] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 630.004275][ T4318] RSP: 002b:00007f34331e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 630.012691][ T4318] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004590e7 [ 630.020661][ T4318] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 630.028636][ T4318] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 630.036631][ T4318] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 630.044597][ T4318] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:07:47 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xf0]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:47 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x6c00000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:47 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x88480000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:47 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplusS', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:47 executing program 1 (fault-call:0 fault-nth:27): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:07:47 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x101000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f00000000c0)={r2}) 23:07:47 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x543]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:47 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x800e000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:47 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x88640000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:47 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8035000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 630.413719][ T4357] FAULT_INJECTION: forcing a failure. [ 630.413719][ T4357] name failslab, interval 1, probability 0, space 0, times 0 23:07:47 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x600]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:47 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x88a8ffff]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:47 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008910, &(0x7f0000000040)="0adc1f9bd0700000000000") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) readv(r1, &(0x7f0000000180)=[{&(0x7f0000000080)=""/230, 0xe6}], 0x1) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) [ 630.456120][ T4357] CPU: 0 PID: 4357 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 630.465099][ T4357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 630.475149][ T4357] Call Trace: [ 630.478449][ T4357] dump_stack+0x172/0x1f0 [ 630.482796][ T4357] should_fail.cold+0xa/0x15 [ 630.487405][ T4357] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 630.493230][ T4357] ? ___might_sleep+0x163/0x280 [ 630.498270][ T4357] __should_failslab+0x121/0x190 [ 630.503309][ T4357] should_failslab+0x9/0x14 [ 630.507817][ T4357] kmem_cache_alloc+0x2af/0x6f0 [ 630.512682][ T4357] ? lock_downgrade+0x880/0x880 [ 630.517544][ T4357] __kernfs_new_node+0xf0/0x6c0 [ 630.522406][ T4357] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 630.527870][ T4357] ? wait_for_completion+0x440/0x440 [ 630.533162][ T4357] ? mutex_unlock+0xd/0x10 [ 630.537585][ T4357] ? kernfs_activate+0x192/0x1f0 [ 630.542541][ T4357] kernfs_new_node+0x96/0x120 [ 630.547232][ T4357] __kernfs_create_file+0x51/0x340 [ 630.552440][ T4357] sysfs_add_file_mode_ns+0x222/0x560 [ 630.557827][ T4357] internal_create_group+0x359/0xc40 [ 630.563123][ T4357] ? remove_files.isra.0+0x190/0x190 [ 630.568408][ T4357] ? bd_set_size+0x3f/0xb0 [ 630.572839][ T4357] ? kasan_check_write+0x14/0x20 [ 630.577868][ T4357] ? up_write+0xbe/0x1e0 [ 630.582120][ T4357] sysfs_create_group+0x20/0x30 [ 630.586974][ T4357] lo_ioctl+0x1128/0x2320 [ 630.591318][ T4357] ? lo_rw_aio+0x1120/0x1120 [ 630.595913][ T4357] blkdev_ioctl+0xece/0x1c10 [ 630.600500][ T4357] ? blkpg_ioctl+0xa90/0xa90 [ 630.605103][ T4357] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 630.611014][ T4357] ? __fget+0x35a/0x550 [ 630.615181][ T4357] block_ioctl+0xee/0x130 [ 630.619856][ T4357] ? blkdev_fallocate+0x410/0x410 [ 630.624893][ T4357] do_vfs_ioctl+0xdb6/0x13e0 [ 630.629495][ T4357] ? ioctl_preallocate+0x210/0x210 [ 630.634699][ T4357] ? __fget+0x381/0x550 [ 630.638889][ T4357] ? ksys_dup3+0x3e0/0x3e0 [ 630.643308][ T4357] ? do_sys_open+0x31d/0x5d0 [ 630.647905][ T4357] ? tomoyo_file_ioctl+0x23/0x30 [ 630.652844][ T4357] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 630.659086][ T4357] ? security_file_ioctl+0x8d/0xc0 [ 630.664201][ T4357] ksys_ioctl+0xab/0xd0 [ 630.668363][ T4357] __x64_sys_ioctl+0x73/0xb0 [ 630.672961][ T4357] do_syscall_64+0xfd/0x680 [ 630.677481][ T4357] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 630.683373][ T4357] RIP: 0033:0x4590e7 [ 630.687273][ T4357] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 630.706874][ T4357] RSP: 002b:00007f34331e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 630.715461][ T4357] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004590e7 [ 630.723429][ T4357] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 630.731400][ T4357] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 630.739381][ T4357] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 630.747352][ T4357] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:07:47 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8100000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:47 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x608]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:47 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplusH', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:47 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x88caffff]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:47 executing program 1 (fault-call:0 fault-nth:28): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:07:47 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x86ddffff00000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:47 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x689]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:48 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x89060000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 631.050367][ T4382] FAULT_INJECTION: forcing a failure. [ 631.050367][ T4382] name failslab, interval 1, probability 0, space 0, times 0 [ 631.075616][ T4382] CPU: 0 PID: 4382 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 631.084634][ T4382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 631.094716][ T4382] Call Trace: [ 631.098021][ T4382] dump_stack+0x172/0x1f0 [ 631.102365][ T4382] should_fail.cold+0xa/0x15 [ 631.106973][ T4382] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 631.112879][ T4382] ? ___might_sleep+0x163/0x280 [ 631.117740][ T4382] __should_failslab+0x121/0x190 [ 631.122696][ T4382] should_failslab+0x9/0x14 [ 631.127203][ T4382] kmem_cache_alloc+0x2af/0x6f0 [ 631.132054][ T4382] ? lock_downgrade+0x880/0x880 [ 631.136925][ T4382] __kernfs_new_node+0xf0/0x6c0 [ 631.141793][ T4382] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 631.147263][ T4382] ? wait_for_completion+0x440/0x440 [ 631.152572][ T4382] ? mutex_unlock+0xd/0x10 [ 631.157443][ T4382] ? kernfs_activate+0x192/0x1f0 [ 631.162406][ T4382] kernfs_new_node+0x96/0x120 [ 631.167179][ T4382] __kernfs_create_file+0x51/0x340 [ 631.172379][ T4382] sysfs_add_file_mode_ns+0x222/0x560 [ 631.177755][ T4382] internal_create_group+0x359/0xc40 [ 631.183158][ T4382] ? remove_files.isra.0+0x190/0x190 [ 631.188443][ T4382] ? bd_set_size+0x3f/0xb0 [ 631.192863][ T4382] ? kasan_check_write+0x14/0x20 [ 631.197800][ T4382] ? up_write+0xbe/0x1e0 [ 631.202504][ T4382] sysfs_create_group+0x20/0x30 [ 631.207446][ T4382] lo_ioctl+0x1128/0x2320 [ 631.211791][ T4382] ? lo_rw_aio+0x1120/0x1120 [ 631.216384][ T4382] blkdev_ioctl+0xece/0x1c10 [ 631.220979][ T4382] ? blkpg_ioctl+0xa90/0xa90 [ 631.225573][ T4382] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 631.231400][ T4382] ? __fget+0x35a/0x550 [ 631.235566][ T4382] block_ioctl+0xee/0x130 [ 631.239896][ T4382] ? blkdev_fallocate+0x410/0x410 [ 631.244922][ T4382] do_vfs_ioctl+0xdb6/0x13e0 [ 631.249521][ T4382] ? ioctl_preallocate+0x210/0x210 [ 631.254636][ T4382] ? __fget+0x381/0x550 [ 631.258799][ T4382] ? ksys_dup3+0x3e0/0x3e0 [ 631.263214][ T4382] ? do_sys_open+0x31d/0x5d0 [ 631.267811][ T4382] ? tomoyo_file_ioctl+0x23/0x30 [ 631.272746][ T4382] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 631.279078][ T4382] ? security_file_ioctl+0x8d/0xc0 [ 631.284201][ T4382] ksys_ioctl+0xab/0xd0 [ 631.288359][ T4382] __x64_sys_ioctl+0x73/0xb0 [ 631.292958][ T4382] do_syscall_64+0xfd/0x680 [ 631.297561][ T4382] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 631.303447][ T4382] RIP: 0033:0x4590e7 [ 631.307346][ T4382] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 631.326949][ T4382] RSP: 002b:00007f34331e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 631.335363][ T4382] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004590e7 [ 631.343336][ T4382] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 23:07:48 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8847000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:48 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x806]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 631.351307][ T4382] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 631.359388][ T4382] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 631.367366][ T4382] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:07:48 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8848000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:48 executing program 3: r0 = socket$inet(0x2b, 0x1, 0xfffffffffffffffc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e22, @multicast2}, 0xfffffffffffffe6d) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:48 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xd00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:48 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x89ffffff]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:48 executing program 1 (fault-call:0 fault-nth:29): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:07:48 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8864000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:48 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:48 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xff000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 631.780231][ T4410] FAULT_INJECTION: forcing a failure. [ 631.780231][ T4410] name failslab, interval 1, probability 0, space 0, times 0 [ 631.819446][ T4410] CPU: 0 PID: 4410 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 631.828434][ T4410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 631.838488][ T4410] Call Trace: [ 631.841787][ T4410] dump_stack+0x172/0x1f0 [ 631.846131][ T4410] should_fail.cold+0xa/0x15 [ 631.850738][ T4410] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 631.856570][ T4410] ? ___might_sleep+0x163/0x280 [ 631.861432][ T4410] __should_failslab+0x121/0x190 [ 631.866375][ T4410] should_failslab+0x9/0x14 [ 631.870905][ T4410] kmem_cache_alloc_node+0x261/0x700 [ 631.876369][ T4410] ? find_held_lock+0x35/0x130 [ 631.881142][ T4410] __alloc_skb+0xd5/0x5e0 [ 631.885469][ T4410] ? skb_trim+0x190/0x190 [ 631.889809][ T4410] ? kasan_check_read+0x11/0x20 [ 631.894668][ T4410] alloc_uevent_skb+0x83/0x1e2 [ 631.899439][ T4410] kobject_uevent_env+0xaa3/0x101d [ 631.904549][ T4410] kobject_uevent+0x20/0x26 [ 631.909046][ T4410] lo_ioctl+0x11a4/0x2320 [ 631.913381][ T4410] ? lo_rw_aio+0x1120/0x1120 [ 631.917974][ T4410] blkdev_ioctl+0xece/0x1c10 [ 631.922561][ T4410] ? blkpg_ioctl+0xa90/0xa90 [ 631.927160][ T4410] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 631.932979][ T4410] ? __fget+0x35a/0x550 [ 631.937158][ T4410] block_ioctl+0xee/0x130 [ 631.941478][ T4410] ? blkdev_fallocate+0x410/0x410 [ 631.946516][ T4410] do_vfs_ioctl+0xdb6/0x13e0 [ 631.951111][ T4410] ? ioctl_preallocate+0x210/0x210 [ 631.956218][ T4410] ? __fget+0x381/0x550 [ 631.960376][ T4410] ? ksys_dup3+0x3e0/0x3e0 [ 631.964804][ T4410] ? do_sys_open+0x31d/0x5d0 [ 631.969413][ T4410] ? tomoyo_file_ioctl+0x23/0x30 [ 631.974356][ T4410] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 631.980600][ T4410] ? security_file_ioctl+0x8d/0xc0 [ 631.985711][ T4410] ksys_ioctl+0xab/0xd0 [ 631.989873][ T4410] __x64_sys_ioctl+0x73/0xb0 [ 631.994468][ T4410] do_syscall_64+0xfd/0x680 [ 631.998974][ T4410] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 632.005031][ T4410] RIP: 0033:0x4590e7 [ 632.008926][ T4410] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 23:07:48 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xe80]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:49 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x88a8ffff00000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:49 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = getuid() syz_mount_image$jfs(&(0x7f0000000400)='jfs\x00', &(0x7f0000000640)='./file0\x00', 0x200, 0x4, &(0x7f00000008c0)=[{&(0x7f0000000680)="820039717728fe7769ca6f93b34419e5e5bf3ac30adf53a67ca50e662e32b2c094ef4f753247bd1f8f465148562bc3c7b8ef50b4", 0x34, 0x6}, {&(0x7f00000006c0)="ceb014362d48de283f6333ffdbf77814da8b208e2652b1803d266f2a3a9a1afb342fcc", 0x23, 0x5}, {&(0x7f0000000740)="595bfb2370e0f1a7419f21869d1726651d04e3ccedd62a089a7cd90952c2a3abeea714b4757f8209dd9533a192e194996f021b1ce34be1133c25ca41c6ecf7fe06b81870ee2a7a1ea9291ecf8931d4c31cb4141aa94573831558f3b0f05884a8213f8d02fad39fd7a9e1c123850653bca0c5aca2036f70dec4051971246a69699f023dff08f3fce6da0c1aff6d4362a549ddbb3330bccafbfdb739a67ea07664e92bfdd0aac42a85e2fa77faf445a7ef78e1a649191a8cce1cde4d", 0xbb, 0x4}, {&(0x7f0000000800)="7c7ad72db96f021bdf0fe3a4fe4777513e21928bb75cd5c05919c03de0d531a4188e1c70856b1e5bb39f98824dd548a3f079d1019564ec9b433ad37c0fe79baa6557a6fb315cd191b9d39b923980742145a145bcdea903e1fa1f7b3ba9e9f78664cc73d59b77f768ea3ce03389b196ac8612c70754fda31ed71a108a0598eb03e09db53c495d36ea91dcdfa099594596d7066d88b0ca15b369dd70b71dda2b88f20c84c78a361e72b1eba24030", 0xad, 0xfffffffffffffe00}], 0x8000, &(0x7f0000000940)={[{@discard_size={'discard', 0x3d, 0x9}}, {@resize_size={'resize', 0x3d, 0x1}}, {@noquota='noquota'}, {@resize='resize'}, {@integrity='integrity'}, {@nodiscard='nodiscard'}, {@quota='quota'}, {@grpquota='grpquota'}, {@discard_size={'discard', 0x3d, 0xff}}, {@uid={'uid', 0x3d, r1}}], [{@context={'context', 0x3d, 'staff_u'}}]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = geteuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x3ff, 0x7, &(0x7f0000000440)=[{&(0x7f00000000c0)="e32b801b916ccad4881e09d202ccb524c4efdfb47fc22d15f2223e32c9b89b86605222e40c54ef92224dbfb32b2b26092c7429f7fc3c22366f0d4c8dbd2a5938080bf9191c81d99d041e2e5643799ee506c787f88b989a0777c0c751", 0x5c, 0x1f}, {&(0x7f0000000140)="c782ad6e204268752410f302a47f5a94101ebd371e2b3bc63b82c721d3026893fad9d1ba29c38e836a0a26423f4fa931416bf15a4dfd891ecfe64e22430f8166c75bab26092e0b6b189452bef2850925bf1a3a27c74fe83e7b70c568826bf2f03a9916c7f94b138b107099ce2e4a26e8073c799bd6cf33af9b37efa6e1abf9b49350f3f30cbb502a7c5d59863730fe7b5fafdec0ea55b83facf8cab15c163a45c004bf75a5975ba64365419fc7362dbd3c196c88c230", 0xb6, 0x1}, {&(0x7f0000000200)="7e508338e8de0a8b57cad87337d459dea631683745aba7020d7cb6ecb774c9b7b2e53c0fa22ecd5b", 0x28, 0x7}, {&(0x7f0000000240)="414e5d1484c8ed002a56b988c4129888e0b8431e59a12f21139399c0f4842360c7d60faa385eba1b89980ebdb1c4fa305af61b819b0c59955ace6c9ec672456d7e00b8a8d2af501c3a699934fb831e38261ace29d3", 0x55}, {&(0x7f00000002c0)="4e4fb4aed2440a8001024466137f949552074e8f21a08d4cd7f2f5629d6d477d724fa42596e46ff19dd989818a", 0x2d, 0x9}, {&(0x7f0000000340)="a9743b3a1c0be03528a2c4090053ef383cb8c8eaa6214cfdb85ca05afef59d91c291695fe9a7e8c54deecd6d62d6e1c70deabddefe1292d57b9a4141e76ef824045193de829858fd7c22ad6b129ddaad6246901fedfd9a864ff60940bea02eec06676c3df76a1d45c39a5d59f7f24fd86dcef470bf0c63463a8d5e2d9ff4d239d55de0cade59510c0afc58853de9d6", 0x8f, 0x9}, {&(0x7f0000000400), 0x0, 0x2}], 0x40000, &(0x7f0000000500)=ANY=[@ANYBLOB='inline_dentry,grpjquota=,inline_xattr_size=0x0000000000000001,lazytime,data_flush,inline_xattr,jqfmt=vfsv1,noinline_xattr,active_logs=4,mode=lfs,dont_hash,obj_role=,smackfsdef=cpusetwlan1securitysystem,uid=', @ANYRESDEC=r3, @ANYBLOB="2c646566636f6e746578743d73746156aa742dc9cfb5dc82a1a20c6d6e916ff96f9766665f752c66736d614869633d30782340d003f060d8ca79ff5fca31f051664283234684134352deb3d80afa75d4c00dbbe865b4da7d"]) ioctl(r2, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") fcntl$getflags(r2, 0x40b) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) [ 632.028528][ T4410] RSP: 002b:00007f34331e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 632.036943][ T4410] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004590e7 [ 632.044998][ T4410] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 632.052964][ T4410] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 632.060933][ T4410] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 632.068898][ T4410] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:07:49 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xffffa888]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 632.142187][ T4416] hfsplus: unable to find HFS+ superblock 23:07:49 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x88caffff00000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:49 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2800]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:49 executing program 1 (fault-call:0 fault-nth:30): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:07:49 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2900]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 632.273441][ T4427] JFS: discard option not supported on device [ 632.295626][ T4427] JFS: discard option not supported on device [ 632.308832][ T4427] jfs: Unrecognized mount option "context=staff_u" or missing value 23:07:49 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8906000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:49 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xffffca88]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:49 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 632.417966][ T4439] FAULT_INJECTION: forcing a failure. [ 632.417966][ T4439] name failslab, interval 1, probability 0, space 0, times 0 [ 632.431029][ T4439] CPU: 0 PID: 4439 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 632.440068][ T4439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 632.450129][ T4439] Call Trace: [ 632.453425][ T4439] dump_stack+0x172/0x1f0 [ 632.457765][ T4439] should_fail.cold+0xa/0x15 [ 632.462369][ T4439] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 632.468801][ T4439] ? ___might_sleep+0x163/0x280 [ 632.473676][ T4439] __should_failslab+0x121/0x190 [ 632.478636][ T4439] should_failslab+0x9/0x14 [ 632.483140][ T4439] __kmalloc+0x2d9/0x740 [ 632.487385][ T4439] ? kobject_uevent_env+0x387/0x101d [ 632.492680][ T4439] ? rcu_read_lock_sched_held+0x110/0x130 [ 632.498397][ T4439] ? kobject_get_path+0xc4/0x1b0 [ 632.503338][ T4439] kobject_get_path+0xc4/0x1b0 [ 632.508110][ T4439] kobject_uevent_env+0x3ab/0x101d [ 632.513224][ T4439] ? kasan_check_write+0x14/0x20 [ 632.518160][ T4439] ? up_write+0xbe/0x1e0 [ 632.522493][ T4439] kobject_uevent+0x20/0x26 [ 632.526997][ T4439] lo_ioctl+0x11a4/0x2320 [ 632.531329][ T4439] ? lo_rw_aio+0x1120/0x1120 [ 632.535917][ T4439] blkdev_ioctl+0xece/0x1c10 [ 632.540514][ T4439] ? blkpg_ioctl+0xa90/0xa90 [ 632.545281][ T4439] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 632.551270][ T4439] ? __fget+0x35a/0x550 [ 632.555432][ T4439] block_ioctl+0xee/0x130 [ 632.559758][ T4439] ? blkdev_fallocate+0x410/0x410 [ 632.564783][ T4439] do_vfs_ioctl+0xdb6/0x13e0 [ 632.570604][ T4439] ? ioctl_preallocate+0x210/0x210 [ 632.575798][ T4439] ? __fget+0x381/0x550 [ 632.580051][ T4439] ? ksys_dup3+0x3e0/0x3e0 [ 632.584572][ T4439] ? tomoyo_file_ioctl+0x23/0x30 [ 632.589516][ T4439] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 632.595762][ T4439] ? security_file_ioctl+0x8d/0xc0 [ 632.600873][ T4439] ksys_ioctl+0xab/0xd0 [ 632.605117][ T4439] __x64_sys_ioctl+0x73/0xb0 [ 632.609994][ T4439] do_syscall_64+0xfd/0x680 [ 632.614509][ T4439] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 632.620403][ T4439] RIP: 0033:0x4590e7 [ 632.624385][ T4439] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 632.643998][ T4439] RSP: 002b:00007f34331e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 632.652410][ T4439] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004590e7 [ 632.660393][ T4439] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 23:07:49 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2b00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 632.668452][ T4439] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 632.676417][ T4439] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 632.684748][ T4439] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:07:49 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r1, 0xc01064b5, &(0x7f0000000200)={&(0x7f0000000000)=[0x0], 0x1}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r1, 0xb, 0xd9, 0x3, 0x1f}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000100)={0x200, 0x3f, 0x1, 0x9e9, 0x3, [{0xfff, 0x5, 0x5, 0x0, 0x0, 0x1004}, {0x4, 0x9ee7, 0x6, 0x0, 0x0, 0xa00}, {0x3, 0x6, 0xdc1b, 0x0, 0x0, 0x8}]}) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f0000000740)) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r2, 0xc01064b5, &(0x7f0000000280)={&(0x7f0000000240)=[0x0, 0x0], 0x2}) 23:07:49 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xffffdd86]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:49 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x89ffffff00000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:49 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2c00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 632.788554][ T4447] hfsplus: unable to find HFS+ superblock 23:07:49 executing program 1 (fault-call:0 fault-nth:31): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:07:49 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xff00000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:49 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xfffff000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:49 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2f00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 632.911281][ T4460] hfsplus: unable to find HFS+ superblock 23:07:49 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) ioctl$int_in(r0, 0x5473, &(0x7f0000000080)=0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) ioctl$int_in(r1, 0x5452, &(0x7f0000000040)=0x6bb4) 23:07:50 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xfffffffffffff000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:50 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 633.011614][ T4465] FAULT_INJECTION: forcing a failure. [ 633.011614][ T4465] name failslab, interval 1, probability 0, space 0, times 0 [ 633.049329][ T4465] CPU: 0 PID: 4465 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 633.058452][ T4465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 633.068525][ T4465] Call Trace: [ 633.071829][ T4465] dump_stack+0x172/0x1f0 [ 633.076175][ T4465] should_fail.cold+0xa/0x15 [ 633.080771][ T4465] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 633.086580][ T4465] ? ___might_sleep+0x163/0x280 [ 633.091438][ T4465] __should_failslab+0x121/0x190 [ 633.096374][ T4465] should_failslab+0x9/0x14 [ 633.100871][ T4465] kmem_cache_alloc_node+0x261/0x700 [ 633.106156][ T4465] ? find_held_lock+0x35/0x130 [ 633.111009][ T4465] __alloc_skb+0xd5/0x5e0 [ 633.115339][ T4465] ? skb_trim+0x190/0x190 [ 633.119765][ T4465] ? kasan_check_read+0x11/0x20 [ 633.124622][ T4465] alloc_uevent_skb+0x83/0x1e2 [ 633.129392][ T4465] kobject_uevent_env+0xaa3/0x101d [ 633.134523][ T4465] kobject_uevent+0x20/0x26 [ 633.139029][ T4465] lo_ioctl+0x11a4/0x2320 [ 633.143359][ T4465] ? lo_rw_aio+0x1120/0x1120 [ 633.147948][ T4465] blkdev_ioctl+0xece/0x1c10 [ 633.152548][ T4465] ? blkpg_ioctl+0xa90/0xa90 [ 633.157137][ T4465] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 633.162951][ T4465] ? __fget+0x35a/0x550 [ 633.167115][ T4465] block_ioctl+0xee/0x130 [ 633.171442][ T4465] ? blkdev_fallocate+0x410/0x410 [ 633.176468][ T4465] do_vfs_ioctl+0xdb6/0x13e0 [ 633.181059][ T4465] ? ioctl_preallocate+0x210/0x210 [ 633.186163][ T4465] ? __fget+0x381/0x550 [ 633.190321][ T4465] ? ksys_dup3+0x3e0/0x3e0 [ 633.194747][ T4465] ? tomoyo_file_ioctl+0x23/0x30 [ 633.199690][ T4465] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 633.205927][ T4465] ? security_file_ioctl+0x8d/0xc0 [ 633.211042][ T4465] ksys_ioctl+0xab/0xd0 [ 633.215205][ T4465] __x64_sys_ioctl+0x73/0xb0 [ 633.219799][ T4465] do_syscall_64+0xfd/0x680 [ 633.224308][ T4465] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 633.230264][ T4465] RIP: 0033:0x4590e7 [ 633.234163][ T4465] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 633.253793][ T4465] RSP: 002b:00007f34331e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 633.262204][ T4465] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004590e7 [ 633.270260][ T4465] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 633.278228][ T4465] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 633.286195][ T4465] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 633.294168][ T4465] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:07:50 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xffffff89]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:50 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x3580]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:50 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) r2 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x1000, 0x303140) ioctl$UI_SET_MSCBIT(r2, 0x40045568, 0x35) 23:07:50 executing program 1 (fault-call:0 fault-nth:32): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:07:50 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 633.462528][ T4481] hfsplus: unable to find HFS+ superblock 23:07:50 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xf0ffffffffffff]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:50 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x3c00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 633.534024][ T4490] hfsplus: unable to find HFS+ superblock 23:07:50 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x3, &(0x7f0000000700)="912e9b") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) connect$unix(r1, &(0x7f0000000040)=@abs={0x0, 0x0, 0x4e24}, 0x6e) 23:07:50 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 633.594270][ T4495] FAULT_INJECTION: forcing a failure. [ 633.594270][ T4495] name failslab, interval 1, probability 0, space 0, times 0 [ 633.636795][ T4495] CPU: 0 PID: 4495 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 633.645814][ T4495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 633.655876][ T4495] Call Trace: [ 633.659153][ T4495] dump_stack+0x172/0x1f0 [ 633.663467][ T4495] should_fail.cold+0xa/0x15 [ 633.668146][ T4495] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 633.673955][ T4495] ? ___might_sleep+0x163/0x280 [ 633.678793][ T4495] __should_failslab+0x121/0x190 [ 633.683712][ T4495] should_failslab+0x9/0x14 [ 633.688208][ T4495] __kmalloc+0x2d9/0x740 [ 633.692597][ T4495] ? kobject_uevent_env+0x387/0x101d [ 633.697954][ T4495] ? rcu_read_lock_sched_held+0x110/0x130 [ 633.703653][ T4495] ? kobject_get_path+0xc4/0x1b0 [ 633.708590][ T4495] kobject_get_path+0xc4/0x1b0 [ 633.713527][ T4495] kobject_uevent_env+0x3ab/0x101d [ 633.718989][ T4495] ? kasan_check_write+0x14/0x20 [ 633.723918][ T4495] ? up_write+0xbe/0x1e0 [ 633.728167][ T4495] kobject_uevent+0x20/0x26 [ 633.732921][ T4495] lo_ioctl+0x11a4/0x2320 [ 633.737238][ T4495] ? lo_rw_aio+0x1120/0x1120 [ 633.741829][ T4495] blkdev_ioctl+0xece/0x1c10 [ 633.746415][ T4495] ? blkpg_ioctl+0xa90/0xa90 [ 633.750998][ T4495] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 633.756789][ T4495] ? __fget+0x35a/0x550 [ 633.760924][ T4495] block_ioctl+0xee/0x130 [ 633.765228][ T4495] ? blkdev_fallocate+0x410/0x410 [ 633.770232][ T4495] do_vfs_ioctl+0xdb6/0x13e0 [ 633.774821][ T4495] ? ioctl_preallocate+0x210/0x210 [ 633.780103][ T4495] ? __fget+0x381/0x550 [ 633.784242][ T4495] ? ksys_dup3+0x3e0/0x3e0 [ 633.788652][ T4495] ? do_sys_open+0x31d/0x5d0 [ 633.793235][ T4495] ? tomoyo_file_ioctl+0x23/0x30 [ 633.798174][ T4495] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 633.804410][ T4495] ? security_file_ioctl+0x8d/0xc0 [ 633.809619][ T4495] ksys_ioctl+0xab/0xd0 [ 633.813769][ T4495] __x64_sys_ioctl+0x73/0xb0 [ 633.818368][ T4495] do_syscall_64+0xfd/0x680 [ 633.822855][ T4495] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 633.828730][ T4495] RIP: 0033:0x4590e7 [ 633.832617][ T4495] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 633.852203][ T4495] RSP: 002b:00007f34331e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 633.860605][ T4495] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004590e7 [ 633.868655][ T4495] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 633.876618][ T4495] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 23:07:50 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x4]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:50 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x100000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 633.884576][ T4495] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 633.892534][ T4495] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:07:50 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x6]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:50 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x10) 23:07:50 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x3f00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:50 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x200000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:51 executing program 1 (fault-call:0 fault-nth:33): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 633.998480][ T4507] hfsplus: unable to find HFS+ superblock [ 634.111550][ T4513] hfsplus: unable to find HFS+ superblock 23:07:51 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x4000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:51 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x8]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:51 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x400000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:51 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 634.206367][ T4521] FAULT_INJECTION: forcing a failure. [ 634.206367][ T4521] name failslab, interval 1, probability 0, space 0, times 0 [ 634.249659][ T4521] CPU: 0 PID: 4521 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 634.258648][ T4521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 634.268700][ T4521] Call Trace: [ 634.271994][ T4521] dump_stack+0x172/0x1f0 [ 634.276341][ T4521] should_fail.cold+0xa/0x15 [ 634.280938][ T4521] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 634.286749][ T4521] ? ___might_sleep+0x163/0x280 [ 634.291607][ T4521] __should_failslab+0x121/0x190 [ 634.296552][ T4521] should_failslab+0x9/0x14 [ 634.301052][ T4521] __kmalloc+0x2d9/0x740 [ 634.305297][ T4521] ? kobject_uevent_env+0x387/0x101d [ 634.310585][ T4521] ? rcu_read_lock_sched_held+0x110/0x130 [ 634.316306][ T4521] ? kobject_get_path+0xc4/0x1b0 [ 634.321340][ T4521] kobject_get_path+0xc4/0x1b0 [ 634.326110][ T4521] kobject_uevent_env+0x3ab/0x101d [ 634.331222][ T4521] ? kasan_check_write+0x14/0x20 [ 634.336159][ T4521] ? up_write+0xbe/0x1e0 [ 634.340573][ T4521] kobject_uevent+0x20/0x26 [ 634.345084][ T4521] lo_ioctl+0x11a4/0x2320 [ 634.349415][ T4521] ? lo_rw_aio+0x1120/0x1120 [ 634.354016][ T4521] blkdev_ioctl+0xece/0x1c10 [ 634.358605][ T4521] ? blkpg_ioctl+0xa90/0xa90 [ 634.363206][ T4521] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 634.370850][ T4521] ? __fget+0x35a/0x550 [ 634.375216][ T4521] block_ioctl+0xee/0x130 [ 634.379634][ T4521] ? blkdev_fallocate+0x410/0x410 [ 634.384921][ T4521] do_vfs_ioctl+0xdb6/0x13e0 [ 634.389517][ T4521] ? ioctl_preallocate+0x210/0x210 [ 634.394627][ T4521] ? __fget+0x381/0x550 [ 634.398787][ T4521] ? ksys_dup3+0x3e0/0x3e0 [ 634.403291][ T4521] ? do_sys_open+0x31d/0x5d0 [ 634.407887][ T4521] ? tomoyo_file_ioctl+0x23/0x30 [ 634.412822][ T4521] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 634.419410][ T4521] ? security_file_ioctl+0x8d/0xc0 [ 634.424532][ T4521] ksys_ioctl+0xab/0xd0 [ 634.428690][ T4521] __x64_sys_ioctl+0x73/0xb0 [ 634.433373][ T4521] do_syscall_64+0xfd/0x680 [ 634.437894][ T4521] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 634.443777][ T4521] RIP: 0033:0x4590e7 [ 634.447673][ T4521] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 634.467276][ T4521] RSP: 002b:00007f34331e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 634.475694][ T4521] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004590e7 [ 634.483663][ T4521] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 634.491630][ T4521] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 23:07:51 executing program 3: r0 = socket$inet(0x2b, 0x3, 0x1) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x40000, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndmidi(&(0x7f0000000080)='/dev/snd/midiC#D#\x00', 0x9, 0x10040) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) [ 634.499603][ T4521] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 634.507573][ T4521] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:07:51 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xd]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:51 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x4305]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 634.602999][ T4533] hfsplus: unable to find HFS+ superblock 23:07:51 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x600000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:51 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000240)={0x0, 0x102000001}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000000c0)={r1, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x25}}}, 0x4, 0x1}, 0x90) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x81, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f00000001c0)={0x0}) ioctl$DRM_IOCTL_LOCK(r3, 0x4008642a, &(0x7f0000000200)={r4, 0x4}) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:51 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x28]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:51 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\xc0', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:51 executing program 1 (fault-call:0 fault-nth:34): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:07:51 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x4788]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 634.793267][ T4542] Unknown ioctl 1074291754 23:07:51 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x800000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 634.832053][ T4550] Unknown ioctl -1073191904 [ 634.852233][ T4551] Unknown ioctl 1074291754 23:07:51 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x29]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 634.890679][ T4555] FAULT_INJECTION: forcing a failure. [ 634.890679][ T4555] name failslab, interval 1, probability 0, space 0, times 0 [ 634.930152][ T4555] CPU: 0 PID: 4555 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 634.939145][ T4555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 634.939152][ T4555] Call Trace: [ 634.939174][ T4555] dump_stack+0x172/0x1f0 [ 634.939201][ T4555] should_fail.cold+0xa/0x15 [ 634.961441][ T4555] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 634.961460][ T4555] ? ___might_sleep+0x163/0x280 [ 634.961481][ T4555] __should_failslab+0x121/0x190 [ 634.977024][ T4555] should_failslab+0x9/0x14 [ 634.981524][ T4555] kmem_cache_alloc+0x2af/0x6f0 [ 634.981537][ T4555] ? __d_lookup+0x433/0x760 [ 634.981555][ T4555] ? lookup_dcache+0x23/0x140 [ 634.990875][ T4555] ? d_lookup+0xf9/0x260 [ 634.990893][ T4555] ? lockdep_hardirqs_on+0x418/0x5d0 [ 634.990912][ T4555] __d_alloc+0x2e/0x8c0 [ 635.009291][ T4555] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 635.015016][ T4555] d_alloc+0x4d/0x280 [ 635.019009][ T4555] __lookup_hash+0xcd/0x190 [ 635.023517][ T4555] ? kasan_check_write+0x14/0x20 [ 635.028458][ T4555] filename_create+0x1a7/0x4f0 [ 635.033223][ T4555] ? kern_path_mountpoint+0x40/0x40 [ 635.038435][ T4555] ? strncpy_from_user+0x2b4/0x400 [ 635.043560][ T4555] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 635.049802][ T4555] ? getname_flags+0x277/0x5b0 [ 635.054570][ T4555] do_mkdirat+0xb5/0x2a0 [ 635.058822][ T4555] ? __ia32_sys_mknod+0xb0/0xb0 [ 635.063674][ T4555] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 635.069170][ T4555] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 635.075235][ T4555] ? do_syscall_64+0x26/0x680 [ 635.079912][ T4555] ? lockdep_hardirqs_on+0x418/0x5d0 [ 635.085202][ T4555] __x64_sys_mkdir+0x5c/0x80 23:07:52 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f00000000c0)=0x5) r1 = socket$inet(0x2b, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r3 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r5, &(0x7f0000000000)=0x100000, 0x100000008001) connect$inet(r1, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) [ 635.089796][ T4555] do_syscall_64+0xfd/0x680 [ 635.094305][ T4555] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 635.100202][ T4555] RIP: 0033:0x458697 [ 635.104103][ T4555] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 635.123791][ T4555] RSP: 002b:00007f34331e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 635.123805][ T4555] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458697 23:07:52 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 635.123812][ T4555] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 635.123819][ T4555] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 635.123825][ T4555] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 635.123833][ T4555] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:07:52 executing program 1 (fault-call:0 fault-nth:35): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:07:52 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x4888]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:52 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x806000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:52 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2b]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 635.265996][ T4567] hfsplus: unable to find HFS+ superblock 23:07:52 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x6488]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:52 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xd00000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 635.385220][ T4575] FAULT_INJECTION: forcing a failure. [ 635.385220][ T4575] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 635.398814][ T4575] CPU: 0 PID: 4575 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 635.407752][ T4575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 635.417899][ T4575] Call Trace: [ 635.417923][ T4575] dump_stack+0x172/0x1f0 [ 635.417944][ T4575] should_fail.cold+0xa/0x15 [ 635.417962][ T4575] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 635.417984][ T4575] should_fail_alloc_page+0x50/0x60 [ 635.425669][ T4575] __alloc_pages_nodemask+0x1a1/0x8d0 [ 635.425681][ T4575] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 635.425697][ T4575] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 635.425708][ T4575] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 635.425721][ T4575] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 635.425741][ T4575] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 635.425760][ T4575] cache_grow_begin+0x9d/0x650 23:07:52 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x7, 0x220402) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25ADDUID(r1, 0x89e1, &(0x7f0000000140)={0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, r3}) [ 635.425772][ T4575] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 635.425789][ T4575] kmem_cache_alloc+0x628/0x6f0 [ 635.491802][ T4575] ? __fget+0x381/0x550 [ 635.496062][ T4575] getname_flags+0xd6/0x5b0 [ 635.500569][ T4575] do_mkdirat+0xa0/0x2a0 [ 635.504817][ T4575] ? __ia32_sys_mknod+0xb0/0xb0 [ 635.509779][ T4575] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 635.515258][ T4575] ? do_syscall_64+0x26/0x680 [ 635.518736][ T4576] hfsplus: unable to find HFS+ superblock [ 635.519942][ T4575] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 635.519965][ T4575] ? do_syscall_64+0x26/0x680 [ 635.536440][ T4575] ? lockdep_hardirqs_on+0x418/0x5d0 [ 635.541739][ T4575] __x64_sys_mkdir+0x5c/0x80 [ 635.546336][ T4575] do_syscall_64+0xfd/0x680 [ 635.546356][ T4575] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 635.546365][ T4575] RIP: 0033:0x458697 [ 635.546379][ T4575] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 23:07:52 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) r2 = dup(r0) ioctl$KVM_GET_API_VERSION(r2, 0xae00, 0x0) 23:07:52 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2c]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 635.546391][ T4575] RSP: 002b:00007f34331e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 635.546403][ T4575] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458697 [ 635.546411][ T4575] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 635.546418][ T4575] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 635.546430][ T4575] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 635.580495][ T4575] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:07:52 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:52 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2800000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:52 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$can_bcm(0x1d, 0x2, 0x2) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:52 executing program 1 (fault-call:0 fault-nth:36): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:07:52 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2f]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:52 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x6c00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:52 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2900000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:52 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x800e]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 635.924650][ T4606] FAULT_INJECTION: forcing a failure. [ 635.924650][ T4606] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 635.937909][ T4606] CPU: 0 PID: 4606 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 635.946851][ T4606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 635.956914][ T4606] Call Trace: [ 635.960215][ T4606] dump_stack+0x172/0x1f0 [ 635.964721][ T4606] should_fail.cold+0xa/0x15 [ 635.964747][ T4606] ? fault_create_debugfs_attr+0x1e0/0x1e0 23:07:52 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2b00000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 635.975148][ T4606] should_fail_alloc_page+0x50/0x60 [ 635.980366][ T4606] __alloc_pages_nodemask+0x1a1/0x8d0 [ 635.985757][ T4606] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 635.991414][ T4606] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 635.997147][ T4606] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 636.002971][ T4606] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 636.009230][ T4606] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 636.009251][ T4606] cache_grow_begin+0x9d/0x650 [ 636.009266][ T4606] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 636.009281][ T4606] kmem_cache_alloc+0x628/0x6f0 [ 636.009298][ T4606] ? __fget+0x381/0x550 [ 636.035333][ T4606] getname_flags+0xd6/0x5b0 [ 636.039856][ T4606] do_mkdirat+0xa0/0x2a0 [ 636.044105][ T4606] ? __ia32_sys_mknod+0xb0/0xb0 [ 636.048963][ T4606] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 636.054524][ T4606] ? do_syscall_64+0x26/0x680 [ 636.059208][ T4606] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 636.059232][ T4606] ? do_syscall_64+0x26/0x680 [ 636.070304][ T4606] ? lockdep_hardirqs_on+0x418/0x5d0 23:07:52 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000700)="0adc1f123c123f319bd070") r2 = syz_open_dev$admmidi(&(0x7f0000002cc0)='/dev/admmidi#\x00', 0x0, 0x410000) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000002c40)='/dev/dlm-control\x00', 0x4002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000002c80)={0x4f9, 0x8ecc, 0x100000000, 0x4, 0x7f}, 0x14) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000640)={0x0, @in6={{0xa, 0x4e24, 0x5, @remote, 0x9}}, 0x5, 0xfffffffffffffad1, 0x1f, 0x5, 0x84}, &(0x7f0000002740)=0x98) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000002780)={0x0, @in6={{0xa, 0x4e24, 0x4, @ipv4={[], [], @empty}, 0x7fff}}}, &(0x7f0000002840)=0x84) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000002a80)={0x0, 0x4ffffffff}, &(0x7f0000002ac0)=0x8) ioctl$SIOCX25SFACILITIES(r2, 0x89e3, &(0x7f0000000180)={0x36, 0x8, 0x8, 0x7, 0x520}) sendmmsg$inet_sctp(r0, &(0x7f0000002bc0)=[{&(0x7f0000000040)=@in={0x2, 0x4e21, @multicast2}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000740)="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", 0x1000}, {&(0x7f0000001740)="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", 0x1000}, {&(0x7f0000000080)="80731b944aefb20fe295a5a51104337f182263078f357bd9b4d6f839c58ef4f3374923aaa6435a03e023e9212ae681c76cd61cb90f9ca446cef486bdda103324ec84e71f1b136073e400ff496720f720a3cfbc696e7e295c897fcc59a5ab67a66d25e4816e458e97480730561489368db3ce99c1f6d2fa441d2a4521caa7cf4e70bad94c1e55e8b37c9039ee0efac7bbe2e02ff3dd2e8294ef6a409b6bb0c7dca321eeddc55f9a5b936d240060a1605ca21037c4ea157fe9879bf8d4286a7f5241cbb578fd081711f87f15f1627f8d45a0b365f12fc80502774f4e37ce60e9b685354dd506ff2388522d58", 0xeb}, {&(0x7f0000002f40)="c63ad8cd263800bc022642d239a11782601fccdcdacce71dd7934bf3259093fa2e174639959c43902091a9f8c0934dc9d8d4ff7150f4edd4694d5d38bb7cbdbb053df90f30f2f3eb9e8d0d737fcc10f4d3558aeb356bc1de7f78ad20d16cd0945780215299081fbead7155c162a7e93bbd166010106e55572af718fb3151ba6bb5d09f5776b99303713fa95ca0798560a3eb9e9b7091dc236b3a99e8f6cbc559243388382a0f", 0xa6}, {&(0x7f0000000240)="89762aef44483b60ddc6754970f86a224e9d5e92b9bcc7619eb930688965917f1c2b16201ebe4c953d1c85992cc87640d63270ec05f2054e05afaa827d8d6294566d3686619f53ea0e515dc12a831da6cbce34bab4e69ebaa6e937267da3bcf9c56da5a83e1dd4843bb66837a5eb234190dc2ec4c20060c6b339872ea42245d598a2e85e", 0x84}, {&(0x7f0000000340)="3ee4da0cc1bc1311402c075f2f3889d08d2ea8ab4ce663484befa7824f9f01535a999d1a93df55b014f9878fb5c6b502dcecd5720d3fdea3936aa37703beb77280d7f43de7e3f8d1ce8f06fa6774ac1cbbd539c417a0a4d130dfce1134f6e0ae5fed19c2011cfced065263937eca60062810c1ba54802d806a392e1fa6d1dbf87d10b870574623e1ad698a75745664405c03ad82dfb7ef22c6accd6ab73865246ecec49eb1d6", 0xa6}, {&(0x7f0000000300)="c8235c6d35a8f4d9480bb64790ffc2ba5e007891b6adc254bfc088f7a0d2751511e6a724955b670fcc", 0x29}, {&(0x7f0000000440)="9f5805b296350fd02664ad7a5dc7d814ebdc3d178c3392a609e07d30264cee2d21bb6b0cc92bd402ec2c80b3077eee002cac3a57cd17b7dac1a779ecde9840fdf1841814b87c5597fd9972871264f581", 0x50}, {&(0x7f0000002e00)="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", 0x10f}], 0x9, &(0x7f0000002d40)=[@sndinfo={0x20, 0x84, 0x2, {0x2, 0x8000, 0x3, 0x3, r4}}, @authinfo={0x18, 0x84, 0x6, {0x9}}, @dstaddrv6={0x20, 0x84, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @dstaddrv6={0x20, 0x84, 0x8, @remote}, @sndrcv={0x30, 0x84, 0x1, {0x10001, 0x842e, 0x8000, 0x1000, 0xffffffffffffde61, 0x10000, 0x8, 0x1, r5}}], 0xa8, 0x20000040}, {&(0x7f0000002940)=@in6={0xa, 0x4e24, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x6da}, 0x1c, &(0x7f0000002a40)=[{&(0x7f0000002980)="9403a47ba915909b203225093603b9f2179c8f5dbe43e9e5096ddc", 0x1b}, {&(0x7f00000029c0)="48d26059fd9261ca7a4df790822b5e950640f9e8f0dcf59d2003080ecf27565433e0939767a38f37f9be5da03238fc75a31ea42b73edc91e4f8de2ae4d5030bc5988c18902b02c50ad2dc0f15820efe16bd02721baac012eb15c940fd23f06316ea6257da0118959582fbdc603f3751ab8", 0x71}], 0x2, &(0x7f0000002b00)=[@sndrcv={0x30, 0x84, 0x1, {0x28, 0x8, 0x2, 0xfb55, 0x100000001, 0x9, 0x10000, 0x3}}, @dstaddrv4={0x18, 0x84, 0x7, @local}, @sndrcv={0x30, 0x84, 0x1, {0x9, 0x3, 0x8009, 0x1, 0x8, 0x80000000, 0x8, 0x8, r6}}, @dstaddrv6={0x20, 0x84, 0x8, @local}], 0x98, 0x10}], 0x2, 0x4004000) connect$inet(r1, &(0x7f0000000400)={0x2, 0x4e23, @empty}, 0xffffffffffffff0d) 23:07:53 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x3c]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 636.075611][ T4606] __x64_sys_mkdir+0x5c/0x80 [ 636.080212][ T4606] do_syscall_64+0xfd/0x680 [ 636.084733][ T4606] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 636.090640][ T4606] RIP: 0033:0x458697 [ 636.094537][ T4606] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 636.094545][ T4606] RSP: 002b:00007f34331e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 23:07:53 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x410480, 0x0) write$eventfd(r0, &(0x7f0000000140)=0xef, 0x8) r1 = socket$inet(0x2b, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r1, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) r3 = fcntl$dupfd(r1, 0x406, r2) ioctl$VIDIOC_G_DV_TIMINGS(r3, 0xc0845658, &(0x7f0000000040)={0x0, @bt={0x2, 0x5, 0x1, 0x2, 0x0, 0x100000001, 0x1f, 0x3f, 0x5, 0x101, 0xff, 0x0, 0xffffffffffffff69, 0x0, 0x1, 0x2}}) [ 636.115598][ T4603] hfsplus: unable to find HFS+ superblock [ 636.122566][ T4606] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458697 [ 636.122574][ T4606] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 636.122582][ T4606] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 636.122590][ T4606] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 636.122598][ T4606] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 [ 636.301835][ T4622] hfsplus: unable to find HFS+ superblock 23:07:53 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:53 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2c00000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:53 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8035]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:53 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x6c]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:53 executing program 1 (fault-call:0 fault-nth:37): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:07:53 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x6, 0x6, &(0x7f0000000500)=[{&(0x7f00000000c0)="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", 0xfd, 0xffffffffffffffff}, {&(0x7f00000001c0)="7ea6a4ca5772bd9665ac17edfb939bb9dd7046be01cf6c999598e9386ce1d5bd75961afc83a5559fc09d2a19c4b8dff1e982cf629840636863b64293d2757645b393e43df985793a02ae74226fec7c7d2a8e7298e2d2ed8f4dbf76f2195134d984e209a5dce8be3f8c30e71b8f4485f65b4148c570a112956d5b9fbc2d18c3d93ed34382db8cc4d57973dd813722e13155c03185554b646fc7bbb95226f509", 0x9f, 0x4}, {&(0x7f0000000340)="cc86d3601d190b67a76dd03d417e41461c0ff5126ce54fbd5d69c00770413900e9bd6cbb8f77ac70d1cbcb5f483414d059a94caaa4cd6691d2a18c822b0ccd25568c04da4575c662d17d00328e876bcf5a700427110931e6fca52553f69f5feef6d05a7617b39a5a42e2d7950d404c1dfad5e7d4c9b85d2a1f4cdf6508716a4d74b174413a3194216042b42cf03539db4c5bd5216af38420f48ddee3de13bc128f156f0db71126a907ccfedd6d2e588edd301bff4b65dd22c6cd898d766781c564a8d63efd60d78fc052f08b57391a46e421a2a02906", 0xd6, 0x5}, {&(0x7f0000000280)="0a3b9d", 0x3, 0x400}, {&(0x7f00000002c0)="8a5278c7592a8a35f3b6fcf6ea87173f5cefec0c35dd630a626d362270b1db9d296c4878abe02a08f31fb5", 0x2b, 0x1}, {&(0x7f0000000440)="3a77d9009f7c67a5c33afd295111a8a0d94e8f06009a005bfa8412adc7b25355ff005ab7e4195da19996b9e9e213f81e0d6228ff1438fc61f306948f2f199d53421664201983f1d891eb9b2922ffc1e27675a5c77dc86e8b6b27bc22823ba6834324c01cde8e5be0e300506aa2dbf9229a2d64384be8d74c70d9e05819395c1cd51b8f1abfe9b1134caf8ec1f2274bcef4d4a36ad49b2e996ba3eb3bb2498572a2", 0xa1, 0x4}], 0x920000, &(0x7f0000000740)={[{@barrier='barrier'}, {@noloccookie='noloccookie'}, {@localcaching='localcaching'}, {@noloccookie='noloccookie'}, {@quota_on='quota=on'}, {@quota_account='quota=account'}, {@localflocks='localflocks'}], [{@appraise='appraise'}, {@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fowner_gt={'fowner>', r2}}]}) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:53 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2f00000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:53 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xf0]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 636.440218][ T4634] FAULT_INJECTION: forcing a failure. [ 636.440218][ T4634] name failslab, interval 1, probability 0, space 0, times 0 [ 636.469205][ T4634] CPU: 0 PID: 4634 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 636.478185][ T4634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 23:07:53 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8100]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 636.478199][ T4634] Call Trace: [ 636.491584][ T4634] dump_stack+0x172/0x1f0 [ 636.495928][ T4634] should_fail.cold+0xa/0x15 [ 636.500532][ T4634] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 636.506358][ T4634] ? ___might_sleep+0x163/0x280 [ 636.506377][ T4634] __should_failslab+0x121/0x190 [ 636.506392][ T4634] ? ratelimit_state_init+0xb0/0xb0 [ 636.506404][ T4634] should_failslab+0x9/0x14 [ 636.506416][ T4634] kmem_cache_alloc+0x2af/0x6f0 [ 636.506431][ T4634] ? tomoyo_path_number_perm+0x214/0x520 [ 636.506446][ T4634] ? kfree+0x170/0x220 [ 636.506460][ T4634] ? ratelimit_state_init+0xb0/0xb0 [ 636.506474][ T4634] ext4_alloc_inode+0x1f/0x640 [ 636.506486][ T4634] ? ratelimit_state_init+0xb0/0xb0 [ 636.506505][ T4634] alloc_inode+0x68/0x1e0 [ 636.559956][ T4634] new_inode_pseudo+0x19/0xf0 [ 636.564643][ T4634] new_inode+0x1f/0x40 [ 636.564658][ T4634] __ext4_new_inode+0x377/0x5440 [ 636.564678][ T4634] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 636.564700][ T4634] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 636.564719][ T4634] ? __dquot_initialize+0x525/0xd80 [ 636.573821][ T4634] ? ext4_free_inode+0x1450/0x1450 [ 636.585838][ T4634] ? dqget+0x10c0/0x10c0 [ 636.585869][ T4634] ext4_mkdir+0x3d5/0xdf0 [ 636.585894][ T4634] ? ext4_init_dot_dotdot+0x520/0x520 [ 636.585909][ T4634] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 636.585922][ T4634] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 636.585937][ T4634] ? security_inode_permission+0xcb/0x100 [ 636.585952][ T4634] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 636.585969][ T4634] ? security_inode_mkdir+0xe4/0x120 [ 636.585987][ T4634] vfs_mkdir+0x42e/0x670 [ 636.586006][ T4634] do_mkdirat+0x234/0x2a0 [ 636.600517][ T4634] ? __ia32_sys_mknod+0xb0/0xb0 [ 636.600535][ T4634] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 636.600553][ T4634] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 636.600570][ T4634] ? do_syscall_64+0x26/0x680 [ 636.616472][ T4634] ? lockdep_hardirqs_on+0x418/0x5d0 [ 636.616495][ T4634] __x64_sys_mkdir+0x5c/0x80 [ 636.616514][ T4634] do_syscall_64+0xfd/0x680 [ 636.616535][ T4634] entry_SYSCALL_64_after_hwframe+0x49/0xbe 23:07:53 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x543]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:53 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8847]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:53 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x440, 0x0) read$FUSE(r2, &(0x7f0000000740), 0x1000) [ 636.616546][ T4634] RIP: 0033:0x458697 [ 636.616561][ T4634] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 636.616567][ T4634] RSP: 002b:00007f34331e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 636.616581][ T4634] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458697 [ 636.616589][ T4634] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 636.616597][ T4634] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 636.616605][ T4634] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 636.616612][ T4634] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 [ 636.808942][ T4641] hfsplus: unable to find HFS+ superblock [ 636.905770][ T4653] hfsplus: unable to find HFS+ superblock 23:07:53 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:53 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x3c00000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:53 executing program 1 (fault-call:0 fault-nth:38): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:07:53 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8848]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:53 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x600]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:53 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x608]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:54 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8864]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:54 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x4000000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 637.054470][ T4662] FAULT_INJECTION: forcing a failure. [ 637.054470][ T4662] name failslab, interval 1, probability 0, space 0, times 0 [ 637.111183][ T4662] CPU: 0 PID: 4662 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 637.120164][ T4662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 637.120170][ T4662] Call Trace: [ 637.120193][ T4662] dump_stack+0x172/0x1f0 [ 637.120218][ T4662] should_fail.cold+0xa/0x15 [ 637.120239][ T4662] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 637.133584][ T4662] ? ___might_sleep+0x163/0x280 [ 637.133607][ T4662] __should_failslab+0x121/0x190 [ 637.133622][ T4662] should_failslab+0x9/0x14 [ 637.133640][ T4662] kmem_cache_alloc+0x2af/0x6f0 [ 637.173344][ T4662] ? __d_lookup+0x433/0x760 [ 637.177870][ T4662] ? lookup_dcache+0x23/0x140 [ 637.182562][ T4662] ? d_lookup+0xf9/0x260 [ 637.186814][ T4662] ? lockdep_hardirqs_on+0x418/0x5d0 [ 637.192203][ T4662] __d_alloc+0x2e/0x8c0 [ 637.196365][ T4662] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 637.202534][ T4662] d_alloc+0x4d/0x280 [ 637.206529][ T4662] __lookup_hash+0xcd/0x190 [ 637.211211][ T4662] ? kasan_check_write+0x14/0x20 [ 637.216164][ T4662] filename_create+0x1a7/0x4f0 [ 637.220938][ T4662] ? kern_path_mountpoint+0x40/0x40 [ 637.226134][ T4662] ? strncpy_from_user+0x2b4/0x400 [ 637.231255][ T4662] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 637.237690][ T4662] ? getname_flags+0x277/0x5b0 [ 637.242474][ T4662] do_mkdirat+0xb5/0x2a0 [ 637.246913][ T4662] ? __ia32_sys_mknod+0xb0/0xb0 [ 637.251777][ T4662] ? trace_hardirqs_on_thunk+0x1a/0x1c 23:07:54 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x4305000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 637.257252][ T4662] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 637.263333][ T4662] ? do_syscall_64+0x26/0x680 [ 637.268024][ T4662] ? lockdep_hardirqs_on+0x418/0x5d0 [ 637.273328][ T4662] __x64_sys_mkdir+0x5c/0x80 [ 637.277928][ T4662] do_syscall_64+0xfd/0x680 [ 637.282438][ T4662] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 637.288365][ T4662] RIP: 0033:0x458697 [ 637.292269][ T4662] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 23:07:54 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x689]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:54 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8906]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 637.311883][ T4662] RSP: 002b:00007f34331e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 637.320308][ T4662] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458697 [ 637.328297][ T4662] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 637.336277][ T4662] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 637.344266][ T4662] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 637.352252][ T4662] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 [ 637.382303][ T4672] hfsplus: unable to find HFS+ superblock 23:07:54 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x6c00000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 637.469019][ T4672] hfsplus: unable to find HFS+ superblock 23:07:54 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:54 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xf000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:54 executing program 1 (fault-call:0 fault-nth:39): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:07:54 executing program 3: r0 = socket$inet(0x2b, 0x1003, 0x7) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000040)={0x502, 0x6, 0x9, 0x800, 0x7}) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) r2 = open(&(0x7f0000000080)='./file0\x00', 0x80000, 0x100) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) 23:07:54 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x806]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:54 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x800e000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:54 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xff00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:54 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8035000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 637.651837][ T4691] FAULT_INJECTION: forcing a failure. [ 637.651837][ T4691] name failslab, interval 1, probability 0, space 0, times 0 [ 637.693337][ T4691] CPU: 0 PID: 4691 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 637.702314][ T4691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 637.702322][ T4691] Call Trace: [ 637.702345][ T4691] dump_stack+0x172/0x1f0 [ 637.702373][ T4691] should_fail.cold+0xa/0x15 [ 637.724812][ T4691] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 637.730629][ T4691] ? ___might_sleep+0x163/0x280 [ 637.735488][ T4691] __should_failslab+0x121/0x190 23:07:54 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f00000000c0)=0x5) r1 = socket$inet(0x2b, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r3 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r5, &(0x7f0000000000)=0x100000, 0x100000008001) connect$inet(r1, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) [ 637.740430][ T4691] should_failslab+0x9/0x14 [ 637.740445][ T4691] __kmalloc+0x2d9/0x740 [ 637.740462][ T4691] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 637.740480][ T4691] ? d_absolute_path+0x11b/0x170 [ 637.760056][ T4697] hfsplus: unable to find HFS+ superblock [ 637.760438][ T4691] ? __d_path+0x140/0x140 [ 637.760455][ T4691] ? tomoyo_encode2.part.0+0xf5/0x400 [ 637.760474][ T4691] tomoyo_encode2.part.0+0xf5/0x400 [ 637.781053][ T4691] tomoyo_encode+0x2b/0x50 [ 637.785481][ T4691] tomoyo_realpath_from_path+0x1d3/0x7a0 [ 637.791146][ T4691] tomoyo_path_number_perm+0x1dd/0x520 [ 637.796613][ T4691] ? tomoyo_path_number_perm+0x193/0x520 [ 637.802256][ T4691] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 637.808097][ T4691] ? debug_check_no_obj_freed+0x211/0x444 [ 637.813824][ T4691] ? kasan_check_write+0x14/0x20 [ 637.818792][ T4691] ? putname+0xef/0x130 [ 637.822985][ T4691] ? putname+0xef/0x130 [ 637.827139][ T4691] ? putname+0xef/0x130 [ 637.831296][ T4691] ? rcu_read_lock_sched_held+0x110/0x130 [ 637.837012][ T4691] ? kmem_cache_free+0x222/0x260 23:07:54 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xd00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 637.841959][ T4691] tomoyo_path_mkdir+0xaa/0xf0 [ 637.846725][ T4691] ? tomoyo_file_ioctl+0x30/0x30 [ 637.851928][ T4691] ? kern_path_mountpoint+0x40/0x40 [ 637.857152][ T4691] ? strncpy_from_user+0x2b4/0x400 [ 637.862289][ T4691] security_path_mkdir+0x113/0x170 [ 637.867418][ T4691] do_mkdirat+0x160/0x2a0 [ 637.871757][ T4691] ? __ia32_sys_mknod+0xb0/0xb0 [ 637.876610][ T4691] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 637.882072][ T4691] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 637.888139][ T4691] ? do_syscall_64+0x26/0x680 [ 637.892818][ T4691] ? lockdep_hardirqs_on+0x418/0x5d0 [ 637.898112][ T4691] __x64_sys_mkdir+0x5c/0x80 [ 637.902710][ T4691] do_syscall_64+0xfd/0x680 [ 637.907320][ T4691] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 637.913232][ T4691] RIP: 0033:0x458697 [ 637.917332][ T4691] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 637.937028][ T4691] RSP: 002b:00007f34331e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 637.945448][ T4691] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458697 [ 637.953414][ T4691] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 637.961382][ T4691] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 637.969359][ T4691] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 637.977349][ T4691] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 [ 637.993939][ T4691] ERROR: Out of memory at tomoyo_realpath_from_path. 23:07:55 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8100000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 638.056953][ T4701] hfsplus: unable to find HFS+ superblock 23:07:55 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xf0ffff]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:55 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:55 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xe80]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:55 executing program 1 (fault-call:0 fault-nth:40): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:07:55 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x1000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:55 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f00000000c0)=0x5) r1 = socket$inet(0x2b, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r3 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r5, &(0x7f0000000000)=0x100000, 0x100000008001) connect$inet(r1, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:55 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x86ddffff00000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:55 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2800]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 638.299550][ T4716] hfsplus: unable to find HFS+ superblock [ 638.382706][ T4719] FAULT_INJECTION: forcing a failure. [ 638.382706][ T4719] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 638.395945][ T4719] CPU: 0 PID: 4719 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 638.395955][ T4719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 638.395960][ T4719] Call Trace: [ 638.395980][ T4719] dump_stack+0x172/0x1f0 [ 638.396003][ T4719] should_fail.cold+0xa/0x15 [ 638.396028][ T4719] ? is_bpf_text_address+0xac/0x170 23:07:55 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2900]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 638.427198][ T4719] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 638.427217][ T4719] ? is_bpf_text_address+0xac/0x170 [ 638.427243][ T4719] should_fail_alloc_page+0x50/0x60 [ 638.427261][ T4719] __alloc_pages_nodemask+0x1a1/0x8d0 [ 638.443537][ T4719] ? __lock_acquire+0x54f/0x5490 [ 638.459022][ T4719] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 638.464753][ T4719] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 638.464774][ T4719] cache_grow_begin+0x9d/0x650 [ 638.475329][ T4719] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 23:07:55 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2b00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 638.481592][ T4719] __kmalloc+0x67a/0x740 [ 638.485850][ T4719] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 638.485867][ T4719] tomoyo_realpath_from_path+0xcd/0x7a0 [ 638.485880][ T4719] ? tomoyo_path_number_perm+0x193/0x520 [ 638.485900][ T4719] tomoyo_path_number_perm+0x1dd/0x520 [ 638.485917][ T4719] ? tomoyo_path_number_perm+0x193/0x520 [ 638.497164][ T4719] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 638.519770][ T4719] ? debug_check_no_obj_freed+0x211/0x444 [ 638.525866][ T4719] ? kasan_check_write+0x14/0x20 23:07:55 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2c00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 638.530831][ T4719] ? putname+0xef/0x130 [ 638.535097][ T4719] ? putname+0xef/0x130 [ 638.539268][ T4719] ? putname+0xef/0x130 [ 638.543442][ T4719] ? rcu_read_lock_sched_held+0x110/0x130 [ 638.549179][ T4719] ? kmem_cache_free+0x222/0x260 [ 638.554145][ T4719] tomoyo_path_mkdir+0xaa/0xf0 [ 638.558938][ T4719] ? tomoyo_file_ioctl+0x30/0x30 [ 638.563890][ T4719] ? kern_path_mountpoint+0x40/0x40 [ 638.569092][ T4719] ? strncpy_from_user+0x2b4/0x400 [ 638.574228][ T4719] security_path_mkdir+0x113/0x170 [ 638.579361][ T4719] do_mkdirat+0x160/0x2a0 23:07:55 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 638.583717][ T4719] ? __ia32_sys_mknod+0xb0/0xb0 [ 638.588574][ T4719] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 638.594043][ T4719] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 638.600121][ T4719] ? do_syscall_64+0x26/0x680 [ 638.604797][ T4719] ? lockdep_hardirqs_on+0x418/0x5d0 [ 638.604823][ T4719] __x64_sys_mkdir+0x5c/0x80 [ 638.614681][ T4719] do_syscall_64+0xfd/0x680 [ 638.619218][ T4719] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 638.625108][ T4719] RIP: 0033:0x458697 [ 638.625123][ T4719] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 638.625136][ T4719] RSP: 002b:00007f34331e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 638.649066][ T4719] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458697 [ 638.649075][ T4719] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 638.649084][ T4719] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 23:07:55 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x4000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:55 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:55 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8847000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 638.649092][ T4719] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 638.649101][ T4719] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 [ 638.754357][ T4740] hfsplus: unable to find HFS+ superblock 23:07:55 executing program 1 (fault-call:0 fault-nth:41): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:07:55 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8848000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:55 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2f00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:55 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f00000000c0)=0x5) r1 = socket$inet(0x2b, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r3 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r5 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r4, r5, &(0x7f0000000000)=0x100000, 0x100000008001) connect$inet(r1, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:55 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x6000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 638.841949][ T4745] hfsplus: unable to find HFS+ superblock 23:07:55 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:55 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8864000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:55 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x3580]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:55 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 639.017476][ T4758] FAULT_INJECTION: forcing a failure. [ 639.017476][ T4758] name failslab, interval 1, probability 0, space 0, times 0 [ 639.030706][ T4758] CPU: 0 PID: 4758 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 639.039661][ T4758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 639.049726][ T4758] Call Trace: [ 639.053033][ T4758] dump_stack+0x172/0x1f0 [ 639.057387][ T4758] should_fail.cold+0xa/0x15 [ 639.061996][ T4758] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 639.067814][ T4758] ? mark_held_locks+0xf0/0xf0 [ 639.072597][ T4758] ? __es_tree_search.isra.0+0x1bf/0x230 [ 639.078333][ T4758] ? save_stack+0x5c/0x90 [ 639.082938][ T4758] __should_failslab+0x121/0x190 [ 639.087884][ T4758] should_failslab+0x9/0x14 [ 639.092405][ T4758] kmem_cache_alloc+0x47/0x6f0 [ 639.097170][ T4758] ? ext4_es_scan+0x730/0x730 [ 639.097245][ T4758] ? do_raw_write_lock+0x124/0x290 [ 639.107043][ T4758] __es_insert_extent+0x2cc/0xf20 [ 639.112099][ T4758] ext4_es_insert_extent+0x2b7/0xa30 23:07:56 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x88a8ffff00000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 639.112121][ T4758] ? ext4_es_scan_clu+0x50/0x50 [ 639.122245][ T4758] ? rcu_read_lock_sched_held+0x110/0x130 [ 639.128059][ T4758] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 639.134313][ T4758] ? ext4_es_find_extent_range+0xff/0x600 [ 639.140058][ T4758] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 639.145613][ T4758] ? ext4_rereserve_cluster+0x240/0x240 [ 639.151167][ T4758] ? ext4_find_extent+0x76e/0x9d0 [ 639.156266][ T4758] ? ext4_find_extent+0x6a6/0x9d0 [ 639.161328][ T4758] ? vm_alloc_page.constprop.0+0x610/0x610 23:07:56 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8060000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 639.167157][ T4758] ext4_ext_map_blocks+0x20a1/0x5250 [ 639.167171][ T4758] ? mark_held_locks+0xf0/0xf0 [ 639.167196][ T4758] ? ext4_ext_release+0x10/0x10 [ 639.167217][ T4758] ? lock_acquire+0x16f/0x3f0 [ 639.167230][ T4758] ? ext4_map_blocks+0x3fd/0x18e0 [ 639.167250][ T4758] ? kasan_check_write+0x14/0x20 [ 639.183540][ T4764] hfsplus: unable to find HFS+ superblock [ 639.186788][ T4758] ext4_map_blocks+0xec7/0x18e0 [ 639.186812][ T4758] ? ext4_issue_zeroout+0x190/0x190 [ 639.186836][ T4758] ? kasan_check_write+0x14/0x20 [ 639.186851][ T4758] ext4_getblk+0xc4/0x510 [ 639.186868][ T4758] ? ext4_iomap_begin+0xfe0/0xfe0 [ 639.186891][ T4758] ext4_bread+0x8f/0x230 [ 639.186912][ T4758] ? ext4_getblk+0x510/0x510 [ 639.202753][ T4758] ext4_append+0x155/0x370 [ 639.202771][ T4758] ext4_mkdir+0x61b/0xdf0 [ 639.244914][ T4758] ? ext4_init_dot_dotdot+0x520/0x520 [ 639.250381][ T4758] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 639.256627][ T4758] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 639.262871][ T4758] ? security_inode_permission+0xcb/0x100 23:07:56 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x3c00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 639.268603][ T4758] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 639.274849][ T4758] ? security_inode_mkdir+0xe4/0x120 [ 639.280154][ T4758] vfs_mkdir+0x42e/0x670 [ 639.284699][ T4758] do_mkdirat+0x234/0x2a0 [ 639.289444][ T4758] ? __ia32_sys_mknod+0xb0/0xb0 [ 639.294303][ T4758] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 639.299783][ T4758] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 639.305864][ T4758] ? do_syscall_64+0x26/0x680 [ 639.310559][ T4758] ? lockdep_hardirqs_on+0x418/0x5d0 [ 639.315862][ T4758] __x64_sys_mkdir+0x5c/0x80 [ 639.320547][ T4758] do_syscall_64+0xfd/0x680 [ 639.325066][ T4758] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 639.330958][ T4758] RIP: 0033:0x458697 [ 639.334855][ T4758] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 639.355418][ T4758] RSP: 002b:00007f34331e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 639.364365][ T4758] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458697 [ 639.372865][ T4758] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 639.380853][ T4758] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 639.389009][ T4758] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 639.397002][ T4758] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 [ 639.474187][ T4764] hfsplus: unable to find HFS+ superblock 23:07:56 executing program 1 (fault-call:0 fault-nth:42): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:07:56 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x88caffff00000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:56 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f00000000c0)=0x5) r1 = socket$inet(0x2b, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r3 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') connect$inet(r1, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:56 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x4000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:56 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xd000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:56 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:56 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8906000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:56 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x4305]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:56 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f00000000c0)=0x5) r1 = socket$inet(0x2b, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r3 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) connect$inet(r1, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) [ 639.682356][ T4783] hfsplus: unable to find HFS+ superblock [ 639.709523][ T4788] FAULT_INJECTION: forcing a failure. [ 639.709523][ T4788] name failslab, interval 1, probability 0, space 0, times 0 [ 639.729311][ T4788] CPU: 0 PID: 4788 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 639.738388][ T4788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 639.748551][ T4788] Call Trace: [ 639.751970][ T4788] dump_stack+0x172/0x1f0 [ 639.756327][ T4788] should_fail.cold+0xa/0x15 [ 639.761208][ T4788] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 639.767325][ T4788] ? ___might_sleep+0x163/0x280 [ 639.772299][ T4788] __should_failslab+0x121/0x190 [ 639.777339][ T4788] should_failslab+0x9/0x14 [ 639.781845][ T4788] __kmalloc+0x2d9/0x740 [ 639.786097][ T4788] ? ext4_find_extent+0x76e/0x9d0 [ 639.791133][ T4788] ext4_find_extent+0x76e/0x9d0 [ 639.796087][ T4788] ? drm_mode_get_hv_timing+0x110/0x1c0 [ 639.801645][ T4788] ext4_ext_map_blocks+0x1c3/0x5250 [ 639.806845][ T4788] ? mark_held_locks+0xf0/0xf0 [ 639.811706][ T4788] ? ext4_ext_release+0x10/0x10 [ 639.816572][ T4788] ? lock_acquire+0x16f/0x3f0 [ 639.821347][ T4788] ? ext4_map_blocks+0x3fd/0x18e0 [ 639.826381][ T4788] ? kasan_check_write+0x14/0x20 [ 639.831325][ T4788] ext4_map_blocks+0xec7/0x18e0 [ 639.836196][ T4788] ? ext4_issue_zeroout+0x190/0x190 [ 639.841408][ T4788] ? kasan_check_write+0x14/0x20 [ 639.846357][ T4788] ext4_getblk+0xc4/0x510 [ 639.851047][ T4788] ? ext4_iomap_begin+0xfe0/0xfe0 [ 639.856280][ T4788] ext4_bread+0x8f/0x230 [ 639.860632][ T4788] ? ext4_getblk+0x510/0x510 [ 639.866012][ T4788] ext4_append+0x155/0x370 [ 639.870522][ T4788] ext4_mkdir+0x61b/0xdf0 [ 639.874864][ T4788] ? ext4_init_dot_dotdot+0x520/0x520 [ 639.880239][ T4788] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 639.886480][ T4788] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 639.892725][ T4788] ? security_inode_permission+0xcb/0x100 [ 639.898459][ T4788] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 639.904701][ T4788] ? security_inode_mkdir+0xe4/0x120 [ 639.910077][ T4788] vfs_mkdir+0x42e/0x670 [ 639.914327][ T4788] do_mkdirat+0x234/0x2a0 [ 639.919798][ T4788] ? __ia32_sys_mknod+0xb0/0xb0 [ 639.924655][ T4788] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 639.930300][ T4788] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 639.936635][ T4788] ? do_syscall_64+0x26/0x680 [ 639.941340][ T4788] ? lockdep_hardirqs_on+0x418/0x5d0 [ 639.946635][ T4788] __x64_sys_mkdir+0x5c/0x80 [ 639.951413][ T4788] do_syscall_64+0xfd/0x680 [ 639.956038][ T4788] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 639.961928][ T4788] RIP: 0033:0x458697 [ 639.965828][ T4788] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 639.987087][ T4788] RSP: 002b:00007f34331e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 639.995682][ T4788] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458697 [ 640.004104][ T4788] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 640.012096][ T4788] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 640.020073][ T4788] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 23:07:57 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x28000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 640.029353][ T4788] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:07:57 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x89ffffff00000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:57 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x4788]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 640.098057][ T4793] hfsplus: unable to find HFS+ superblock 23:07:57 executing program 1 (fault-call:0 fault-nth:43): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:07:57 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:57 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x29000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:57 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f00000000c0)=0x5) r1 = socket$inet(0x2b, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r3 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) socket$inet6(0xa, 0x2, 0x0) connect$inet(r1, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:57 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xff00000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:57 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x4888]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:57 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2b000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 640.329067][ T4812] FAULT_INJECTION: forcing a failure. [ 640.329067][ T4812] name failslab, interval 1, probability 0, space 0, times 0 [ 640.334581][ T4810] hfsplus: unable to find HFS+ superblock [ 640.342465][ T4812] CPU: 0 PID: 4812 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 640.342489][ T4812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 640.342494][ T4812] Call Trace: [ 640.342516][ T4812] dump_stack+0x172/0x1f0 [ 640.342539][ T4812] should_fail.cold+0xa/0x15 [ 640.342558][ T4812] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 640.342572][ T4812] ? __sigqueue_alloc+0x173/0x4d0 [ 640.342588][ T4812] ? find_held_lock+0x35/0x130 [ 640.342609][ T4812] __should_failslab+0x121/0x190 [ 640.342622][ T4812] should_failslab+0x9/0x14 [ 640.342635][ T4812] kmem_cache_alloc+0x47/0x6f0 [ 640.342659][ T4812] ? kasan_check_read+0x11/0x20 [ 640.414561][ T4812] __sigqueue_alloc+0x268/0x4d0 [ 640.419425][ T4812] __send_signal+0x831/0x1050 [ 640.424223][ T4812] send_signal+0x4c1/0x7d0 [ 640.428653][ T4812] force_sig_info_to_task+0x278/0x340 [ 640.435861][ T4812] force_sig_fault+0xbe/0x100 [ 640.440633][ T4812] ? force_sig_fault_to_task+0xf0/0xf0 [ 640.446121][ T4812] ? trace_hardirqs_on+0x67/0x220 [ 640.451158][ T4812] __bad_area_nosemaphore+0x32e/0x420 [ 640.456547][ T4812] bad_area+0x69/0x80 [ 640.460539][ T4812] __do_page_fault+0x996/0xda0 [ 640.465316][ T4812] do_page_fault+0x71/0x57d [ 640.469834][ T4812] ? page_fault+0x8/0x30 [ 640.474092][ T4812] page_fault+0x1e/0x30 [ 640.478256][ T4812] RIP: 0033:0x452e7f [ 640.482240][ T4812] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 640.502021][ T4812] RSP: 002b:00007f34331e1a88 EFLAGS: 00010283 [ 640.508193][ T4812] RAX: 00007f34331e1b40 RBX: 0000000020000228 RCX: 0000000000000000 [ 640.516264][ T4812] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007f34331e1b40 23:07:57 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xfffffffffffff000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 640.524249][ T4812] RBP: 0000000000000001 R08: 00000000000000e0 R09: 000000000000000a [ 640.532310][ T4812] R10: 0000000000000075 R11: 00000000004e3d00 R12: 0000000000000004 [ 640.540285][ T4812] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:07:57 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f00000000c0)=0x5) r1 = socket$inet(0x2b, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) r3 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) connect$inet(r1, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:57 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x6488]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:57 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 640.615794][ T4820] hfsplus: unable to find HFS+ superblock 23:07:57 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2c000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:57 executing program 1 (fault-call:0 fault-nth:44): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:07:57 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:57 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x4]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:57 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x6c00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:57 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f00000000c0)=0x5) r1 = socket$inet(0x2b, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r1, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:57 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2f000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:57 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x800e]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:57 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x3c000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 640.880600][ T4838] hfsplus: unable to find HFS+ superblock 23:07:57 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x6]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:57 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f00000000c0)=0x5) r1 = socket$inet(0x2b, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r1, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) [ 640.972381][ T4844] FAULT_INJECTION: forcing a failure. [ 640.972381][ T4844] name failslab, interval 1, probability 0, space 0, times 0 [ 640.981794][ T4847] hfsplus: unable to find HFS+ superblock [ 640.985124][ T4844] CPU: 0 PID: 4844 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 641.000095][ T4844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 641.010334][ T4844] Call Trace: [ 641.013638][ T4844] dump_stack+0x172/0x1f0 [ 641.018251][ T4844] should_fail.cold+0xa/0x15 23:07:58 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x3f000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 641.022853][ T4844] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 641.028678][ T4844] ? mark_held_locks+0xf0/0xf0 [ 641.033483][ T4844] ? __es_tree_search.isra.0+0x1bf/0x230 [ 641.039150][ T4844] ? save_stack+0x5c/0x90 [ 641.043589][ T4844] __should_failslab+0x121/0x190 [ 641.048569][ T4844] should_failslab+0x9/0x14 [ 641.053085][ T4844] kmem_cache_alloc+0x47/0x6f0 [ 641.057864][ T4844] ? ext4_es_scan+0x730/0x730 [ 641.062548][ T4844] ? do_raw_write_lock+0x124/0x290 [ 641.062570][ T4844] __es_insert_extent+0x2cc/0xf20 23:07:58 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x8035]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 641.062593][ T4844] ext4_es_insert_extent+0x2b7/0xa30 [ 641.078265][ T4844] ? ext4_es_scan_clu+0x50/0x50 [ 641.083138][ T4844] ? rcu_read_lock_sched_held+0x110/0x130 [ 641.088867][ T4844] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 641.095124][ T4844] ? ext4_es_find_extent_range+0xff/0x600 [ 641.100857][ T4844] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 641.100877][ T4844] ? ext4_rereserve_cluster+0x240/0x240 [ 641.112031][ T4844] ? ext4_find_extent+0x76e/0x9d0 [ 641.117074][ T4844] ? ext4_find_extent+0x6a6/0x9d0 [ 641.122129][ T4844] ext4_ext_map_blocks+0x20a1/0x5250 [ 641.127421][ T4844] ? mark_held_locks+0xf0/0xf0 [ 641.132202][ T4844] ? ext4_ext_release+0x10/0x10 [ 641.132226][ T4844] ? lock_acquire+0x16f/0x3f0 [ 641.141745][ T4844] ? ext4_map_blocks+0x3fd/0x18e0 [ 641.146769][ T4844] ? kasan_check_write+0x14/0x20 [ 641.146786][ T4844] ext4_map_blocks+0xec7/0x18e0 [ 641.146806][ T4844] ? ext4_issue_zeroout+0x190/0x190 [ 641.146827][ T4844] ? kasan_check_write+0x14/0x20 [ 641.146843][ T4844] ext4_getblk+0xc4/0x510 [ 641.146860][ T4844] ? ext4_iomap_begin+0xfe0/0xfe0 [ 641.146882][ T4844] ext4_bread+0x8f/0x230 [ 641.146896][ T4844] ? ext4_getblk+0x510/0x510 [ 641.146920][ T4844] ext4_append+0x155/0x370 [ 641.146935][ T4844] ext4_mkdir+0x61b/0xdf0 [ 641.146953][ T4844] ? ext4_init_dot_dotdot+0x520/0x520 [ 641.146967][ T4844] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 641.146979][ T4844] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 641.146992][ T4844] ? security_inode_permission+0xcb/0x100 [ 641.147006][ T4844] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 641.147022][ T4844] ? security_inode_mkdir+0xe4/0x120 [ 641.147039][ T4844] vfs_mkdir+0x42e/0x670 [ 641.147056][ T4844] do_mkdirat+0x234/0x2a0 [ 641.147072][ T4844] ? __ia32_sys_mknod+0xb0/0xb0 [ 641.147093][ T4844] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 641.162047][ T4844] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 641.162067][ T4844] ? do_syscall_64+0x26/0x680 [ 641.171304][ T4844] ? lockdep_hardirqs_on+0x418/0x5d0 [ 641.171328][ T4844] __x64_sys_mkdir+0x5c/0x80 [ 641.269671][ T4844] do_syscall_64+0xfd/0x680 [ 641.274532][ T4844] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 641.280682][ T4844] RIP: 0033:0x458697 [ 641.284576][ T4844] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 641.304268][ T4844] RSP: 002b:00007f34331e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 641.312683][ T4844] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458697 [ 641.320654][ T4844] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 641.328623][ T4844] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 641.336594][ T4844] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 641.344564][ T4844] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:07:58 executing program 1 (fault-call:0 fault-nth:45): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:07:58 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x8]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:58 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:58 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f00000000c0)=0x5) r1 = socket$inet(0x2b, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r1, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:58 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x8100]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:58 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x40000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:58 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xd]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 641.594689][ T4872] FAULT_INJECTION: forcing a failure. [ 641.594689][ T4872] name failslab, interval 1, probability 0, space 0, times 0 [ 641.616910][ T4863] hfsplus: unable to find HFS+ superblock [ 641.621563][ T4872] CPU: 0 PID: 4872 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 641.631621][ T4872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 641.641774][ T4872] Call Trace: [ 641.645273][ T4872] dump_stack+0x172/0x1f0 [ 641.649621][ T4872] should_fail.cold+0xa/0x15 [ 641.654229][ T4872] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 641.660082][ T4872] ? ___might_sleep+0x163/0x280 [ 641.664942][ T4872] __should_failslab+0x121/0x190 [ 641.664958][ T4872] should_failslab+0x9/0x14 [ 641.664969][ T4872] __kmalloc+0x2d9/0x740 [ 641.664986][ T4872] ? save_stack+0x5c/0x90 [ 641.683040][ T4872] ? save_stack+0x23/0x90 [ 641.687375][ T4872] ? tomoyo_encode2.part.0+0xf5/0x400 [ 641.687392][ T4872] tomoyo_encode2.part.0+0xf5/0x400 [ 641.687407][ T4872] ? do_syscall_64+0xfd/0x680 [ 641.687424][ T4872] tomoyo_encode+0x2b/0x50 [ 641.687436][ T4872] tomoyo_mount_acl+0xe0/0x840 [ 641.687453][ T4872] ? kasan_check_write+0x14/0x20 [ 641.687469][ T4872] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 641.687483][ T4872] ? lock_downgrade+0x880/0x880 [ 641.687502][ T4872] ? mark_held_locks+0xf0/0xf0 [ 641.732290][ T4872] ? lock_acquire+0x16f/0x3f0 [ 641.737327][ T4872] ? tomoyo_mount_permission+0x10a/0x410 [ 641.742989][ T4872] tomoyo_mount_permission+0x16a/0x410 [ 641.748461][ T4872] ? tomoyo_mount_permission+0x10a/0x410 [ 641.754112][ T4872] ? tomoyo_mount_acl+0x840/0x840 [ 641.759142][ T4872] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 641.765580][ T4872] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 641.771825][ T4872] ? strncpy_from_user+0x2b4/0x400 [ 641.777122][ T4872] tomoyo_sb_mount+0x35/0x40 [ 641.781718][ T4872] security_sb_mount+0x87/0xd0 [ 641.786489][ T4872] do_mount+0x1d4/0x1c00 [ 641.790732][ T4872] ? retint_kernel+0x2b/0x2b [ 641.795337][ T4872] ? copy_mount_string+0x40/0x40 [ 641.800378][ T4872] ? copy_mount_options+0x1f3/0x3f0 [ 641.805576][ T4872] ? __sanitizer_cov_trace_pc+0x3f/0x50 [ 641.811126][ T4872] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 641.817367][ T4872] ? copy_mount_options+0x2db/0x3f0 [ 641.822569][ T4872] ksys_mount+0xdb/0x150 [ 641.826824][ T4872] __x64_sys_mount+0xbe/0x150 [ 641.831516][ T4872] do_syscall_64+0xfd/0x680 [ 641.836027][ T4872] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 641.842009][ T4872] RIP: 0033:0x45bcca [ 641.845917][ T4872] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 641.865521][ T4872] RSP: 002b:00007f34331e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 641.874198][ T4872] RAX: ffffffffffffffda RBX: 00007f34331e1b40 RCX: 000000000045bcca [ 641.882276][ T4872] RDX: 00007f34331e1ae0 RSI: 00000000200000c0 RDI: 00007f34331e1b00 23:07:58 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x8847]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:58 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x43050000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:58 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f00000000c0)=0x5) r1 = socket$inet(0x2b, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r1, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:58 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x28]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 641.890251][ T4872] RBP: 0000000000000001 R08: 00007f34331e1b40 R09: 00007f34331e1ae0 [ 641.898232][ T4872] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 641.906460][ T4872] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:07:58 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x8848]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 641.970993][ T4879] hfsplus: unable to find HFS+ superblock 23:07:59 executing program 1 (fault-call:0 fault-nth:46): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:07:59 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x6c000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:59 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:59 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x29]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:59 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f00000000c0)=0x5) r1 = socket$inet(0x2b, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") socket$packet(0x11, 0x3, 0x300) connect$inet(r1, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:59 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x8864]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:59 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x800e0000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:59 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2b]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:59 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f00000000c0)=0x5) r1 = socket$inet(0x2b, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") socket$packet(0x11, 0x3, 0x300) connect$inet(r1, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:59 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x8906]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 642.221445][ T4895] FAULT_INJECTION: forcing a failure. [ 642.221445][ T4895] name failslab, interval 1, probability 0, space 0, times 0 [ 642.284337][ T4900] hfsplus: unable to find HFS+ superblock [ 642.285677][ T4895] CPU: 0 PID: 4895 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 642.299057][ T4895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 642.299063][ T4895] Call Trace: [ 642.299082][ T4895] dump_stack+0x172/0x1f0 [ 642.299104][ T4895] should_fail.cold+0xa/0x15 [ 642.321342][ T4895] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 642.327157][ T4895] ? ___might_sleep+0x163/0x280 23:07:59 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xf000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 642.327178][ T4895] __should_failslab+0x121/0x190 [ 642.327191][ T4895] should_failslab+0x9/0x14 [ 642.327205][ T4895] kmem_cache_alloc+0x2af/0x6f0 [ 642.327219][ T4895] ? rcu_read_lock_sched_held+0x110/0x130 [ 642.327234][ T4895] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 642.327250][ T4895] ? __mark_inode_dirty+0x241/0x1280 [ 642.327274][ T4895] ext4_mb_new_blocks+0x5a0/0x3c10 [ 642.370733][ T4895] ? ext4_find_extent+0x76e/0x9d0 [ 642.377371][ T4895] ext4_ext_map_blocks+0x2b83/0x5250 [ 642.382687][ T4895] ? ext4_ext_release+0x10/0x10 [ 642.389751][ T4895] ext4_map_blocks+0x8c5/0x18e0 [ 642.394615][ T4895] ? ext4_issue_zeroout+0x190/0x190 [ 642.399822][ T4895] ? kasan_check_write+0x14/0x20 [ 642.404851][ T4895] ext4_getblk+0xc4/0x510 [ 642.409190][ T4895] ? ext4_iomap_begin+0xfe0/0xfe0 [ 642.414228][ T4895] ext4_bread+0x8f/0x230 [ 642.418478][ T4895] ? ext4_getblk+0x510/0x510 [ 642.423078][ T4895] ext4_append+0x155/0x370 [ 642.427504][ T4895] ext4_mkdir+0x61b/0xdf0 23:07:59 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2c]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 642.431852][ T4895] ? ext4_init_dot_dotdot+0x520/0x520 [ 642.437239][ T4895] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 642.443497][ T4895] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 642.449752][ T4895] ? security_inode_permission+0xcb/0x100 [ 642.455481][ T4895] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 642.461726][ T4895] ? security_inode_mkdir+0xe4/0x120 [ 642.467028][ T4895] vfs_mkdir+0x42e/0x670 [ 642.471284][ T4895] do_mkdirat+0x234/0x2a0 [ 642.475621][ T4895] ? __ia32_sys_mknod+0xb0/0xb0 [ 642.480477][ T4895] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 642.486031][ T4895] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 642.492095][ T4895] ? do_syscall_64+0x26/0x680 [ 642.496778][ T4895] ? lockdep_hardirqs_on+0x418/0x5d0 [ 642.502091][ T4895] __x64_sys_mkdir+0x5c/0x80 [ 642.506780][ T4895] do_syscall_64+0xfd/0x680 [ 642.511297][ T4895] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 642.517188][ T4895] RIP: 0033:0x458697 [ 642.521113][ T4895] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 642.540800][ T4895] RSP: 002b:00007f34331e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 642.549215][ T4895] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458697 [ 642.557183][ T4895] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 642.565183][ T4895] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 642.573156][ T4895] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 642.581130][ T4895] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 [ 642.623138][ T4910] hfsplus: unable to find HFS+ superblock 23:07:59 executing program 1 (fault-call:0 fault-nth:47): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:07:59 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x80350000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:59 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:07:59 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f00000000c0)=0x5) r1 = socket$inet(0x2b, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") socket$packet(0x11, 0x3, 0x300) connect$inet(r1, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:07:59 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2f]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:59 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xff00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:59 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x81000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:59 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xf0ffff]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 642.823724][ T4923] FAULT_INJECTION: forcing a failure. [ 642.823724][ T4923] name failslab, interval 1, probability 0, space 0, times 0 [ 642.841616][ T4923] CPU: 0 PID: 4923 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 642.850582][ T4923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 642.860638][ T4923] Call Trace: [ 642.860659][ T4923] dump_stack+0x172/0x1f0 [ 642.860683][ T4923] should_fail.cold+0xa/0x15 23:07:59 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x3c]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 642.872878][ T4923] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 642.878699][ T4923] ? ___might_sleep+0x163/0x280 [ 642.878728][ T4923] __should_failslab+0x121/0x190 [ 642.888512][ T4923] should_failslab+0x9/0x14 [ 642.893027][ T4923] __kmalloc_track_caller+0x2d5/0x740 [ 642.898408][ T4923] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 642.898421][ T4923] ? strndup_user+0x77/0xd0 [ 642.898436][ T4923] memdup_user+0x26/0xb0 [ 642.913414][ T4923] strndup_user+0x77/0xd0 [ 642.913434][ T4923] ksys_mount+0x7b/0x150 [ 642.913452][ T4923] __x64_sys_mount+0xbe/0x150 [ 642.913473][ T4923] do_syscall_64+0xfd/0x680 [ 642.931292][ T4923] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 642.937187][ T4923] RIP: 0033:0x45bcca [ 642.937204][ T4923] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 642.937212][ T4923] RSP: 002b:00007f34331e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 23:07:59 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x1000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:59 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x86ddffff]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:07:59 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f00000000c0)=0x5) r1 = socket$inet(0x2b, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r1, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) [ 642.937226][ T4923] RAX: ffffffffffffffda RBX: 00007f34331e1b40 RCX: 000000000045bcca [ 642.937236][ T4923] RDX: 00007f34331e1ae0 RSI: 00000000200000c0 RDI: 00007f34331e1b00 [ 642.937243][ T4923] RBP: 0000000000000001 R08: 00007f34331e1b40 R09: 00007f34331e1ae0 [ 642.937250][ T4923] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 642.937257][ T4923] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:08:00 executing program 1 (fault-call:0 fault-nth:48): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:08:00 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x6c]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 643.073594][ T4928] hfsplus: unable to find HFS+ superblock [ 643.187792][ T4931] hfsplus: unable to find HFS+ superblock [ 643.279873][ T4947] FAULT_INJECTION: forcing a failure. [ 643.279873][ T4947] name failslab, interval 1, probability 0, space 0, times 0 [ 643.292628][ T4947] CPU: 0 PID: 4947 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 643.301558][ T4947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 643.311607][ T4947] Call Trace: [ 643.314911][ T4947] dump_stack+0x172/0x1f0 [ 643.319247][ T4947] should_fail.cold+0xa/0x15 [ 643.324012][ T4947] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 643.329912][ T4947] ? mark_held_locks+0xf0/0xf0 [ 643.334676][ T4947] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 643.340483][ T4947] ? __es_tree_search.isra.0+0x1bf/0x230 [ 643.346132][ T4947] __should_failslab+0x121/0x190 [ 643.351080][ T4947] should_failslab+0x9/0x14 [ 643.355579][ T4947] kmem_cache_alloc+0x47/0x6f0 [ 643.360343][ T4947] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 643.366065][ T4947] ? ext4_es_can_be_merged+0x1a3/0x2a0 [ 643.371534][ T4947] ? ext4_es_scan+0x730/0x730 [ 643.376211][ T4947] ? do_raw_write_lock+0x124/0x290 [ 643.381337][ T4947] __es_insert_extent+0x2cc/0xf20 [ 643.386375][ T4947] ext4_es_insert_extent+0x2b7/0xa30 [ 643.391667][ T4947] ? ext4_es_scan_clu+0x50/0x50 [ 643.396622][ T4947] ext4_map_blocks+0xb87/0x18e0 [ 643.401658][ T4947] ? ext4_issue_zeroout+0x190/0x190 [ 643.406876][ T4947] ? kasan_check_write+0x14/0x20 [ 643.411825][ T4947] ext4_getblk+0xc4/0x510 [ 643.416172][ T4947] ? ext4_iomap_begin+0xfe0/0xfe0 [ 643.421207][ T4947] ext4_bread+0x8f/0x230 [ 643.425532][ T4947] ? ext4_getblk+0x510/0x510 [ 643.430137][ T4947] ext4_append+0x155/0x370 [ 643.434561][ T4947] ext4_mkdir+0x61b/0xdf0 [ 643.438902][ T4947] ? ext4_init_dot_dotdot+0x520/0x520 [ 643.444272][ T4947] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 643.450521][ T4947] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 643.456863][ T4947] ? security_inode_permission+0xcb/0x100 [ 643.462588][ T4947] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 643.468817][ T4947] ? security_inode_mkdir+0xe4/0x120 [ 643.468833][ T4947] vfs_mkdir+0x42e/0x670 [ 643.468851][ T4947] do_mkdirat+0x234/0x2a0 [ 643.468867][ T4947] ? __ia32_sys_mknod+0xb0/0xb0 [ 643.468881][ T4947] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 643.468902][ T4947] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 643.493027][ T4947] ? do_syscall_64+0x26/0x680 [ 643.503827][ T4947] ? lockdep_hardirqs_on+0x418/0x5d0 [ 643.509212][ T4947] __x64_sys_mkdir+0x5c/0x80 [ 643.509229][ T4947] do_syscall_64+0xfd/0x680 [ 643.509248][ T4947] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 643.509258][ T4947] RIP: 0033:0x458697 [ 643.509273][ T4947] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 643.509280][ T4947] RSP: 002b:00007f34331e1a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 643.509292][ T4947] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458697 [ 643.509299][ T4947] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 643.509312][ T4947] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 23:08:00 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:08:00 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:00 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x88470000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:00 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f00000000c0)=0x5) r1 = socket$inet(0x2b, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r1, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:08:00 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xf0]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 643.580677][ T4947] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 643.588650][ T4947] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:08:00 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x4000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:00 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x88480000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:00 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x543]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:00 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f00000000c0)=0x5) r1 = socket$inet(0x2b, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r1, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) [ 643.701004][ T4957] hfsplus: unable to find HFS+ superblock 23:08:00 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f00000000c0)=0x5) r1 = socket$inet(0x2b, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r1, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) [ 643.795991][ T4968] hfsplus: unable to find HFS+ superblock 23:08:00 executing program 1 (fault-call:0 fault-nth:49): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:08:00 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x6000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:00 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x88640000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:00 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x600]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:00 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f00000000c0)=0x5) r1 = socket$inet(0x2b, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r1, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:08:00 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:08:01 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x8000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:01 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x88a8ffff]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:01 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x608]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:01 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f00000000c0)=0x5) r1 = socket$inet(0x2b, 0x1, 0x0) ioctl(0xffffffffffffffff, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r1, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) [ 644.064254][ T4981] hfsplus: unable to find HFS+ superblock 23:08:01 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x8060000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:01 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x88caffff]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 644.173486][ T4985] FAULT_INJECTION: forcing a failure. [ 644.173486][ T4985] name failslab, interval 1, probability 0, space 0, times 0 [ 644.194987][ T4991] hfsplus: unable to find HFS+ superblock [ 644.236185][ T4985] CPU: 0 PID: 4985 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 644.245591][ T4985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 644.255738][ T4985] Call Trace: [ 644.259045][ T4985] dump_stack+0x172/0x1f0 [ 644.263403][ T4985] should_fail.cold+0xa/0x15 [ 644.268036][ T4985] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 644.273870][ T4985] ? ___might_sleep+0x163/0x280 [ 644.279026][ T4985] __should_failslab+0x121/0x190 [ 644.284071][ T4985] should_failslab+0x9/0x14 [ 644.288667][ T4985] __kmalloc+0x2d9/0x740 [ 644.292921][ T4985] ? save_stack+0x5c/0x90 [ 644.297425][ T4985] ? save_stack+0x23/0x90 [ 644.301931][ T4985] ? tomoyo_encode2.part.0+0xf5/0x400 [ 644.307401][ T4985] tomoyo_encode2.part.0+0xf5/0x400 [ 644.312600][ T4985] ? do_syscall_64+0xfd/0x680 [ 644.317283][ T4985] tomoyo_encode+0x2b/0x50 [ 644.321796][ T4985] tomoyo_mount_acl+0xe0/0x840 [ 644.326568][ T4985] ? kasan_check_write+0x14/0x20 [ 644.331514][ T4985] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 644.337061][ T4985] ? lock_downgrade+0x880/0x880 [ 644.342007][ T4985] ? mark_held_locks+0xf0/0xf0 [ 644.346793][ T4985] ? lock_acquire+0x16f/0x3f0 [ 644.351469][ T4985] ? tomoyo_mount_permission+0x10a/0x410 [ 644.357106][ T4985] tomoyo_mount_permission+0x16a/0x410 [ 644.362574][ T4985] ? tomoyo_mount_permission+0x10a/0x410 [ 644.370212][ T4985] ? tomoyo_mount_acl+0x840/0x840 [ 644.375246][ T4985] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 644.381511][ T4985] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 644.387754][ T4985] ? strncpy_from_user+0x2b4/0x400 [ 644.392870][ T4985] tomoyo_sb_mount+0x35/0x40 [ 644.397466][ T4985] security_sb_mount+0x87/0xd0 [ 644.402241][ T4985] do_mount+0x1d4/0x1c00 [ 644.406489][ T4985] ? copy_mount_options+0x5c/0x3f0 [ 644.411600][ T4985] ? copy_mount_string+0x40/0x40 [ 644.416538][ T4985] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 644.422776][ T4985] ? _copy_from_user+0x12c/0x1a0 [ 644.427717][ T4985] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 644.433956][ T4985] ? copy_mount_options+0x2db/0x3f0 [ 644.439165][ T4985] ksys_mount+0xdb/0x150 [ 644.443411][ T4985] __x64_sys_mount+0xbe/0x150 [ 644.448097][ T4985] do_syscall_64+0xfd/0x680 [ 644.452695][ T4985] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 644.458670][ T4985] RIP: 0033:0x45bcca [ 644.462568][ T4985] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 644.482179][ T4985] RSP: 002b:00007f34331e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 644.490595][ T4985] RAX: ffffffffffffffda RBX: 00007f34331e1b40 RCX: 000000000045bcca [ 644.498574][ T4985] RDX: 00007f34331e1ae0 RSI: 00000000200000c0 RDI: 00007f34331e1b00 [ 644.506542][ T4985] RBP: 0000000000000001 R08: 00007f34331e1b40 R09: 00007f34331e1ae0 [ 644.514507][ T4985] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 644.522740][ T4985] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:08:01 executing program 1 (fault-call:0 fault-nth:50): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:08:01 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f00000000c0)=0x5) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:08:01 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xd000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:01 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:08:01 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x689]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:01 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x89060000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:01 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x806]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:01 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x28000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 644.741923][ T5006] hfsplus: unable to find HFS+ superblock 23:08:01 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f00000000c0)=0x5) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) [ 644.795718][ T5010] FAULT_INJECTION: forcing a failure. [ 644.795718][ T5010] name failslab, interval 1, probability 0, space 0, times 0 [ 644.821569][ T5013] hfsplus: unable to find HFS+ superblock [ 644.856738][ T5010] CPU: 0 PID: 5010 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 644.865718][ T5010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 644.876262][ T5010] Call Trace: [ 644.879577][ T5010] dump_stack+0x172/0x1f0 [ 644.883933][ T5010] should_fail.cold+0xa/0x15 [ 644.888545][ T5010] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 644.894370][ T5010] ? ___might_sleep+0x163/0x280 [ 644.899245][ T5010] __should_failslab+0x121/0x190 [ 644.904288][ T5010] should_failslab+0x9/0x14 [ 644.908807][ T5010] __kmalloc_track_caller+0x2d5/0x740 [ 644.914194][ T5010] ? setup_sigcontext+0x7d0/0x7d0 [ 644.919411][ T5010] ? __bad_area_nosemaphore+0xb3/0x420 [ 644.924903][ T5010] ? strndup_user+0x77/0xd0 [ 644.929496][ T5010] memdup_user+0x26/0xb0 [ 644.933824][ T5010] strndup_user+0x77/0xd0 [ 644.938260][ T5010] ksys_mount+0x3c/0x150 [ 644.942509][ T5010] __x64_sys_mount+0xbe/0x150 [ 644.947362][ T5010] do_syscall_64+0xfd/0x680 [ 644.951880][ T5010] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 644.957775][ T5010] RIP: 0033:0x45bcca [ 644.961676][ T5010] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 644.982628][ T5010] RSP: 002b:00007f34331e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 644.991060][ T5010] RAX: ffffffffffffffda RBX: 00007f34331e1b40 RCX: 000000000045bcca [ 644.999046][ T5010] RDX: 00007f34331e1ae0 RSI: 00000000200000c0 RDI: 00007f34331e1b00 23:08:01 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xd00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:01 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x29000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:01 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x89ffffff]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 645.007042][ T5010] RBP: 0000000000000001 R08: 00007f34331e1b40 R09: 00007f34331e1ae0 [ 645.015098][ T5010] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 645.023070][ T5010] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:08:02 executing program 1 (fault-call:0 fault-nth:51): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:08:02 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:08:02 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2b000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:02 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xff000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:02 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xe80]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:02 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f00000000c0)=0x5) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:08:02 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xffffa888]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 645.253065][ T5029] hfsplus: unable to find HFS+ superblock 23:08:02 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2c000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:02 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2800]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 645.335825][ T5038] FAULT_INJECTION: forcing a failure. [ 645.335825][ T5038] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 645.349091][ T5038] CPU: 0 PID: 5038 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 645.358127][ T5038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 645.369500][ T5038] Call Trace: [ 645.372986][ T5038] dump_stack+0x172/0x1f0 [ 645.377518][ T5038] should_fail.cold+0xa/0x15 23:08:02 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2f000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 645.382130][ T5038] ? mark_held_locks+0xf0/0xf0 [ 645.386922][ T5038] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 645.392753][ T5038] ? mark_held_locks+0xf0/0xf0 [ 645.397539][ T5038] should_fail_alloc_page+0x50/0x60 [ 645.402762][ T5038] __alloc_pages_nodemask+0x1a1/0x8d0 [ 645.408151][ T5038] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 645.413797][ T5038] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 645.419610][ T5038] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 645.425249][ T5038] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 23:08:02 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2900]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 645.431506][ T5038] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 645.437330][ T5038] cache_grow_begin+0x9d/0x650 [ 645.442108][ T5038] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 645.448366][ T5038] kmem_cache_alloc_trace+0x67a/0x750 [ 645.453762][ T5038] copy_mount_options+0x5c/0x3f0 [ 645.458715][ T5038] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 645.464984][ T5038] ksys_mount+0xa7/0x150 [ 645.465009][ T5038] __x64_sys_mount+0xbe/0x150 [ 645.474017][ T5038] do_syscall_64+0xfd/0x680 [ 645.478541][ T5038] entry_SYSCALL_64_after_hwframe+0x49/0xbe 23:08:02 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 645.484443][ T5038] RIP: 0033:0x45bcca [ 645.488344][ T5038] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 645.508046][ T5038] RSP: 002b:00007f34331e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 645.516471][ T5038] RAX: ffffffffffffffda RBX: 00007f34331e1b40 RCX: 000000000045bcca [ 645.524538][ T5038] RDX: 00007f34331e1ae0 RSI: 00000000200000c0 RDI: 00007f34331e1b00 [ 645.524549][ T5038] RBP: 0000000000000001 R08: 00007f34331e1b40 R09: 00007f34331e1ae0 [ 645.524557][ T5038] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 645.524565][ T5038] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 [ 645.601858][ T5054] hfsplus: unable to find HFS+ superblock 23:08:02 executing program 1 (fault-call:0 fault-nth:52): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:08:02 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xffffca88]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:02 executing program 3: pipe(&(0x7f0000000080)) r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:08:02 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x3c000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:02 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2b00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 645.694189][ T5056] hfsplus: unable to find HFS+ superblock 23:08:02 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:08:02 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2c00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:02 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x40000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:02 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xffffdd86]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:02 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:08:02 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2f00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 645.923328][ T5067] FAULT_INJECTION: forcing a failure. [ 645.923328][ T5067] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 645.936576][ T5067] CPU: 0 PID: 5067 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 645.945517][ T5067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 645.955591][ T5067] Call Trace: [ 645.958919][ T5067] dump_stack+0x172/0x1f0 [ 645.963268][ T5067] should_fail.cold+0xa/0x15 [ 645.967960][ T5067] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 645.973782][ T5067] ? mark_held_locks+0xf0/0xf0 [ 645.978553][ T5067] should_fail_alloc_page+0x50/0x60 [ 645.978568][ T5067] __alloc_pages_nodemask+0x1a1/0x8d0 [ 645.978581][ T5067] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 645.978598][ T5067] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 645.978609][ T5067] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 645.978629][ T5067] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 646.006247][ T5067] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 646.006270][ T5067] cache_grow_begin+0x9d/0x650 23:08:03 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x43050000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 646.006285][ T5067] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 646.006300][ T5067] kmem_cache_alloc+0x628/0x6f0 [ 646.006326][ T5067] getname_flags+0xd6/0x5b0 [ 646.018365][ T5067] user_path_at_empty+0x2f/0x50 [ 646.018382][ T5067] do_mount+0x150/0x1c00 [ 646.018401][ T5067] ? copy_mount_options+0x5c/0x3f0 [ 646.029371][ T5067] ? copy_mount_string+0x40/0x40 [ 646.029391][ T5067] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 646.029404][ T5067] ? copy_mount_options+0x2db/0x3f0 [ 646.029421][ T5067] ksys_mount+0xdb/0x150 [ 646.029437][ T5067] __x64_sys_mount+0xbe/0x150 [ 646.029458][ T5067] do_syscall_64+0xfd/0x680 [ 646.083534][ T5067] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 646.085803][ T5075] hfsplus: unable to find HFS+ superblock [ 646.089512][ T5067] RIP: 0033:0x45bcca [ 646.089530][ T5067] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 646.089537][ T5067] RSP: 002b:00007f34331e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 646.089556][ T5067] RAX: ffffffffffffffda RBX: 00007f34331e1b40 RCX: 000000000045bcca [ 646.118941][ T5067] RDX: 00007f34331e1ae0 RSI: 00000000200000c0 RDI: 00007f34331e1b00 [ 646.118950][ T5067] RBP: 0000000000000001 R08: 00007f34331e1b40 R09: 00007f34331e1ae0 [ 646.118958][ T5067] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 646.118965][ T5067] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 [ 646.213628][ T5084] hfsplus: unable to find HFS+ superblock 23:08:03 executing program 1 (fault-call:0 fault-nth:53): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:08:03 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x3580]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:03 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xfffff000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:03 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x6c000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:03 executing program 3: r0 = socket$inet(0x2b, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:08:03 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:08:03 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x3c00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:03 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x800e0000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:03 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xffffff89]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 646.390851][ T5090] hfsplus: unable to find HFS+ superblock 23:08:03 executing program 3: r0 = socket$inet(0x2b, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) [ 646.476862][ T5098] FAULT_INJECTION: forcing a failure. [ 646.476862][ T5098] name failslab, interval 1, probability 0, space 0, times 0 [ 646.493145][ T5098] CPU: 0 PID: 5098 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 646.502286][ T5098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 646.502293][ T5098] Call Trace: [ 646.502314][ T5098] dump_stack+0x172/0x1f0 [ 646.502335][ T5098] should_fail.cold+0xa/0x15 [ 646.502353][ T5098] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 646.502372][ T5098] ? ___might_sleep+0x163/0x280 [ 646.502393][ T5098] __should_failslab+0x121/0x190 [ 646.502407][ T5098] should_failslab+0x9/0x14 [ 646.502420][ T5098] __kmalloc+0x2d9/0x740 [ 646.502434][ T5098] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 646.502449][ T5098] ? d_absolute_path+0x11b/0x170 [ 646.502461][ T5098] ? __d_path+0x140/0x140 [ 646.502476][ T5098] ? tomoyo_encode2.part.0+0xf5/0x400 [ 646.502494][ T5098] tomoyo_encode2.part.0+0xf5/0x400 [ 646.502512][ T5098] tomoyo_encode+0x2b/0x50 [ 646.502532][ T5098] tomoyo_realpath_from_path+0x1d3/0x7a0 [ 646.524979][ T5098] tomoyo_mount_acl+0x149/0x840 [ 646.560664][ T5098] ? kasan_check_write+0x14/0x20 [ 646.570353][ T5098] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 646.570368][ T5098] ? lock_downgrade+0x880/0x880 [ 646.570386][ T5098] ? mark_held_locks+0xf0/0xf0 [ 646.570419][ T5098] ? lock_acquire+0x16f/0x3f0 [ 646.570431][ T5098] ? tomoyo_mount_permission+0x10a/0x410 [ 646.570451][ T5098] tomoyo_mount_permission+0x16a/0x410 23:08:03 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x4000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 646.570468][ T5098] ? tomoyo_mount_permission+0x10a/0x410 [ 646.592603][ T5100] hfsplus: unable to find HFS+ superblock [ 646.595579][ T5098] ? tomoyo_mount_acl+0x840/0x840 [ 646.595597][ T5098] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 646.595618][ T5098] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 646.595630][ T5098] ? strncpy_from_user+0x2b4/0x400 [ 646.595647][ T5098] tomoyo_sb_mount+0x35/0x40 [ 646.595665][ T5098] security_sb_mount+0x87/0xd0 [ 646.595686][ T5098] do_mount+0x1d4/0x1c00 23:08:03 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x80350000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 646.595700][ T5098] ? retint_kernel+0x2b/0x2b [ 646.595720][ T5098] ? copy_mount_string+0x40/0x40 [ 646.610973][ T5098] ? copy_mount_options+0x263/0x3f0 [ 646.610994][ T5098] ? __sanitizer_cov_trace_const_cmp4+0x11/0x20 [ 646.632358][ T5098] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 646.632376][ T5098] ? copy_mount_options+0x2db/0x3f0 [ 646.632394][ T5098] ksys_mount+0xdb/0x150 [ 646.655674][ T5098] __x64_sys_mount+0xbe/0x150 [ 646.655697][ T5098] do_syscall_64+0xfd/0x680 [ 646.655715][ T5098] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 646.655726][ T5098] RIP: 0033:0x45bcca [ 646.655740][ T5098] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 646.655747][ T5098] RSP: 002b:00007f34331e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 646.655759][ T5098] RAX: ffffffffffffffda RBX: 00007f34331e1b40 RCX: 000000000045bcca [ 646.655767][ T5098] RDX: 00007f34331e1ae0 RSI: 00000000200000c0 RDI: 00007f34331e1b00 [ 646.655781][ T5098] RBP: 0000000000000001 R08: 00007f34331e1b40 R09: 00007f34331e1ae0 [ 646.655790][ T5098] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 646.655798][ T5098] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 [ 646.666287][ T5098] ERROR: Out of memory at tomoyo_realpath_from_path. 23:08:03 executing program 1 (fault-call:0 fault-nth:54): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:08:03 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xf0ffffffffffff]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:03 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:08:03 executing program 3: r0 = socket$inet(0x2b, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:08:03 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x4305]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:03 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x81000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:04 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x100000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 647.005721][ T5119] hfsplus: unable to find HFS+ superblock [ 647.077845][ T5124] hfsplus: unable to find HFS+ superblock [ 647.094268][ T5128] FAULT_INJECTION: forcing a failure. [ 647.094268][ T5128] name failslab, interval 1, probability 0, space 0, times 0 [ 647.107364][ T5128] CPU: 0 PID: 5128 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 647.116306][ T5128] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 647.126354][ T5128] Call Trace: [ 647.126374][ T5128] dump_stack+0x172/0x1f0 [ 647.126398][ T5128] should_fail.cold+0xa/0x15 [ 647.126420][ T5128] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 647.126440][ T5128] ? ___might_sleep+0x163/0x280 [ 647.126460][ T5128] __should_failslab+0x121/0x190 [ 647.126477][ T5128] should_failslab+0x9/0x14 [ 647.138649][ T5128] __kmalloc+0x2d9/0x740 [ 647.138668][ T5128] ? save_stack+0x5c/0x90 [ 647.138681][ T5128] ? save_stack+0x23/0x90 [ 647.138697][ T5128] ? tomoyo_encode2.part.0+0xf5/0x400 [ 647.138714][ T5128] tomoyo_encode2.part.0+0xf5/0x400 [ 647.154276][ T5128] ? do_syscall_64+0xfd/0x680 [ 647.162985][ T5128] tomoyo_encode+0x2b/0x50 [ 647.162999][ T5128] tomoyo_mount_acl+0xe0/0x840 [ 647.163018][ T5128] ? kasan_check_write+0x14/0x20 [ 647.163036][ T5128] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 647.207089][ T5128] ? lock_downgrade+0x880/0x880 [ 647.211961][ T5128] ? mark_held_locks+0xf0/0xf0 [ 647.216754][ T5128] ? lock_acquire+0x16f/0x3f0 [ 647.221435][ T5128] ? tomoyo_mount_permission+0x10a/0x410 [ 647.227079][ T5128] tomoyo_mount_permission+0x16a/0x410 [ 647.232537][ T5128] ? tomoyo_mount_permission+0x10a/0x410 [ 647.238173][ T5128] ? tomoyo_mount_acl+0x840/0x840 [ 647.243208][ T5128] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 647.249458][ T5128] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 647.255694][ T5128] ? strncpy_from_user+0x2b4/0x400 [ 647.260812][ T5128] tomoyo_sb_mount+0x35/0x40 [ 647.265493][ T5128] security_sb_mount+0x87/0xd0 [ 647.270268][ T5128] do_mount+0x1d4/0x1c00 [ 647.274511][ T5128] ? copy_mount_options+0x5c/0x3f0 [ 647.279630][ T5128] ? copy_mount_string+0x40/0x40 [ 647.284577][ T5128] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 647.290818][ T5128] ? copy_mount_options+0x2db/0x3f0 [ 647.296020][ T5128] ksys_mount+0xdb/0x150 [ 647.300263][ T5128] __x64_sys_mount+0xbe/0x150 [ 647.304944][ T5128] do_syscall_64+0xfd/0x680 [ 647.309452][ T5128] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 647.315339][ T5128] RIP: 0033:0x45bcca [ 647.319236][ T5128] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 647.338841][ T5128] RSP: 002b:00007f34331e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 647.347256][ T5128] RAX: ffffffffffffffda RBX: 00007f34331e1b40 RCX: 000000000045bcca [ 647.355227][ T5128] RDX: 00007f34331e1ae0 RSI: 00000000200000c0 RDI: 00007f34331e1b00 [ 647.363196][ T5128] RBP: 0000000000000001 R08: 00007f34331e1b40 R09: 00007f34331e1ae0 [ 647.371174][ T5128] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 23:08:04 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x86ddffff]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:04 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:08:04 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x4788]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:04 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x200000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 647.379155][ T5128] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:08:04 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:08:04 executing program 1 (fault-call:0 fault-nth:55): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:08:04 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x88470000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:04 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:08:04 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x400000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:04 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x4888]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 647.625146][ T5148] FAULT_INJECTION: forcing a failure. [ 647.625146][ T5148] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 647.635811][ T5144] hfsplus: unable to find HFS+ superblock [ 647.638386][ T5148] CPU: 0 PID: 5148 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 647.638404][ T5148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 647.663087][ T5148] Call Trace: [ 647.666391][ T5148] dump_stack+0x172/0x1f0 [ 647.670735][ T5148] should_fail.cold+0xa/0x15 23:08:04 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x88480000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:04 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x6488]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 647.675334][ T5148] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 647.681163][ T5148] should_fail_alloc_page+0x50/0x60 [ 647.686372][ T5148] __alloc_pages_nodemask+0x1a1/0x8d0 [ 647.691760][ T5148] ? rcu_read_lock_sched_held+0x110/0x130 [ 647.697490][ T5148] ? kmem_cache_free+0x222/0x260 [ 647.702521][ T5148] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 647.708247][ T5148] ? putname+0xf4/0x130 [ 647.712421][ T5148] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 647.718238][ T5148] cache_grow_begin+0x9d/0x650 [ 647.723017][ T5148] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 647.729262][ T5148] __kmalloc+0x67a/0x740 [ 647.733515][ T5148] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 647.739248][ T5148] tomoyo_realpath_from_path+0xcd/0x7a0 [ 647.744817][ T5148] tomoyo_mount_acl+0x2cc/0x840 [ 647.749683][ T5148] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 647.755231][ T5148] ? lock_downgrade+0x880/0x880 [ 647.760127][ T5148] ? mark_held_locks+0xf0/0xf0 [ 647.764911][ T5148] ? lock_acquire+0x16f/0x3f0 [ 647.769589][ T5148] ? tomoyo_mount_permission+0x10a/0x410 [ 647.775237][ T5148] tomoyo_mount_permission+0x16a/0x410 [ 647.780697][ T5148] ? tomoyo_mount_permission+0x10a/0x410 [ 647.786428][ T5148] ? tomoyo_mount_acl+0x840/0x840 [ 647.791554][ T5148] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 647.797899][ T5148] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 647.804140][ T5148] ? strncpy_from_user+0x2b4/0x400 [ 647.809259][ T5148] tomoyo_sb_mount+0x35/0x40 [ 647.813853][ T5148] security_sb_mount+0x87/0xd0 [ 647.818628][ T5148] do_mount+0x1d4/0x1c00 [ 647.822873][ T5148] ? copy_mount_options+0x5c/0x3f0 [ 647.827992][ T5148] ? copy_mount_string+0x40/0x40 [ 647.832940][ T5148] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 647.839178][ T5148] ? copy_mount_options+0x2db/0x3f0 [ 647.844382][ T5148] ksys_mount+0xdb/0x150 [ 647.848750][ T5148] __x64_sys_mount+0xbe/0x150 [ 647.853430][ T5148] do_syscall_64+0xfd/0x680 [ 647.858022][ T5148] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 647.863918][ T5148] RIP: 0033:0x45bcca [ 647.867914][ T5148] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 647.887520][ T5148] RSP: 002b:00007f34331e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 647.896106][ T5148] RAX: ffffffffffffffda RBX: 00007f34331e1b40 RCX: 000000000045bcca [ 647.904085][ T5148] RDX: 00007f34331e1ae0 RSI: 00000000200000c0 RDI: 00007f34331e1b00 [ 647.912060][ T5148] RBP: 0000000000000001 R08: 00007f34331e1b40 R09: 00007f34331e1ae0 23:08:04 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x600000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 647.920123][ T5148] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 647.928095][ T5148] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:08:05 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) [ 648.022838][ T5156] hfsplus: unable to find HFS+ superblock 23:08:05 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x6c00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:05 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x88640000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:05 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:08:05 executing program 1 (fault-call:0 fault-nth:56): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:08:05 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x800000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:05 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x88a8ffff]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:05 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) [ 648.229600][ T5169] hfsplus: unable to find HFS+ superblock 23:08:05 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x800e]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:05 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x806000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 648.314055][ T5175] hfsplus: unable to find HFS+ superblock [ 648.336231][ T5177] FAULT_INJECTION: forcing a failure. [ 648.336231][ T5177] name failslab, interval 1, probability 0, space 0, times 0 [ 648.366894][ T5177] CPU: 0 PID: 5177 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 648.376024][ T5177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 648.376030][ T5177] Call Trace: [ 648.376052][ T5177] dump_stack+0x172/0x1f0 [ 648.376076][ T5177] should_fail.cold+0xa/0x15 [ 648.376097][ T5177] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 648.376117][ T5177] ? ___might_sleep+0x163/0x280 [ 648.376138][ T5177] __should_failslab+0x121/0x190 [ 648.393806][ T5177] should_failslab+0x9/0x14 [ 648.404170][ T5177] kmem_cache_alloc+0x2af/0x6f0 [ 648.404190][ T5177] ? kasan_check_write+0x14/0x20 [ 648.404209][ T5177] getname_kernel+0x53/0x370 [ 648.404226][ T5177] kern_path+0x20/0x40 [ 648.418465][ T5177] tomoyo_mount_acl+0x28c/0x840 [ 648.418491][ T5177] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 648.418509][ T5177] ? lock_downgrade+0x880/0x880 [ 648.428272][ T5177] ? mark_held_locks+0xf0/0xf0 [ 648.428306][ T5177] ? lock_acquire+0x16f/0x3f0 [ 648.428320][ T5177] ? tomoyo_mount_permission+0x10a/0x410 [ 648.428341][ T5177] tomoyo_mount_permission+0x16a/0x410 [ 648.428353][ T5177] ? tomoyo_mount_permission+0x10a/0x410 [ 648.428367][ T5177] ? tomoyo_mount_acl+0x840/0x840 [ 648.428383][ T5177] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 648.428408][ T5177] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 648.428425][ T5177] ? strncpy_from_user+0x2b4/0x400 [ 648.501009][ T5177] tomoyo_sb_mount+0x35/0x40 [ 648.505604][ T5177] security_sb_mount+0x87/0xd0 [ 648.510385][ T5177] do_mount+0x1d4/0x1c00 [ 648.514631][ T5177] ? copy_mount_options+0x5c/0x3f0 [ 648.519747][ T5177] ? copy_mount_string+0x40/0x40 [ 648.524698][ T5177] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 648.530948][ T5177] ? copy_mount_options+0x2db/0x3f0 [ 648.536156][ T5177] ksys_mount+0xdb/0x150 [ 648.540401][ T5177] __x64_sys_mount+0xbe/0x150 [ 648.545082][ T5177] do_syscall_64+0xfd/0x680 [ 648.549593][ T5177] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 648.555483][ T5177] RIP: 0033:0x45bcca [ 648.559378][ T5177] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 648.578984][ T5177] RSP: 002b:00007f34331e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 648.587401][ T5177] RAX: ffffffffffffffda RBX: 00007f34331e1b40 RCX: 000000000045bcca [ 648.595456][ T5177] RDX: 00007f34331e1ae0 RSI: 00000000200000c0 RDI: 00007f34331e1b00 [ 648.603430][ T5177] RBP: 0000000000000001 R08: 00007f34331e1b40 R09: 00007f34331e1ae0 23:08:05 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x88caffff]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 648.611416][ T5177] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 648.619487][ T5177] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:08:05 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:08:05 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x8035]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:05 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:08:05 executing program 1 (fault-call:0 fault-nth:57): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:08:05 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x89060000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:05 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xd00000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:05 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x8100]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 648.816513][ T5190] hfsplus: unable to find HFS+ superblock [ 648.824498][ T5197] FAULT_INJECTION: forcing a failure. [ 648.824498][ T5197] name failslab, interval 1, probability 0, space 0, times 0 [ 648.853736][ T5197] CPU: 0 PID: 5197 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 648.862702][ T5197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 648.872765][ T5197] Call Trace: [ 648.876073][ T5197] dump_stack+0x172/0x1f0 [ 648.880425][ T5197] should_fail.cold+0xa/0x15 [ 648.885027][ T5197] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 648.885049][ T5197] ? ___might_sleep+0x163/0x280 [ 648.885070][ T5197] __should_failslab+0x121/0x190 [ 648.885087][ T5197] should_failslab+0x9/0x14 [ 648.905146][ T5197] kmem_cache_alloc+0x2af/0x6f0 [ 648.910056][ T5197] ? kasan_check_write+0x14/0x20 23:08:05 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x8847]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 648.915003][ T5197] getname_kernel+0x53/0x370 [ 648.919587][ T5197] kern_path+0x20/0x40 [ 648.919607][ T5197] tomoyo_mount_acl+0x28c/0x840 [ 648.919631][ T5197] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 648.919643][ T5197] ? lock_downgrade+0x880/0x880 [ 648.919666][ T5197] ? mark_held_locks+0xf0/0xf0 [ 648.919698][ T5197] ? lock_acquire+0x16f/0x3f0 [ 648.919712][ T5197] ? tomoyo_mount_permission+0x10a/0x410 [ 648.919733][ T5197] tomoyo_mount_permission+0x16a/0x410 [ 648.919747][ T5197] ? tomoyo_mount_permission+0x10a/0x410 [ 648.919761][ T5197] ? tomoyo_mount_acl+0x840/0x840 [ 648.919780][ T5197] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 648.970364][ T5197] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 648.982822][ T5197] ? strncpy_from_user+0x2b4/0x400 [ 648.987949][ T5197] tomoyo_sb_mount+0x35/0x40 [ 648.992630][ T5197] security_sb_mount+0x87/0xd0 [ 648.992659][ T5197] do_mount+0x1d4/0x1c00 [ 648.992681][ T5197] ? copy_mount_options+0x5c/0x3f0 [ 649.006779][ T5197] ? copy_mount_string+0x40/0x40 23:08:06 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x8848]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 649.011746][ T5197] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 649.018000][ T5197] ? copy_mount_options+0x2db/0x3f0 [ 649.023312][ T5197] ksys_mount+0xdb/0x150 [ 649.027565][ T5197] __x64_sys_mount+0xbe/0x150 [ 649.032250][ T5197] do_syscall_64+0xfd/0x680 [ 649.036759][ T5197] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 649.042661][ T5197] RIP: 0033:0x45bcca [ 649.046559][ T5197] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 23:08:06 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2800000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:06 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:08:06 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x89ffffff]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 649.066166][ T5197] RSP: 002b:00007f34331e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 649.074582][ T5197] RAX: ffffffffffffffda RBX: 00007f34331e1b40 RCX: 000000000045bcca [ 649.074592][ T5197] RDX: 00007f34331e1ae0 RSI: 00000000200000c0 RDI: 00007f34331e1b00 [ 649.074602][ T5197] RBP: 0000000000000001 R08: 00007f34331e1b40 R09: 00007f34331e1ae0 [ 649.074611][ T5197] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 649.074620][ T5197] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 [ 649.226131][ T5209] hfsplus: unable to find HFS+ superblock 23:08:06 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:08:06 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x8864]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:06 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2900000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:06 executing program 1 (fault-call:0 fault-nth:58): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:08:06 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xff000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:06 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:08:06 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x8906]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 649.355970][ T5222] FAULT_INJECTION: forcing a failure. [ 649.355970][ T5222] name failslab, interval 1, probability 0, space 0, times 0 [ 649.409118][ T5222] CPU: 0 PID: 5222 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 649.418093][ T5222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 649.418099][ T5222] Call Trace: [ 649.418122][ T5222] dump_stack+0x172/0x1f0 [ 649.418144][ T5222] should_fail.cold+0xa/0x15 [ 649.418167][ T5222] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 649.435840][ T5222] ? ___might_sleep+0x163/0x280 [ 649.435861][ T5222] __should_failslab+0x121/0x190 [ 649.435876][ T5222] should_failslab+0x9/0x14 [ 649.435888][ T5222] kmem_cache_alloc+0x2af/0x6f0 [ 649.435907][ T5222] ? kasan_check_write+0x14/0x20 [ 649.435926][ T5222] getname_kernel+0x53/0x370 [ 649.435947][ T5222] kern_path+0x20/0x40 [ 649.474917][ T5222] tomoyo_mount_acl+0x28c/0x840 [ 649.474939][ T5222] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 649.483829][ T5222] ? lock_downgrade+0x880/0x880 [ 649.483856][ T5222] ? mark_held_locks+0xf0/0xf0 [ 649.498599][ T5227] hfsplus: unable to find HFS+ superblock [ 649.499006][ T5222] ? lock_acquire+0x16f/0x3f0 23:08:06 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2b00000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:06 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xffffa888]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 649.509385][ T5222] ? tomoyo_mount_permission+0x10a/0x410 [ 649.515024][ T5222] tomoyo_mount_permission+0x16a/0x410 [ 649.520471][ T5222] ? tomoyo_mount_permission+0x10a/0x410 [ 649.520485][ T5222] ? tomoyo_mount_acl+0x840/0x840 [ 649.520501][ T5222] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 649.520524][ T5222] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 649.520538][ T5222] ? strncpy_from_user+0x2b4/0x400 [ 649.520554][ T5222] tomoyo_sb_mount+0x35/0x40 [ 649.520571][ T5222] security_sb_mount+0x87/0xd0 23:08:06 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xffffca88]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 649.537425][ T5222] do_mount+0x1d4/0x1c00 [ 649.537441][ T5222] ? copy_mount_options+0x5c/0x3f0 [ 649.537457][ T5222] ? copy_mount_string+0x40/0x40 [ 649.537480][ T5222] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 649.537492][ T5222] ? copy_mount_options+0x2db/0x3f0 [ 649.537515][ T5222] ksys_mount+0xdb/0x150 [ 649.548846][ T5222] __x64_sys_mount+0xbe/0x150 [ 649.548866][ T5222] do_syscall_64+0xfd/0x680 [ 649.548888][ T5222] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 649.548899][ T5222] RIP: 0033:0x45bcca [ 649.548914][ T5222] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 649.548922][ T5222] RSP: 002b:00007f34331e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 649.548936][ T5222] RAX: ffffffffffffffda RBX: 00007f34331e1b40 RCX: 000000000045bcca [ 649.548944][ T5222] RDX: 00007f34331e1ae0 RSI: 00000000200000c0 RDI: 00007f34331e1b00 [ 649.548953][ T5222] RBP: 0000000000000001 R08: 00007f34331e1b40 R09: 00007f34331e1ae0 [ 649.548961][ T5222] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 649.548967][ T5222] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:08:06 executing program 1 (fault-call:0 fault-nth:59): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 649.777780][ T5235] hfsplus: unable to find HFS+ superblock 23:08:06 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xf000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:06 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:08:06 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2c00000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:06 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:08:06 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xffffdd86]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:06 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xff00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:06 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2f00000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:06 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xfffff000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 649.970691][ T5248] FAULT_INJECTION: forcing a failure. [ 649.970691][ T5248] name failslab, interval 1, probability 0, space 0, times 0 [ 650.010626][ T5252] hfsplus: unable to find HFS+ superblock [ 650.031861][ T5248] CPU: 0 PID: 5248 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 650.040843][ T5248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 650.050901][ T5248] Call Trace: [ 650.050925][ T5248] dump_stack+0x172/0x1f0 [ 650.050946][ T5248] should_fail.cold+0xa/0x15 [ 650.050966][ T5248] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 650.050984][ T5248] ? ___might_sleep+0x163/0x280 [ 650.051001][ T5248] __should_failslab+0x121/0x190 [ 650.051016][ T5248] should_failslab+0x9/0x14 [ 650.051028][ T5248] kmem_cache_alloc_trace+0x2ce/0x750 [ 650.051049][ T5248] alloc_fs_context+0x5a/0x690 [ 650.069024][ T5248] fs_context_for_mount+0x25/0x30 [ 650.069041][ T5248] do_mount+0x132d/0x1c00 [ 650.069059][ T5248] ? copy_mount_string+0x40/0x40 [ 650.069082][ T5248] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 650.069094][ T5248] ? copy_mount_options+0x2db/0x3f0 [ 650.069109][ T5248] ksys_mount+0xdb/0x150 [ 650.069123][ T5248] __x64_sys_mount+0xbe/0x150 [ 650.069140][ T5248] do_syscall_64+0xfd/0x680 [ 650.069158][ T5248] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 650.069168][ T5248] RIP: 0033:0x45bcca [ 650.069187][ T5248] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 650.162429][ T5248] RSP: 002b:00007f34331e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 23:08:07 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:08:07 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xf0ffff]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:07 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xffffff89]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 650.177924][ T5248] RAX: ffffffffffffffda RBX: 00007f34331e1b40 RCX: 000000000045bcca [ 650.186077][ T5248] RDX: 00007f34331e1ae0 RSI: 00000000200000c0 RDI: 00007f34331e1b00 [ 650.194156][ T5248] RBP: 0000000000000001 R08: 00007f34331e1b40 R09: 00007f34331e1ae0 [ 650.204642][ T5248] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 650.212627][ T5248] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:08:07 executing program 1 (fault-call:0 fault-nth:60): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:08:07 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x1000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:07 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x3c00000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:07 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:08:07 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000040)) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:08:07 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xf0ffffffffffff]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 650.483292][ T5277] FAULT_INJECTION: forcing a failure. [ 650.483292][ T5277] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 650.496628][ T5277] CPU: 0 PID: 5277 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 650.505588][ T5277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 650.515649][ T5277] Call Trace: [ 650.518959][ T5277] dump_stack+0x172/0x1f0 [ 650.523326][ T5277] should_fail.cold+0xa/0x15 [ 650.527938][ T5277] ? __kasan_slab_free+0x102/0x150 [ 650.533069][ T5277] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 650.538888][ T5277] ? mark_held_locks+0xf0/0xf0 [ 650.543660][ T5277] should_fail_alloc_page+0x50/0x60 [ 650.543676][ T5277] __alloc_pages_nodemask+0x1a1/0x8d0 [ 650.543687][ T5277] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 650.543704][ T5277] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 650.555286][ T5277] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 650.555311][ T5277] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 650.555333][ T5277] cache_grow_begin+0x9d/0x650 [ 650.583089][ T5277] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 650.589371][ T5277] kmem_cache_alloc+0x628/0x6f0 [ 650.594242][ T5277] getname_kernel+0x53/0x370 [ 650.598929][ T5277] kern_path+0x20/0x40 [ 650.603009][ T5277] tomoyo_mount_acl+0x28c/0x840 [ 650.603026][ T5277] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 650.603038][ T5277] ? lock_downgrade+0x880/0x880 [ 650.603059][ T5277] ? mark_held_locks+0xf0/0xf0 [ 650.603090][ T5277] ? lock_acquire+0x16f/0x3f0 [ 650.615969][ T5275] hfsplus: unable to find HFS+ superblock [ 650.618401][ T5277] ? tomoyo_mount_permission+0x10a/0x410 [ 650.618426][ T5277] tomoyo_mount_permission+0x16a/0x410 [ 650.618438][ T5277] ? tomoyo_mount_permission+0x10a/0x410 [ 650.618456][ T5277] ? tomoyo_mount_acl+0x840/0x840 [ 650.639201][ T5277] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 650.639229][ T5277] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 650.639247][ T5277] ? strncpy_from_user+0x2b4/0x400 [ 650.661574][ T5277] tomoyo_sb_mount+0x35/0x40 [ 650.661592][ T5277] security_sb_mount+0x87/0xd0 23:08:07 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:07 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x3f00000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:07 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x100000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:07 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x4000000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:07 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x4000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 650.661612][ T5277] do_mount+0x1d4/0x1c00 [ 650.686601][ T5277] ? copy_mount_options+0x5c/0x3f0 [ 650.691822][ T5277] ? copy_mount_string+0x40/0x40 [ 650.696771][ T5277] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 650.703024][ T5277] ? copy_mount_options+0x2db/0x3f0 [ 650.708230][ T5277] ksys_mount+0xdb/0x150 [ 650.708250][ T5277] __x64_sys_mount+0xbe/0x150 [ 650.708267][ T5277] do_syscall_64+0xfd/0x680 [ 650.708286][ T5277] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 650.708297][ T5277] RIP: 0033:0x45bcca 23:08:07 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x200000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 650.708311][ T5277] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 650.708319][ T5277] RSP: 002b:00007f34331e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 650.708336][ T5277] RAX: ffffffffffffffda RBX: 00007f34331e1b40 RCX: 000000000045bcca [ 650.721827][ T5277] RDX: 00007f34331e1ae0 RSI: 00000000200000c0 RDI: 00007f34331e1b00 [ 650.721837][ T5277] RBP: 0000000000000001 R08: 00007f34331e1b40 R09: 00007f34331e1ae0 [ 650.721846][ T5277] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 650.721855][ T5277] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 [ 650.869997][ T5290] hfsplus: unable to find HFS+ superblock 23:08:07 executing program 1 (fault-call:0 fault-nth:61): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:08:07 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000040)) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:08:07 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x400000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:07 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x6000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:07 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x4305000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:07 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:08:08 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x8000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:08 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x6c00000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:08 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x600000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 651.050684][ T5304] hfsplus: unable to find HFS+ superblock 23:08:08 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000040)) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) [ 651.156417][ T5308] FAULT_INJECTION: forcing a failure. [ 651.156417][ T5308] name failslab, interval 1, probability 0, space 0, times 0 [ 651.193890][ T5310] hfsplus: unable to find HFS+ superblock 23:08:08 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x800e000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 651.194648][ T5308] CPU: 0 PID: 5308 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 651.208727][ T5308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 651.218790][ T5308] Call Trace: [ 651.222089][ T5308] dump_stack+0x172/0x1f0 [ 651.226432][ T5308] should_fail.cold+0xa/0x15 [ 651.231040][ T5308] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 651.236947][ T5308] ? ___might_sleep+0x163/0x280 [ 651.241807][ T5308] __should_failslab+0x121/0x190 [ 651.246766][ T5308] should_failslab+0x9/0x14 [ 651.251291][ T5308] kmem_cache_alloc_trace+0x2ce/0x750 23:08:08 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8035000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 651.256678][ T5308] alloc_fs_context+0x5a/0x690 [ 651.261450][ T5308] fs_context_for_mount+0x25/0x30 [ 651.266481][ T5308] vfs_kern_mount.part.0+0x28/0xf0 [ 651.271608][ T5308] vfs_kern_mount+0x40/0x60 [ 651.276213][ T5308] btrfs_mount+0x2b4/0x15e2 [ 651.280803][ T5308] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 651.286434][ T5308] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 651.292680][ T5308] ? should_fail+0x1de/0x852 [ 651.297264][ T5308] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 651.297283][ T5308] ? btrfs_remount+0x11f0/0x11f0 [ 651.297304][ T5308] ? rcu_read_lock_sched_held+0x110/0x130 [ 651.297318][ T5308] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 651.297332][ T5308] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 651.297350][ T5308] ? vfs_parse_fs_string+0x111/0x170 [ 651.297365][ T5308] ? vfs_parse_fs_string+0x111/0x170 [ 651.297378][ T5308] ? rcu_read_lock_sched_held+0x110/0x130 [ 651.297390][ T5308] ? kfree+0x1f7/0x220 [ 651.297407][ T5308] ? vfs_parse_fs_string+0x116/0x170 [ 651.352206][ T5308] ? vfs_parse_fs_param+0x540/0x540 [ 651.357420][ T5308] ? btrfs_remount+0x11f0/0x11f0 [ 651.362363][ T5308] legacy_get_tree+0x108/0x220 [ 651.367130][ T5308] ? legacy_get_tree+0x108/0x220 [ 651.372069][ T5308] ? legacy_parse_monolithic+0x11f/0x180 [ 651.377706][ T5308] vfs_get_tree+0x8e/0x390 [ 651.382126][ T5308] do_mount+0x138c/0x1c00 [ 651.386474][ T5308] ? copy_mount_string+0x40/0x40 [ 651.391430][ T5308] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 651.397673][ T5308] ? _copy_from_user+0x12c/0x1a0 [ 651.402615][ T5308] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 651.408867][ T5308] ? copy_mount_options+0x2db/0x3f0 [ 651.414079][ T5308] ksys_mount+0xdb/0x150 [ 651.418349][ T5308] __x64_sys_mount+0xbe/0x150 [ 651.423031][ T5308] do_syscall_64+0xfd/0x680 [ 651.427555][ T5308] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 651.433444][ T5308] RIP: 0033:0x45bcca [ 651.437344][ T5308] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 651.456948][ T5308] RSP: 002b:00007f34331e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 651.465355][ T5308] RAX: ffffffffffffffda RBX: 00007f34331e1b40 RCX: 000000000045bcca [ 651.473325][ T5308] RDX: 00007f34331e1ae0 RSI: 00000000200000c0 RDI: 00007f34331e1b00 [ 651.481303][ T5308] RBP: 0000000000000001 R08: 00007f34331e1b40 R09: 00007f34331e1ae0 [ 651.489271][ T5308] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 651.497240][ T5308] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:08:08 executing program 1 (fault-call:0 fault-nth:62): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:08:08 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x8060000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:08 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x800000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:08 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000040)="0adc1f123c12") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:08:08 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:08:08 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8100000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:08 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x806000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:08 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xd000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 651.730398][ T5330] hfsplus: unable to find HFS+ superblock 23:08:08 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x86ddffff00000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 651.787963][ T5336] FAULT_INJECTION: forcing a failure. [ 651.787963][ T5336] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 651.801213][ T5336] CPU: 0 PID: 5336 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 651.810157][ T5336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 651.820216][ T5336] Call Trace: [ 651.823521][ T5336] dump_stack+0x172/0x1f0 [ 651.827866][ T5336] should_fail.cold+0xa/0x15 [ 651.832477][ T5336] ? fault_create_debugfs_attr+0x1e0/0x1e0 23:08:08 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000040)="0adc1f123c12") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) [ 651.838309][ T5336] should_fail_alloc_page+0x50/0x60 [ 651.843518][ T5336] __alloc_pages_nodemask+0x1a1/0x8d0 [ 651.848905][ T5336] ? rcu_read_lock_sched_held+0x110/0x130 [ 651.854637][ T5336] ? kmem_cache_free+0x222/0x260 [ 651.859614][ T5336] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 651.865346][ T5336] ? putname+0xf4/0x130 [ 651.869588][ T5336] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 651.875511][ T5336] cache_grow_begin+0x9d/0x650 [ 651.880288][ T5336] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 23:08:08 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 651.886545][ T5336] __kmalloc+0x67a/0x740 [ 651.890812][ T5336] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 651.896548][ T5336] tomoyo_realpath_from_path+0xcd/0x7a0 [ 651.902116][ T5336] tomoyo_mount_acl+0x2cc/0x840 [ 651.906991][ T5336] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 651.912555][ T5336] ? lock_downgrade+0x880/0x880 [ 651.917430][ T5336] ? mark_held_locks+0xf0/0xf0 [ 651.922242][ T5336] ? lock_acquire+0x16f/0x3f0 [ 651.926939][ T5336] ? tomoyo_mount_permission+0x10a/0x410 [ 651.932584][ T5336] tomoyo_mount_permission+0x16a/0x410 [ 651.938030][ T5336] ? tomoyo_mount_permission+0x10a/0x410 [ 651.938044][ T5336] ? tomoyo_mount_acl+0x840/0x840 [ 651.938060][ T5336] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 651.938080][ T5336] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 651.938093][ T5336] ? strncpy_from_user+0x2b4/0x400 [ 651.938110][ T5336] tomoyo_sb_mount+0x35/0x40 [ 651.938132][ T5336] security_sb_mount+0x87/0xd0 [ 651.975693][ T5336] do_mount+0x1d4/0x1c00 [ 651.979957][ T5336] ? copy_mount_options+0x5c/0x3f0 23:08:08 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xd00000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 651.985089][ T5336] ? copy_mount_string+0x40/0x40 [ 651.990056][ T5336] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 651.996305][ T5336] ? copy_mount_options+0x2db/0x3f0 [ 652.001516][ T5336] ksys_mount+0xdb/0x150 [ 652.001535][ T5336] __x64_sys_mount+0xbe/0x150 [ 652.010469][ T5336] do_syscall_64+0xfd/0x680 [ 652.015000][ T5336] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 652.020903][ T5336] RIP: 0033:0x45bcca [ 652.024813][ T5336] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 652.044419][ T5336] RSP: 002b:00007f34331e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 652.044435][ T5336] RAX: ffffffffffffffda RBX: 00007f34331e1b40 RCX: 000000000045bcca [ 652.044442][ T5336] RDX: 00007f34331e1ae0 RSI: 00000000200000c0 RDI: 00007f34331e1b00 [ 652.044457][ T5336] RBP: 0000000000000001 R08: 00007f34331e1b40 R09: 00007f34331e1ae0 [ 652.068796][ T5336] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 652.068805][ T5336] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 [ 652.104654][ T5348] hfsplus: unable to find HFS+ superblock 23:08:09 executing program 1 (fault-call:0 fault-nth:63): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:08:09 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x28000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:09 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8847000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:09 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2800000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:09 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000040)="0adc1f123c12") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) [ 652.209609][ T5352] hfsplus: unable to find HFS+ superblock 23:08:09 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\xff', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:08:09 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x29000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:09 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8848000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:09 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2900000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:09 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319b") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) [ 652.384716][ T5365] FAULT_INJECTION: forcing a failure. [ 652.384716][ T5365] name failslab, interval 1, probability 0, space 0, times 0 [ 652.431227][ T5365] CPU: 0 PID: 5365 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 652.440198][ T5365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 652.440205][ T5365] Call Trace: [ 652.440227][ T5365] dump_stack+0x172/0x1f0 [ 652.440249][ T5365] should_fail.cold+0xa/0x15 [ 652.440268][ T5365] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 652.440286][ T5365] ? ___might_sleep+0x163/0x280 [ 652.440305][ T5365] __should_failslab+0x121/0x190 23:08:09 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2b000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 652.440318][ T5365] should_failslab+0x9/0x14 [ 652.440337][ T5365] __kmalloc_track_caller+0x2d5/0x740 [ 652.488028][ T5365] ? vfs_parse_fs_string+0xe8/0x170 [ 652.493243][ T5365] kmemdup_nul+0x31/0xa0 [ 652.497503][ T5365] vfs_parse_fs_string+0xe8/0x170 [ 652.502537][ T5365] ? vfs_parse_fs_param+0x540/0x540 [ 652.507755][ T5365] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 652.514006][ T5365] ? alloc_fs_context+0x400/0x690 [ 652.519038][ T5365] do_mount+0x700/0x1c00 [ 652.519059][ T5365] ? copy_mount_string+0x40/0x40 23:08:09 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8864000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 652.519084][ T5365] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 652.519097][ T5365] ? copy_mount_options+0x2db/0x3f0 [ 652.519115][ T5365] ksys_mount+0xdb/0x150 [ 652.519133][ T5365] __x64_sys_mount+0xbe/0x150 [ 652.519153][ T5365] do_syscall_64+0xfd/0x680 [ 652.553193][ T5365] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 652.559099][ T5365] RIP: 0033:0x45bcca [ 652.563005][ T5365] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 652.582621][ T5365] RSP: 002b:00007f34331e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 652.591048][ T5365] RAX: ffffffffffffffda RBX: 00007f34331e1b40 RCX: 000000000045bcca [ 652.599107][ T5365] RDX: 00007f34331e1ae0 RSI: 00000000200000c0 RDI: 00007f34331e1b00 [ 652.599118][ T5365] RBP: 0000000000000001 R08: 00007f34331e1b40 R09: 00007f34331e1ae0 [ 652.599126][ T5365] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 652.599135][ T5365] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:08:09 executing program 1 (fault-call:0 fault-nth:64): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:08:09 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2b00000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:09 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2c000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:09 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x88a8ffff00000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:09 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319b") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) [ 652.829103][ T5393] FAULT_INJECTION: forcing a failure. [ 652.829103][ T5393] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 652.842351][ T5393] CPU: 0 PID: 5393 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 652.851292][ T5393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 652.861368][ T5393] Call Trace: [ 652.864670][ T5393] dump_stack+0x172/0x1f0 [ 652.869023][ T5393] should_fail.cold+0xa/0x15 [ 652.873615][ T5393] ? vfs_kern_mount+0x40/0x60 [ 652.878303][ T5393] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 652.884119][ T5393] ? mark_held_locks+0xf0/0xf0 [ 652.888888][ T5393] should_fail_alloc_page+0x50/0x60 [ 652.894091][ T5393] __alloc_pages_nodemask+0x1a1/0x8d0 [ 652.899465][ T5393] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 652.905099][ T5393] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 652.910814][ T5393] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 652.916451][ T5393] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 652.922696][ T5393] ? fault_create_debugfs_attr+0x1e0/0x1e0 23:08:09 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:08:09 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2f000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:09 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x88caffff00000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:09 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2c00000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 652.928512][ T5393] cache_grow_begin+0x9d/0x650 [ 652.933278][ T5393] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 652.939524][ T5393] kmem_cache_alloc_trace+0x67a/0x750 [ 652.944915][ T5393] ? kasan_kmalloc+0x9/0x10 [ 652.949452][ T5393] btrfs_mount_root+0x1d0/0x1220 [ 652.954405][ T5393] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 652.960664][ T5393] ? btrfs_decode_error+0x70/0x70 [ 652.965705][ T5393] ? rcu_read_lock_sched_held+0x110/0x130 [ 652.971424][ T5393] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 652.977667][ T5393] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 652.983910][ T5393] ? vfs_parse_fs_string+0x111/0x170 [ 652.989202][ T5393] ? vfs_parse_fs_string+0x111/0x170 [ 652.994490][ T5393] ? rcu_read_lock_sched_held+0x110/0x130 [ 653.000212][ T5393] ? kfree+0x1f7/0x220 [ 653.004285][ T5393] ? vfs_parse_fs_string+0x116/0x170 [ 653.009575][ T5393] ? vfs_parse_fs_param+0x540/0x540 [ 653.014779][ T5393] ? btrfs_decode_error+0x70/0x70 [ 653.019802][ T5393] legacy_get_tree+0x108/0x220 [ 653.024577][ T5393] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 653.030848][ T5393] vfs_get_tree+0x8e/0x390 [ 653.035274][ T5393] fc_mount+0x17/0xc0 [ 653.039266][ T5393] vfs_kern_mount.part.0+0xd8/0xf0 [ 653.044385][ T5393] vfs_kern_mount+0x40/0x60 [ 653.048892][ T5393] btrfs_mount+0x2b4/0x15e2 [ 653.053385][ T5393] ? kasan_check_read+0x11/0x20 [ 653.053405][ T5393] ? _raw_spin_unlock_irq+0x5e/0x90 [ 653.053423][ T5393] ? finish_task_switch+0x118/0x730 [ 653.068650][ T5393] ? btrfs_remount+0x11f0/0x11f0 [ 653.073604][ T5393] ? __schedule+0x7d3/0x1560 23:08:10 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319b") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) [ 653.078214][ T5393] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 653.083681][ T5393] ? lockdep_hardirqs_on+0x418/0x5d0 [ 653.088964][ T5393] ? retint_kernel+0x2b/0x2b [ 653.088981][ T5393] ? trace_hardirqs_on_caller+0x6a/0x220 [ 653.089001][ T5393] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 653.089021][ T5393] ? retint_kernel+0x2b/0x2b [ 653.089045][ T5393] ? btrfs_remount+0x11f0/0x11f0 [ 653.089060][ T5393] legacy_get_tree+0x108/0x220 [ 653.089071][ T5393] ? legacy_get_tree+0x108/0x220 [ 653.089084][ T5393] ? legacy_parse_monolithic+0x11f/0x180 23:08:10 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x3c000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 653.089101][ T5393] vfs_get_tree+0x8e/0x390 [ 653.089116][ T5393] do_mount+0x138c/0x1c00 [ 653.089134][ T5393] ? copy_mount_string+0x40/0x40 [ 653.123950][ T5393] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 653.123966][ T5393] ? _copy_from_user+0x12c/0x1a0 [ 653.123984][ T5393] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 653.149519][ T5393] ? copy_mount_options+0x2db/0x3f0 [ 653.149537][ T5393] ksys_mount+0xdb/0x150 [ 653.149554][ T5393] __x64_sys_mount+0xbe/0x150 [ 653.149573][ T5393] do_syscall_64+0xfd/0x680 [ 653.149592][ T5393] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 653.149603][ T5393] RIP: 0033:0x45bcca [ 653.149619][ T5393] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 653.149631][ T5393] RSP: 002b:00007f34331e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 653.160781][ T5393] RAX: ffffffffffffffda RBX: 00007f34331e1b40 RCX: 000000000045bcca 23:08:10 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x8906000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 653.225064][ T5393] RDX: 00007f34331e1ae0 RSI: 00000000200000c0 RDI: 00007f34331e1b00 [ 653.233044][ T5393] RBP: 0000000000000001 R08: 00007f34331e1b40 R09: 00007f34331e1ae0 [ 653.241020][ T5393] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 653.248994][ T5393] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 [ 653.373516][ T5405] hfsplus: unable to find HFS+ superblock 23:08:10 executing program 1 (fault-call:0 fault-nth:65): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:08:10 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2f00000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:10 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x40000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:10 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd0") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:08:10 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x43050000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 653.504759][ T5408] hfsplus: unable to find HFS+ superblock 23:08:10 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\xff', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:08:10 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x89ffffff00000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:10 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd0") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:08:10 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x3c00000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 653.637119][ T5420] FAULT_INJECTION: forcing a failure. [ 653.637119][ T5420] name failslab, interval 1, probability 0, space 0, times 0 23:08:10 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xff00000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 653.679528][ T5420] CPU: 0 PID: 5420 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 653.688510][ T5420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 653.698584][ T5420] Call Trace: [ 653.701896][ T5420] dump_stack+0x172/0x1f0 [ 653.706251][ T5420] should_fail.cold+0xa/0x15 [ 653.710865][ T5420] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 653.716698][ T5420] ? ___might_sleep+0x163/0x280 [ 653.721567][ T5420] __should_failslab+0x121/0x190 [ 653.726510][ T5420] should_failslab+0x9/0x14 [ 653.731013][ T5420] __kmalloc_track_caller+0x2d5/0x740 [ 653.736410][ T5420] ? mark_held_locks+0xf0/0xf0 [ 653.741177][ T5420] ? __x64_sys_mount+0xbe/0x150 [ 653.746028][ T5420] ? do_syscall_64+0xfd/0x680 [ 653.750705][ T5420] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 653.756774][ T5420] ? btrfs_mount+0xdc/0x15e2 [ 653.761375][ T5420] kstrdup+0x3a/0x70 [ 653.765277][ T5420] ? btrfs_remount+0x11f0/0x11f0 [ 653.770218][ T5420] btrfs_mount+0xdc/0x15e2 [ 653.774636][ T5420] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 653.780271][ T5420] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 653.786519][ T5420] ? should_fail+0x1de/0x852 [ 653.791122][ T5420] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 653.796934][ T5420] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 653.803176][ T5420] ? btrfs_remount+0x11f0/0x11f0 [ 653.808123][ T5420] ? rcu_read_lock_sched_held+0x110/0x130 [ 653.813844][ T5420] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 653.820090][ T5420] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 23:08:10 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x6c000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 653.825506][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 653.826328][ T5420] ? vfs_parse_fs_string+0x111/0x170 [ 653.826344][ T5420] ? vfs_parse_fs_string+0x111/0x170 [ 653.826362][ T5420] ? rcu_read_lock_sched_held+0x110/0x130 [ 653.832104][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 653.837336][ T5420] ? kfree+0x1f7/0x220 [ 653.837352][ T5420] ? vfs_parse_fs_string+0x116/0x170 [ 653.837366][ T5420] ? vfs_parse_fs_param+0x540/0x540 [ 653.837395][ T5420] ? btrfs_remount+0x11f0/0x11f0 [ 653.873511][ T5420] legacy_get_tree+0x108/0x220 [ 653.878282][ T5420] ? legacy_get_tree+0x108/0x220 [ 653.883225][ T5420] ? legacy_parse_monolithic+0x11f/0x180 [ 653.888860][ T5420] vfs_get_tree+0x8e/0x390 [ 653.893282][ T5420] do_mount+0x138c/0x1c00 [ 653.897622][ T5420] ? copy_mount_string+0x40/0x40 [ 653.902571][ T5420] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 653.908816][ T5420] ? copy_mount_options+0x2db/0x3f0 [ 653.914019][ T5420] ksys_mount+0xdb/0x150 [ 653.918282][ T5420] __x64_sys_mount+0xbe/0x150 [ 653.922974][ T5420] do_syscall_64+0xfd/0x680 [ 653.927486][ T5420] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 653.933375][ T5420] RIP: 0033:0x45bcca [ 653.937278][ T5420] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 653.956876][ T5420] RSP: 002b:00007f34331e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 653.965281][ T5420] RAX: ffffffffffffffda RBX: 00007f34331e1b40 RCX: 000000000045bcca [ 653.973252][ T5420] RDX: 00007f34331e1ae0 RSI: 00000000200000c0 RDI: 00007f34331e1b00 [ 653.981221][ T5420] RBP: 0000000000000001 R08: 00007f34331e1b40 R09: 00007f34331e1ae0 [ 653.989199][ T5420] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 653.997171][ T5420] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:08:11 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd0") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:08:11 executing program 1 (fault-call:0 fault-nth:66): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:08:11 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x800e0000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:11 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0xfffffffffffff000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:11 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x4000000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:11 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x80350000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 654.255946][ T5443] FAULT_INJECTION: forcing a failure. [ 654.255946][ T5443] name failslab, interval 1, probability 0, space 0, times 0 [ 654.309311][ T5443] CPU: 0 PID: 5443 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 654.318308][ T5443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 654.328383][ T5443] Call Trace: [ 654.331692][ T5443] dump_stack+0x172/0x1f0 [ 654.336047][ T5443] should_fail.cold+0xa/0x15 [ 654.340664][ T5443] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 654.346495][ T5443] ? ___might_sleep+0x163/0x280 [ 654.351377][ T5443] __should_failslab+0x121/0x190 [ 654.356326][ T5443] should_failslab+0x9/0x14 [ 654.360846][ T5443] kmem_cache_alloc_trace+0x2ce/0x750 [ 654.368058][ T5443] alloc_fs_context+0x5a/0x690 [ 654.372832][ T5443] fs_context_for_mount+0x25/0x30 [ 654.377866][ T5443] vfs_kern_mount.part.0+0x28/0xf0 [ 654.382980][ T5443] vfs_kern_mount+0x40/0x60 [ 654.387495][ T5443] btrfs_mount+0x2b4/0x15e2 [ 654.391999][ T5443] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 654.397635][ T5443] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 654.403875][ T5443] ? should_fail+0x1de/0x852 [ 654.408474][ T5443] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 654.414287][ T5443] ? btrfs_remount+0x11f0/0x11f0 [ 654.419232][ T5443] ? rcu_read_lock_sched_held+0x110/0x130 [ 654.424950][ T5443] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 654.431197][ T5443] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 654.437443][ T5443] ? vfs_parse_fs_string+0x111/0x170 [ 654.442729][ T5443] ? vfs_parse_fs_string+0x111/0x170 [ 654.448018][ T5443] ? rcu_read_lock_sched_held+0x110/0x130 [ 654.453743][ T5443] ? kfree+0x1f7/0x220 [ 654.457825][ T5443] ? vfs_parse_fs_string+0x116/0x170 [ 654.463116][ T5443] ? vfs_parse_fs_param+0x540/0x540 [ 654.468324][ T5443] ? btrfs_remount+0x11f0/0x11f0 [ 654.473274][ T5443] legacy_get_tree+0x108/0x220 [ 654.478043][ T5443] ? legacy_get_tree+0x108/0x220 [ 654.482980][ T5443] ? legacy_parse_monolithic+0x11f/0x180 [ 654.488617][ T5443] vfs_get_tree+0x8e/0x390 [ 654.493039][ T5443] do_mount+0x138c/0x1c00 [ 654.497383][ T5443] ? copy_mount_string+0x40/0x40 [ 654.502333][ T5443] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 654.508581][ T5443] ? copy_mount_options+0x2db/0x3f0 [ 654.513783][ T5443] ksys_mount+0xdb/0x150 [ 654.518038][ T5443] __x64_sys_mount+0xbe/0x150 [ 654.522722][ T5443] do_syscall_64+0xfd/0x680 [ 654.527232][ T5443] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 654.533122][ T5443] RIP: 0033:0x45bcca [ 654.537016][ T5443] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 23:08:11 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\xff', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:08:11 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x4305000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:11 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x81000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:11 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:08:11 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 654.556632][ T5443] RSP: 002b:00007f34331e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 654.565055][ T5443] RAX: ffffffffffffffda RBX: 00007f34331e1b40 RCX: 000000000045bcca [ 654.573026][ T5443] RDX: 00007f34331e1ae0 RSI: 00000000200000c0 RDI: 00007f34331e1b00 [ 654.580995][ T5443] RBP: 0000000000000001 R08: 00007f34331e1b40 R09: 00007f34331e1ae0 [ 654.588964][ T5443] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 654.596939][ T5443] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:08:11 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x6c00000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:11 executing program 1 (fault-call:0 fault-nth:67): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:08:11 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x86ddffff]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:11 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x4]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:11 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:08:11 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x800e000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:11 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x88470000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 654.835997][ T5471] FAULT_INJECTION: forcing a failure. [ 654.835997][ T5471] name failslab, interval 1, probability 0, space 0, times 0 [ 654.883934][ T5471] CPU: 0 PID: 5471 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 654.892912][ T5471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 654.892928][ T5471] Call Trace: [ 654.906290][ T5471] dump_stack+0x172/0x1f0 [ 654.910642][ T5471] should_fail.cold+0xa/0x15 [ 654.910659][ T5471] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 654.910679][ T5471] ? ___might_sleep+0x163/0x280 [ 654.925900][ T5471] __should_failslab+0x121/0x190 [ 654.930840][ T5471] should_failslab+0x9/0x14 [ 654.935353][ T5471] kmem_cache_alloc_trace+0x2ce/0x750 [ 654.940730][ T5471] ? lockdep_init_map+0x1be/0x6d0 [ 654.945772][ T5471] legacy_init_fs_context+0x48/0xe0 [ 654.950969][ T5471] ? generic_parse_monolithic+0x200/0x200 [ 654.956688][ T5471] alloc_fs_context+0x3a7/0x690 [ 654.961556][ T5471] fs_context_for_mount+0x25/0x30 [ 654.966587][ T5471] vfs_kern_mount.part.0+0x28/0xf0 [ 654.971707][ T5471] vfs_kern_mount+0x40/0x60 [ 654.976219][ T5471] btrfs_mount+0x2b4/0x15e2 [ 654.980725][ T5471] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 654.986359][ T5471] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 654.992600][ T5471] ? should_fail+0x1de/0x852 [ 654.997194][ T5471] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 655.003006][ T5471] ? btrfs_remount+0x11f0/0x11f0 [ 655.007955][ T5471] ? rcu_read_lock_sched_held+0x110/0x130 [ 655.013673][ T5471] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 655.019916][ T5471] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 655.026163][ T5471] ? vfs_parse_fs_string+0x111/0x170 [ 655.031451][ T5471] ? vfs_parse_fs_string+0x111/0x170 [ 655.036742][ T5471] ? rcu_read_lock_sched_held+0x110/0x130 [ 655.042461][ T5471] ? kfree+0x1f7/0x220 [ 655.046534][ T5471] ? vfs_parse_fs_string+0x116/0x170 [ 655.051819][ T5471] ? vfs_parse_fs_param+0x540/0x540 [ 655.057027][ T5471] ? btrfs_remount+0x11f0/0x11f0 [ 655.061969][ T5471] legacy_get_tree+0x108/0x220 [ 655.066772][ T5471] ? legacy_get_tree+0x108/0x220 [ 655.071711][ T5471] ? legacy_parse_monolithic+0x11f/0x180 [ 655.077351][ T5471] vfs_get_tree+0x8e/0x390 [ 655.081772][ T5471] do_mount+0x138c/0x1c00 [ 655.086108][ T5471] ? copy_mount_string+0x40/0x40 [ 655.091056][ T5471] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 655.097299][ T5471] ? copy_mount_options+0x2db/0x3f0 [ 655.102504][ T5471] ksys_mount+0xdb/0x150 [ 655.106750][ T5471] __x64_sys_mount+0xbe/0x150 [ 655.111436][ T5471] do_syscall_64+0xfd/0x680 [ 655.115947][ T5471] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 655.121836][ T5471] RIP: 0033:0x45bcca [ 655.125737][ T5471] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 655.145532][ T5471] RSP: 002b:00007f34331e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 655.153944][ T5471] RAX: ffffffffffffffda RBX: 00007f34331e1b40 RCX: 000000000045bcca [ 655.162003][ T5471] RDX: 00007f34331e1ae0 RSI: 00000000200000c0 RDI: 00007f34331e1b00 [ 655.169976][ T5471] RBP: 0000000000000001 R08: 00007f34331e1b40 R09: 00007f34331e1ae0 [ 655.177955][ T5471] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 655.185927][ T5471] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:08:12 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\xff', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:08:12 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x6]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:12 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x8035000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:12 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:08:12 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x88480000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:12 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x8100000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:12 executing program 1 (fault-call:0 fault-nth:68): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:08:12 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:08:12 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x88640000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:12 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x8]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:12 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x86ddffff00000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 655.473066][ T5499] FAULT_INJECTION: forcing a failure. [ 655.473066][ T5499] name failslab, interval 1, probability 0, space 0, times 0 [ 655.500232][ T5499] CPU: 0 PID: 5499 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 655.509206][ T5499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 655.509211][ T5499] Call Trace: 23:08:12 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x88a8ffff]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 655.509232][ T5499] dump_stack+0x172/0x1f0 [ 655.509256][ T5499] should_fail.cold+0xa/0x15 [ 655.509274][ T5499] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 655.509293][ T5499] ? ___might_sleep+0x163/0x280 [ 655.509314][ T5499] __should_failslab+0x121/0x190 [ 655.509329][ T5499] should_failslab+0x9/0x14 [ 655.509341][ T5499] kmem_cache_alloc_trace+0x2ce/0x750 [ 655.509372][ T5499] alloc_fs_context+0x5a/0x690 [ 655.542335][ T5499] fs_context_for_mount+0x25/0x30 [ 655.542353][ T5499] vfs_kern_mount.part.0+0x28/0xf0 [ 655.542371][ T5499] vfs_kern_mount+0x40/0x60 [ 655.557152][ T5499] btrfs_mount+0x2b4/0x15e2 [ 655.557168][ T5499] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 655.557182][ T5499] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 655.557197][ T5499] ? should_fail+0x1de/0x852 [ 655.557211][ T5499] ? retint_kernel+0x2b/0x2b [ 655.557227][ T5499] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 655.557249][ T5499] ? btrfs_remount+0x11f0/0x11f0 [ 655.567115][ T5499] ? rcu_read_lock_sched_held+0x110/0x130 [ 655.567131][ T5499] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 655.567145][ T5499] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 655.567164][ T5499] ? vfs_parse_fs_string+0x111/0x170 [ 655.567177][ T5499] ? vfs_parse_fs_string+0x111/0x170 [ 655.567195][ T5499] ? rcu_read_lock_sched_held+0x110/0x130 [ 655.647492][ T5499] ? kfree+0x1f7/0x220 [ 655.647513][ T5499] ? vfs_parse_fs_string+0x116/0x170 [ 655.647535][ T5499] ? vfs_parse_fs_param+0x540/0x540 [ 655.656873][ T5499] ? btrfs_remount+0x11f0/0x11f0 [ 655.656890][ T5499] legacy_get_tree+0x108/0x220 [ 655.656903][ T5499] ? legacy_get_tree+0x108/0x220 [ 655.656915][ T5499] ? legacy_parse_monolithic+0x11f/0x180 [ 655.656933][ T5499] vfs_get_tree+0x8e/0x390 [ 655.656948][ T5499] do_mount+0x138c/0x1c00 [ 655.656966][ T5499] ? copy_mount_string+0x40/0x40 [ 655.656987][ T5499] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 655.656998][ T5499] ? copy_mount_options+0x2db/0x3f0 [ 655.657016][ T5499] ksys_mount+0xdb/0x150 [ 655.711890][ T5499] __x64_sys_mount+0xbe/0x150 [ 655.716578][ T5499] do_syscall_64+0xfd/0x680 [ 655.721086][ T5499] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 655.726982][ T5499] RIP: 0033:0x45bcca [ 655.730879][ T5499] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 655.750483][ T5499] RSP: 002b:00007f34331e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 655.758895][ T5499] RAX: ffffffffffffffda RBX: 00007f34331e1b40 RCX: 000000000045bcca [ 655.766872][ T5499] RDX: 00007f34331e1ae0 RSI: 00000000200000c0 RDI: 00007f34331e1b00 [ 655.774850][ T5499] RBP: 0000000000000001 R08: 00007f34331e1b40 R09: 00007f34331e1ae0 [ 655.782821][ T5499] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 655.790973][ T5499] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:08:12 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xd]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:12 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x88caffff]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:12 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x8847000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:12 executing program 1 (fault-call:0 fault-nth:69): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:08:12 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:08:12 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:08:13 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x8848000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 656.009630][ T5521] FAULT_INJECTION: forcing a failure. [ 656.009630][ T5521] name failslab, interval 1, probability 0, space 0, times 0 [ 656.037596][ T5521] CPU: 0 PID: 5521 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 656.046665][ T5521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 656.056731][ T5521] Call Trace: 23:08:13 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x89060000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:13 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x28]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:13 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) [ 656.060034][ T5521] dump_stack+0x172/0x1f0 [ 656.064372][ T5521] should_fail.cold+0xa/0x15 [ 656.068978][ T5521] ? create_page_buffers+0x222/0x390 [ 656.074281][ T5521] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 656.080198][ T5521] __should_failslab+0x121/0x190 [ 656.085160][ T5521] should_failslab+0x9/0x14 [ 656.089679][ T5521] kmem_cache_alloc+0x47/0x6f0 [ 656.094456][ T5521] ? ___might_sleep+0x163/0x280 [ 656.099329][ T5521] ? mempool_alloc+0x380/0x380 [ 656.104100][ T5521] mempool_alloc_slab+0x47/0x60 [ 656.108955][ T5521] mempool_alloc+0x169/0x380 [ 656.113553][ T5521] ? mempool_destroy+0x40/0x40 [ 656.118318][ T5521] ? find_held_lock+0x35/0x130 [ 656.123082][ T5521] ? create_empty_buffers+0x59e/0x840 [ 656.128456][ T5521] ? kasan_check_write+0x14/0x20 [ 656.133396][ T5521] bio_alloc_bioset+0x3b9/0x680 [ 656.138252][ T5521] ? bvec_alloc+0x2f0/0x2f0 [ 656.142766][ T5521] submit_bh_wbc+0x133/0x7f0 [ 656.147365][ T5521] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 656.153626][ T5521] block_read_full_page+0x7e1/0xd60 [ 656.158829][ T5521] ? check_disk_change+0x140/0x140 [ 656.163949][ T5521] ? __bread_gfp+0x300/0x300 [ 656.168544][ T5521] ? add_to_page_cache_lru+0x34e/0x760 [ 656.174004][ T5521] ? add_to_page_cache_locked+0x40/0x40 [ 656.179555][ T5521] blkdev_readpage+0x1d/0x30 [ 656.184163][ T5521] do_read_cache_page+0x14b5/0x1f10 [ 656.189384][ T5521] ? iput+0x530/0x8d0 [ 656.193395][ T5521] ? filemap_fault+0x2850/0x2850 [ 656.198359][ T5521] ? bd_may_claim+0xd0/0xd0 [ 656.202881][ T5521] ? lookup_bdev.part.0+0x10e/0x1b0 [ 656.208097][ T5521] ? blkdev_open+0x290/0x290 [ 656.212861][ T5521] ? lock_downgrade+0x880/0x880 [ 656.217725][ T5521] read_cache_page_gfp+0x28/0x30 [ 656.222668][ T5521] btrfs_scan_one_device+0x19b/0x720 [ 656.227953][ T5521] ? kfree+0x170/0x220 [ 656.232028][ T5521] ? device_list_add+0x14d0/0x14d0 [ 656.237141][ T5521] ? trace_hardirqs_off_caller+0x190/0x220 [ 656.242951][ T5521] ? btrfs_mount_root+0xb36/0x1220 [ 656.248071][ T5521] btrfs_mount_root+0x718/0x1220 [ 656.253019][ T5521] ? btrfs_decode_error+0x70/0x70 [ 656.258048][ T5521] ? rcu_read_lock_sched_held+0x110/0x130 [ 656.263770][ T5521] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 656.270020][ T5521] ? vfs_parse_fs_string+0x111/0x170 [ 656.275309][ T5521] ? vfs_parse_fs_string+0x111/0x170 [ 656.280601][ T5521] ? rcu_read_lock_sched_held+0x110/0x130 [ 656.286322][ T5521] ? kfree+0x1f7/0x220 [ 656.290397][ T5521] ? vfs_parse_fs_string+0x116/0x170 [ 656.295684][ T5521] ? vfs_parse_fs_param+0x540/0x540 [ 656.300888][ T5521] ? btrfs_decode_error+0x70/0x70 [ 656.305913][ T5521] legacy_get_tree+0x108/0x220 [ 656.310675][ T5521] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 656.316919][ T5521] vfs_get_tree+0x8e/0x390 [ 656.321345][ T5521] fc_mount+0x17/0xc0 [ 656.325332][ T5521] vfs_kern_mount.part.0+0xd8/0xf0 [ 656.330450][ T5521] vfs_kern_mount+0x40/0x60 [ 656.334957][ T5521] btrfs_mount+0x2b4/0x15e2 [ 656.339453][ T5521] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 656.345075][ T5521] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 656.351293][ T5521] ? should_fail+0x1de/0x852 [ 656.355866][ T5521] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 656.361653][ T5521] ? btrfs_remount+0x11f0/0x11f0 [ 656.366616][ T5521] ? rcu_read_lock_sched_held+0x110/0x130 [ 656.372344][ T5521] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 656.378722][ T5521] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 656.384966][ T5521] ? vfs_parse_fs_string+0x111/0x170 [ 656.390289][ T5521] ? vfs_parse_fs_string+0x111/0x170 [ 656.395589][ T5521] ? rcu_read_lock_sched_held+0x110/0x130 [ 656.401317][ T5521] ? kfree+0x1f7/0x220 [ 656.405393][ T5521] ? vfs_parse_fs_string+0x116/0x170 [ 656.410677][ T5521] ? vfs_parse_fs_param+0x540/0x540 [ 656.415883][ T5521] ? btrfs_remount+0x11f0/0x11f0 [ 656.420820][ T5521] legacy_get_tree+0x108/0x220 [ 656.425759][ T5521] ? legacy_get_tree+0x108/0x220 [ 656.430699][ T5521] ? legacy_parse_monolithic+0x11f/0x180 [ 656.436343][ T5521] vfs_get_tree+0x8e/0x390 [ 656.440761][ T5521] do_mount+0x138c/0x1c00 [ 656.445096][ T5521] ? copy_mount_string+0x40/0x40 [ 656.450035][ T5521] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 656.456275][ T5521] ? _copy_from_user+0x12c/0x1a0 [ 656.461216][ T5521] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 656.467472][ T5521] ? copy_mount_options+0x2db/0x3f0 [ 656.472683][ T5521] ksys_mount+0xdb/0x150 [ 656.476938][ T5521] __x64_sys_mount+0xbe/0x150 [ 656.481619][ T5521] do_syscall_64+0xfd/0x680 [ 656.486127][ T5521] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 656.492023][ T5521] RIP: 0033:0x45bcca [ 656.495920][ T5521] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 656.515523][ T5521] RSP: 002b:00007f34331e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 656.523932][ T5521] RAX: ffffffffffffffda RBX: 00007f34331e1b40 RCX: 000000000045bcca [ 656.531910][ T5521] RDX: 00007f34331e1ae0 RSI: 00000000200000c0 RDI: 00007f34331e1b00 [ 656.539880][ T5521] RBP: 0000000000000001 R08: 00007f34331e1b40 R09: 00007f34331e1ae0 [ 656.547850][ T5521] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 656.555832][ T5521] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:08:13 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x89ffffff]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:13 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x29]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:13 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x8864000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:13 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:08:13 executing program 1 (fault-call:0 fault-nth:70): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 656.676008][ T5531] hfsplus: unable to find HFS+ superblock [ 656.744146][ T5537] hfsplus: unable to find HFS+ superblock [ 656.824172][ T5545] FAULT_INJECTION: forcing a failure. [ 656.824172][ T5545] name failslab, interval 1, probability 0, space 0, times 0 [ 656.837141][ T5545] CPU: 0 PID: 5545 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 656.837170][ T5545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 656.837175][ T5545] Call Trace: [ 656.837198][ T5545] dump_stack+0x172/0x1f0 [ 656.837220][ T5545] should_fail.cold+0xa/0x15 [ 656.837241][ T5545] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 656.837266][ T5545] __should_failslab+0x121/0x190 [ 656.837283][ T5545] should_failslab+0x9/0x14 [ 656.856285][ T5545] kmem_cache_alloc+0x47/0x6f0 [ 656.856311][ T5545] xas_alloc+0x2dc/0x3d0 [ 656.856326][ T5545] xas_create+0x2cd/0x1040 [ 656.856350][ T5545] xas_store+0x9a/0x19b0 [ 656.856364][ T5545] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 656.856381][ T5545] ? xas_start+0x166/0x560 [ 656.912183][ T5545] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 656.918436][ T5545] ? xas_load+0x67/0x150 23:08:13 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\xf9', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:08:13 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xff000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:13 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2b]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:13 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x88a8ffff00000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 656.922693][ T5545] __add_to_page_cache_locked+0x5be/0xe70 [ 656.928420][ T5545] ? file_fdatawait_range+0x70/0x70 [ 656.933631][ T5545] ? __alloc_pages_nodemask+0x61b/0x8d0 [ 656.939202][ T5545] ? count_shadow_nodes+0x830/0x830 [ 656.944430][ T5545] add_to_page_cache_lru+0x1cb/0x760 [ 656.949737][ T5545] ? add_to_page_cache_locked+0x40/0x40 [ 656.955411][ T5545] ? __page_cache_alloc+0x131/0x460 [ 656.960638][ T5545] pagecache_get_page+0x357/0x850 [ 656.965689][ T5545] __getblk_gfp+0x27e/0x970 [ 656.970221][ T5545] ? kasan_check_write+0x14/0x20 [ 656.975187][ T5545] __bread_gfp+0x2f/0x300 [ 656.979539][ T5545] btrfs_read_dev_one_super+0xb6/0x2a0 [ 656.985004][ T5545] btrfs_read_dev_super+0x6c/0xd0 [ 656.985020][ T5545] ? btrfs_read_dev_one_super+0x2a0/0x2a0 [ 656.985042][ T5545] btrfs_get_bdev_and_sb+0xff/0x300 [ 657.000966][ T5545] open_fs_devices+0x68e/0xbd0 [ 657.005747][ T5545] ? find_fsid+0x2e0/0x2e0 [ 657.010630][ T5545] btrfs_open_devices+0x147/0x170 [ 657.015671][ T5545] btrfs_mount_root+0x79a/0x1220 23:08:14 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2c]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 657.020667][ T5545] ? btrfs_decode_error+0x70/0x70 [ 657.025702][ T5545] ? rcu_read_lock_sched_held+0x110/0x130 [ 657.031523][ T5545] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 657.037784][ T5545] ? vfs_parse_fs_string+0x111/0x170 [ 657.037798][ T5545] ? vfs_parse_fs_string+0x111/0x170 [ 657.037815][ T5545] ? rcu_read_lock_sched_held+0x110/0x130 [ 657.037828][ T5545] ? kfree+0x1f7/0x220 [ 657.037842][ T5545] ? vfs_parse_fs_string+0x116/0x170 [ 657.037857][ T5545] ? vfs_parse_fs_param+0x540/0x540 [ 657.037873][ T5545] ? btrfs_decode_error+0x70/0x70 23:08:14 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x88caffff00000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:14 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xffffa888]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 657.037890][ T5545] legacy_get_tree+0x108/0x220 [ 657.078441][ T5545] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 657.084707][ T5545] vfs_get_tree+0x8e/0x390 [ 657.089139][ T5545] fc_mount+0x17/0xc0 [ 657.093180][ T5545] vfs_kern_mount.part.0+0xd8/0xf0 [ 657.098296][ T5545] vfs_kern_mount+0x40/0x60 [ 657.102813][ T5545] btrfs_mount+0x2b4/0x15e2 [ 657.107328][ T5545] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 657.112969][ T5545] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 657.119223][ T5545] ? should_fail+0x1de/0x852 [ 657.123827][ T5545] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 657.129659][ T5545] ? btrfs_remount+0x11f0/0x11f0 [ 657.134616][ T5545] ? rcu_read_lock_sched_held+0x110/0x130 [ 657.140358][ T5545] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 657.146603][ T5545] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 657.152852][ T5545] ? vfs_parse_fs_string+0x111/0x170 [ 657.158144][ T5545] ? vfs_parse_fs_string+0x111/0x170 [ 657.163470][ T5545] ? rcu_read_lock_sched_held+0x110/0x130 [ 657.169204][ T5545] ? kfree+0x1f7/0x220 [ 657.173280][ T5545] ? vfs_parse_fs_string+0x116/0x170 [ 657.178576][ T5545] ? vfs_parse_fs_param+0x540/0x540 [ 657.183782][ T5545] ? btrfs_remount+0x11f0/0x11f0 [ 657.188725][ T5545] legacy_get_tree+0x108/0x220 [ 657.193493][ T5545] ? legacy_get_tree+0x108/0x220 [ 657.198440][ T5545] ? legacy_parse_monolithic+0x11f/0x180 [ 657.204081][ T5545] vfs_get_tree+0x8e/0x390 [ 657.208505][ T5545] do_mount+0x138c/0x1c00 [ 657.215392][ T5545] ? copy_mount_string+0x40/0x40 [ 657.220333][ T5545] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 657.226574][ T5545] ? _copy_from_user+0x12c/0x1a0 [ 657.231525][ T5545] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 657.237767][ T5545] ? copy_mount_options+0x2db/0x3f0 [ 657.242971][ T5545] ksys_mount+0xdb/0x150 [ 657.247222][ T5545] __x64_sys_mount+0xbe/0x150 [ 657.251901][ T5545] do_syscall_64+0xfd/0x680 [ 657.256410][ T5545] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 657.262303][ T5545] RIP: 0033:0x45bcca [ 657.266199][ T5545] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 657.285808][ T5545] RSP: 002b:00007f34331e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 657.294229][ T5545] RAX: ffffffffffffffda RBX: 00007f34331e1b40 RCX: 000000000045bcca [ 657.302205][ T5545] RDX: 00007f34331e1ae0 RSI: 00000000200000c0 RDI: 00007f34331e1b00 [ 657.310201][ T5545] RBP: 0000000000000001 R08: 00007f34331e1b40 R09: 00007f34331e1ae0 [ 657.318185][ T5545] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 23:08:14 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) [ 657.326164][ T5545] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:08:14 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xffffca88]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:14 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x8906000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:14 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2f]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:14 executing program 1 (fault-call:0 fault-nth:71): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 657.628412][ T5577] FAULT_INJECTION: forcing a failure. [ 657.628412][ T5577] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 657.641753][ T5577] CPU: 0 PID: 5577 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 657.650784][ T5577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 657.660841][ T5577] Call Trace: [ 657.664144][ T5577] dump_stack+0x172/0x1f0 [ 657.668487][ T5577] should_fail.cold+0xa/0x15 [ 657.673083][ T5577] ? btrfs_mount_root+0x12b/0x1220 [ 657.678201][ T5577] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 657.684015][ T5577] ? mark_held_locks+0xf0/0xf0 [ 657.688799][ T5577] should_fail_alloc_page+0x50/0x60 [ 657.694007][ T5577] __alloc_pages_nodemask+0x1a1/0x8d0 [ 657.699979][ T5577] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 657.699994][ T5577] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 657.700004][ T5577] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 657.700017][ T5577] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 657.700036][ T5577] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 657.700055][ T5577] cache_grow_begin+0x9d/0x650 [ 657.700072][ T5577] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 657.711405][ T5577] kmem_cache_alloc_trace+0x67a/0x750 [ 657.723243][ T5577] ? kasan_kmalloc+0x9/0x10 [ 657.749944][ T5577] btrfs_mount_root+0x174/0x1220 [ 657.754973][ T5577] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 657.761235][ T5577] ? btrfs_decode_error+0x70/0x70 [ 657.766278][ T5577] ? rcu_read_lock_sched_held+0x110/0x130 [ 657.772000][ T5577] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 657.778253][ T5577] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 657.784507][ T5577] ? vfs_parse_fs_string+0x111/0x170 [ 657.789804][ T5577] ? vfs_parse_fs_string+0x111/0x170 [ 657.795101][ T5577] ? rcu_read_lock_sched_held+0x110/0x130 [ 657.800830][ T5577] ? kfree+0x1f7/0x220 [ 657.804921][ T5577] ? vfs_parse_fs_string+0x116/0x170 [ 657.810216][ T5577] ? vfs_parse_fs_param+0x540/0x540 [ 657.815417][ T5577] ? btrfs_decode_error+0x70/0x70 [ 657.820442][ T5577] legacy_get_tree+0x108/0x220 23:08:14 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x7f', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:08:14 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:08:14 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x89ffffff00000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:14 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xffffdd86]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:14 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x3c]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 657.825220][ T5577] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 657.831481][ T5577] vfs_get_tree+0x8e/0x390 [ 657.835907][ T5577] fc_mount+0x17/0xc0 [ 657.839902][ T5577] vfs_kern_mount.part.0+0xd8/0xf0 [ 657.845021][ T5577] vfs_kern_mount+0x40/0x60 [ 657.849539][ T5577] btrfs_mount+0x2b4/0x15e2 [ 657.854045][ T5577] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 657.859689][ T5577] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 657.865932][ T5577] ? should_fail+0x1de/0x852 [ 657.870533][ T5577] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 657.876352][ T5577] ? btrfs_remount+0x11f0/0x11f0 [ 657.881304][ T5577] ? rcu_read_lock_sched_held+0x110/0x130 [ 657.887030][ T5577] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 657.893274][ T5577] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 657.899525][ T5577] ? vfs_parse_fs_string+0x111/0x170 [ 657.904822][ T5577] ? vfs_parse_fs_string+0x111/0x170 [ 657.910127][ T5577] ? rcu_read_lock_sched_held+0x110/0x130 [ 657.915855][ T5577] ? kfree+0x1f7/0x220 [ 657.919929][ T5577] ? vfs_parse_fs_string+0x116/0x170 [ 657.925217][ T5577] ? vfs_parse_fs_param+0x540/0x540 [ 657.930421][ T5577] ? btrfs_remount+0x11f0/0x11f0 [ 657.935361][ T5577] legacy_get_tree+0x108/0x220 [ 657.940136][ T5577] ? legacy_get_tree+0x108/0x220 [ 657.945073][ T5577] ? legacy_parse_monolithic+0x11f/0x180 [ 657.951228][ T5577] vfs_get_tree+0x8e/0x390 [ 657.955661][ T5577] do_mount+0x138c/0x1c00 [ 657.960002][ T5577] ? copy_mount_string+0x40/0x40 [ 657.965043][ T5577] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 657.971301][ T5577] ? copy_mount_options+0x2db/0x3f0 23:08:14 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xff00000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 657.976520][ T5577] ksys_mount+0xdb/0x150 [ 657.980770][ T5577] __x64_sys_mount+0xbe/0x150 [ 657.985451][ T5577] do_syscall_64+0xfd/0x680 [ 657.989965][ T5577] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 657.995861][ T5577] RIP: 0033:0x45bcca [ 657.999757][ T5577] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 658.019542][ T5577] RSP: 002b:00007f34331e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 23:08:15 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xfffff000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:15 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x6c]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 658.027972][ T5577] RAX: ffffffffffffffda RBX: 00007f34331e1b40 RCX: 000000000045bcca [ 658.035950][ T5577] RDX: 00007f34331e1ae0 RSI: 00000000200000c0 RDI: 00007f34331e1b00 [ 658.044276][ T5577] RBP: 0000000000000001 R08: 00007f34331e1b40 R09: 00007f34331e1ae0 [ 658.052254][ T5577] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 658.060241][ T5577] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:08:15 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x0, 0x300) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:08:15 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xfffffffffffff000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:15 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xf0]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:15 executing program 1 (fault-call:0 fault-nth:72): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:08:15 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x8c', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:08:15 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xffffff89]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:15 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x0, 0x300) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:08:15 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x2]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:15 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x543]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 658.356566][ T5608] FAULT_INJECTION: forcing a failure. [ 658.356566][ T5608] name failslab, interval 1, probability 0, space 0, times 0 [ 658.400468][ T5608] CPU: 0 PID: 5608 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 658.409449][ T5608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 658.419517][ T5608] Call Trace: [ 658.422817][ T5608] dump_stack+0x172/0x1f0 [ 658.427177][ T5608] should_fail.cold+0xa/0x15 [ 658.431781][ T5608] ? btrfs_mount_root+0x718/0x1220 [ 658.436914][ T5608] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 658.442724][ T5608] ? find_held_lock+0x35/0x130 [ 658.447503][ T5608] ? blk_queue_enter+0xbc5/0xe90 [ 658.452457][ T5608] __should_failslab+0x121/0x190 [ 658.457406][ T5608] should_failslab+0x9/0x14 [ 658.461998][ T5608] kmem_cache_alloc_node+0x56/0x700 [ 658.467211][ T5608] create_task_io_context+0x33/0x450 [ 658.472513][ T5608] generic_make_request_checks+0x1a33/0x2070 [ 658.478512][ T5608] ? trace_event_raw_event_block_rq_requeue+0x640/0x640 [ 658.485449][ T5608] ? ___might_sleep+0x163/0x280 [ 658.490316][ T5608] generic_make_request+0x24c/0x12c0 [ 658.495605][ T5608] ? blk_queue_enter+0xe90/0xe90 [ 658.500631][ T5608] ? find_held_lock+0x35/0x130 [ 658.505404][ T5608] ? guard_bio_eod+0x1ce/0x6c0 [ 658.510172][ T5608] submit_bio+0xba/0x480 [ 658.514416][ T5608] ? submit_bio+0xba/0x480 [ 658.518834][ T5608] ? generic_make_request+0x12c0/0x12c0 [ 658.524389][ T5608] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 658.530118][ T5608] ? guard_bio_eod+0x295/0x6c0 [ 658.534894][ T5608] submit_bh_wbc+0x5f7/0x7f0 [ 658.539497][ T5608] block_read_full_page+0x7e1/0xd60 [ 658.544702][ T5608] ? check_disk_change+0x140/0x140 [ 658.549826][ T5608] ? __bread_gfp+0x300/0x300 [ 658.554423][ T5608] ? add_to_page_cache_lru+0x34e/0x760 [ 658.559889][ T5608] ? add_to_page_cache_locked+0x40/0x40 [ 658.565443][ T5608] blkdev_readpage+0x1d/0x30 [ 658.570036][ T5608] do_read_cache_page+0x14b5/0x1f10 [ 658.575244][ T5608] ? iput+0x530/0x8d0 [ 658.579234][ T5608] ? filemap_fault+0x2850/0x2850 [ 658.584183][ T5608] ? bd_may_claim+0xd0/0xd0 [ 658.588690][ T5608] ? lookup_bdev.part.0+0x10e/0x1b0 [ 658.593893][ T5608] ? blkdev_open+0x290/0x290 [ 658.598486][ T5608] ? lock_downgrade+0x880/0x880 [ 658.603354][ T5608] read_cache_page_gfp+0x28/0x30 [ 658.608301][ T5608] btrfs_scan_one_device+0x19b/0x720 [ 658.613587][ T5608] ? kfree+0x170/0x220 [ 658.617660][ T5608] ? device_list_add+0x14d0/0x14d0 [ 658.622800][ T5608] ? trace_hardirqs_off_caller+0x190/0x220 [ 658.628613][ T5608] ? btrfs_mount_root+0xb36/0x1220 [ 658.633735][ T5608] btrfs_mount_root+0x718/0x1220 [ 658.638685][ T5608] ? btrfs_decode_error+0x70/0x70 [ 658.643723][ T5608] ? rcu_read_lock_sched_held+0x110/0x130 [ 658.649543][ T5608] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 658.655794][ T5608] ? vfs_parse_fs_string+0x111/0x170 [ 658.661090][ T5608] ? vfs_parse_fs_string+0x111/0x170 [ 658.666381][ T5608] ? rcu_read_lock_sched_held+0x110/0x130 [ 658.672104][ T5608] ? kfree+0x1f7/0x220 [ 658.676191][ T5608] ? vfs_parse_fs_string+0x116/0x170 [ 658.681480][ T5608] ? vfs_parse_fs_param+0x540/0x540 [ 658.686683][ T5608] ? btrfs_decode_error+0x70/0x70 [ 658.691713][ T5608] legacy_get_tree+0x108/0x220 [ 658.696485][ T5608] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 658.702727][ T5608] vfs_get_tree+0x8e/0x390 [ 658.707153][ T5608] fc_mount+0x17/0xc0 [ 658.711170][ T5608] vfs_kern_mount.part.0+0xd8/0xf0 [ 658.716377][ T5608] vfs_kern_mount+0x40/0x60 [ 658.720886][ T5608] btrfs_mount+0x2b4/0x15e2 [ 658.725395][ T5608] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 658.731036][ T5608] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 658.737286][ T5608] ? should_fail+0x1de/0x852 [ 658.741884][ T5608] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 658.747700][ T5608] ? btrfs_remount+0x11f0/0x11f0 [ 658.752645][ T5608] ? rcu_read_lock_sched_held+0x110/0x130 [ 658.758365][ T5608] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 658.764605][ T5608] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 658.770852][ T5608] ? vfs_parse_fs_string+0x111/0x170 [ 658.776229][ T5608] ? vfs_parse_fs_string+0x111/0x170 [ 658.781535][ T5608] ? rcu_read_lock_sched_held+0x110/0x130 [ 658.787270][ T5608] ? kfree+0x1f7/0x220 [ 658.791348][ T5608] ? vfs_parse_fs_string+0x116/0x170 [ 658.796640][ T5608] ? vfs_parse_fs_param+0x540/0x540 23:08:15 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x4]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 658.801844][ T5608] ? btrfs_remount+0x11f0/0x11f0 [ 658.806791][ T5608] legacy_get_tree+0x108/0x220 [ 658.811568][ T5608] ? legacy_get_tree+0x108/0x220 [ 658.816514][ T5608] ? legacy_parse_monolithic+0x11f/0x180 [ 658.822157][ T5608] vfs_get_tree+0x8e/0x390 [ 658.826584][ T5608] do_mount+0x138c/0x1c00 [ 658.830921][ T5608] ? copy_mount_string+0x40/0x40 [ 658.835868][ T5608] ? __sanitizer_cov_trace_const_cmp2+0x20/0x20 [ 658.842116][ T5608] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 658.848367][ T5608] ? copy_mount_options+0x2db/0x3f0 [ 658.853569][ T5608] ksys_mount+0xdb/0x150 [ 658.857816][ T5608] __x64_sys_mount+0xbe/0x150 [ 658.862501][ T5608] do_syscall_64+0xfd/0x680 [ 658.867010][ T5608] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 658.872903][ T5608] RIP: 0033:0x45bcca [ 658.876804][ T5608] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 23:08:15 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xf0ffffffffffff]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:15 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x0, 0x300) connect$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:08:15 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x600]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 658.896414][ T5608] RSP: 002b:00007f34331e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 658.904913][ T5608] RAX: ffffffffffffffda RBX: 00007f34331e1b40 RCX: 000000000045bcca [ 658.912884][ T5608] RDX: 00007f34331e1ae0 RSI: 00000000200000c0 RDI: 00007f34331e1b00 [ 658.920859][ T5608] RBP: 0000000000000001 R08: 00007f34331e1b40 R09: 00007f34331e1ae0 [ 658.928831][ T5608] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 658.936800][ T5608] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:08:16 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x100000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:16 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x608]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:16 executing program 1 (fault-call:0 fault-nth:73): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:08:16 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\xf5', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:08:16 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x6]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:16 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:08:16 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x200000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 659.262714][ T5638] FAULT_INJECTION: forcing a failure. [ 659.262714][ T5638] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 659.275965][ T5638] CPU: 0 PID: 5638 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 659.284902][ T5638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 659.294963][ T5638] Call Trace: [ 659.298267][ T5638] dump_stack+0x172/0x1f0 [ 659.302608][ T5638] should_fail.cold+0xa/0x15 [ 659.307205][ T5638] ? vfs_kern_mount+0x40/0x60 [ 659.311891][ T5638] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 659.317713][ T5638] ? mark_held_locks+0xf0/0xf0 [ 659.322496][ T5638] should_fail_alloc_page+0x50/0x60 [ 659.327712][ T5638] __alloc_pages_nodemask+0x1a1/0x8d0 [ 659.333098][ T5638] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 659.338738][ T5638] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 659.344458][ T5638] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 659.350090][ T5638] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 659.356430][ T5638] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 659.362241][ T5638] cache_grow_begin+0x9d/0x650 [ 659.367003][ T5638] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 659.373247][ T5638] kmem_cache_alloc_trace+0x67a/0x750 [ 659.378616][ T5638] ? kasan_kmalloc+0x9/0x10 [ 659.383146][ T5638] btrfs_mount_root+0x1d0/0x1220 [ 659.388101][ T5638] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 659.394357][ T5638] ? btrfs_decode_error+0x70/0x70 [ 659.399399][ T5638] ? rcu_read_lock_sched_held+0x110/0x130 [ 659.405136][ T5638] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 659.411383][ T5638] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 659.417631][ T5638] ? vfs_parse_fs_string+0x111/0x170 [ 659.422927][ T5638] ? vfs_parse_fs_string+0x111/0x170 [ 659.428213][ T5638] ? rcu_read_lock_sched_held+0x110/0x130 [ 659.433929][ T5638] ? kfree+0x1f7/0x220 [ 659.438005][ T5638] ? vfs_parse_fs_string+0x116/0x170 [ 659.443294][ T5638] ? vfs_parse_fs_param+0x540/0x540 [ 659.448498][ T5638] ? btrfs_decode_error+0x70/0x70 [ 659.453526][ T5638] legacy_get_tree+0x108/0x220 [ 659.458296][ T5638] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 659.464636][ T5638] vfs_get_tree+0x8e/0x390 [ 659.469061][ T5638] fc_mount+0x17/0xc0 [ 659.473057][ T5638] vfs_kern_mount.part.0+0xd8/0xf0 [ 659.478180][ T5638] vfs_kern_mount+0x40/0x60 [ 659.482691][ T5638] btrfs_mount+0x2b4/0x15e2 [ 659.487197][ T5638] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 659.492833][ T5638] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 659.499078][ T5638] ? should_fail+0x1de/0x852 [ 659.503673][ T5638] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 659.509493][ T5638] ? btrfs_remount+0x11f0/0x11f0 [ 659.514443][ T5638] ? rcu_read_lock_sched_held+0x110/0x130 [ 659.520166][ T5638] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 659.526408][ T5638] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 659.532656][ T5638] ? vfs_parse_fs_string+0x111/0x170 [ 659.537956][ T5638] ? vfs_parse_fs_string+0x111/0x170 [ 659.543248][ T5638] ? rcu_read_lock_sched_held+0x110/0x130 [ 659.548968][ T5638] ? kfree+0x1f7/0x220 [ 659.553052][ T5638] ? vfs_parse_fs_string+0x116/0x170 [ 659.558341][ T5638] ? vfs_parse_fs_param+0x540/0x540 [ 659.563551][ T5638] ? btrfs_remount+0x11f0/0x11f0 [ 659.568488][ T5638] legacy_get_tree+0x108/0x220 [ 659.573253][ T5638] ? legacy_get_tree+0x108/0x220 [ 659.578194][ T5638] ? legacy_parse_monolithic+0x11f/0x180 [ 659.583844][ T5638] vfs_get_tree+0x8e/0x390 [ 659.588268][ T5638] do_mount+0x138c/0x1c00 [ 659.592607][ T5638] ? copy_mount_string+0x40/0x40 [ 659.597559][ T5638] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 659.603807][ T5638] ? copy_mount_options+0x2db/0x3f0 [ 659.609030][ T5638] ksys_mount+0xdb/0x150 [ 659.613288][ T5638] __x64_sys_mount+0xbe/0x150 [ 659.617975][ T5638] do_syscall_64+0xfd/0x680 [ 659.622485][ T5638] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 659.628376][ T5638] RIP: 0033:0x45bcca [ 659.632278][ T5638] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 659.651894][ T5638] RSP: 002b:00007f34331e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 23:08:16 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x400000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:16 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x689]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:16 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x8]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 659.660424][ T5638] RAX: ffffffffffffffda RBX: 00007f34331e1b40 RCX: 000000000045bcca [ 659.668397][ T5638] RDX: 00007f34331e1ae0 RSI: 00000000200000c0 RDI: 00007f34331e1b00 [ 659.676683][ T5638] RBP: 0000000000000001 R08: 00007f34331e1b40 R09: 00007f34331e1ae0 [ 659.684660][ T5638] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 659.692634][ T5638] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:08:16 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:08:16 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x600000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:16 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x806]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:16 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0xd]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:16 executing program 1 (fault-call:0 fault-nth:74): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 659.963360][ T5667] FAULT_INJECTION: forcing a failure. [ 659.963360][ T5667] name fail_page_alloc, interval 1, probability 0, space 0, times 0 23:08:16 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\xf6', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:08:16 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x800000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:16 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:08:17 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x28]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:17 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xd00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 660.005561][ T5667] CPU: 0 PID: 5667 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 660.014721][ T5667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 660.024787][ T5667] Call Trace: [ 660.028097][ T5667] dump_stack+0x172/0x1f0 [ 660.032452][ T5667] should_fail.cold+0xa/0x15 [ 660.037064][ T5667] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 660.042887][ T5667] ? ___might_sleep+0x163/0x280 [ 660.047756][ T5667] should_fail_alloc_page+0x50/0x60 [ 660.052963][ T5667] __alloc_pages_nodemask+0x1a1/0x8d0 [ 660.058359][ T5667] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 660.064103][ T5667] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 660.070364][ T5667] alloc_pages_current+0x107/0x210 [ 660.075487][ T5667] __page_cache_alloc+0x2bd/0x460 [ 660.080515][ T5667] do_read_cache_page+0xc0d/0x1f10 [ 660.085631][ T5667] ? iput+0x530/0x8d0 [ 660.089618][ T5667] ? filemap_fault+0x2850/0x2850 [ 660.094565][ T5667] ? bd_may_claim+0xd0/0xd0 [ 660.099081][ T5667] ? lookup_bdev.part.0+0x10e/0x1b0 [ 660.104279][ T5667] ? blkdev_open+0x290/0x290 [ 660.108868][ T5667] ? lock_downgrade+0x880/0x880 [ 660.113729][ T5667] read_cache_page_gfp+0x28/0x30 [ 660.118677][ T5667] btrfs_scan_one_device+0x19b/0x720 [ 660.123962][ T5667] ? kfree+0x170/0x220 [ 660.128039][ T5667] ? device_list_add+0x14d0/0x14d0 [ 660.133157][ T5667] ? trace_hardirqs_off_caller+0x190/0x220 [ 660.138970][ T5667] ? btrfs_mount_root+0xb36/0x1220 [ 660.144096][ T5667] btrfs_mount_root+0x718/0x1220 [ 660.149074][ T5667] ? btrfs_decode_error+0x70/0x70 [ 660.154105][ T5667] ? rcu_read_lock_sched_held+0x110/0x130 [ 660.159826][ T5667] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 660.166272][ T5667] ? vfs_parse_fs_string+0x111/0x170 [ 660.173306][ T5667] ? vfs_parse_fs_string+0x111/0x170 [ 660.178602][ T5667] ? rcu_read_lock_sched_held+0x110/0x130 [ 660.184321][ T5667] ? kfree+0x1f7/0x220 [ 660.188396][ T5667] ? vfs_parse_fs_string+0x116/0x170 [ 660.193684][ T5667] ? vfs_parse_fs_param+0x540/0x540 [ 660.199323][ T5667] ? btrfs_decode_error+0x70/0x70 [ 660.204350][ T5667] legacy_get_tree+0x108/0x220 [ 660.209207][ T5667] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 660.215715][ T5667] vfs_get_tree+0x8e/0x390 [ 660.220143][ T5667] fc_mount+0x17/0xc0 [ 660.224130][ T5667] vfs_kern_mount.part.0+0xd8/0xf0 [ 660.229241][ T5667] vfs_kern_mount+0x40/0x60 [ 660.233752][ T5667] btrfs_mount+0x2b4/0x15e2 [ 660.238255][ T5667] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 660.243888][ T5667] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 660.250131][ T5667] ? should_fail+0x1de/0x852 [ 660.254727][ T5667] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 660.260542][ T5667] ? btrfs_remount+0x11f0/0x11f0 [ 660.265489][ T5667] ? rcu_read_lock_sched_held+0x110/0x130 [ 660.271209][ T5667] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 660.277451][ T5667] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 660.283700][ T5667] ? vfs_parse_fs_string+0x111/0x170 [ 660.288995][ T5667] ? vfs_parse_fs_string+0x111/0x170 [ 660.294282][ T5667] ? rcu_read_lock_sched_held+0x110/0x130 [ 660.300008][ T5667] ? kfree+0x1f7/0x220 [ 660.304086][ T5667] ? vfs_parse_fs_string+0x116/0x170 [ 660.309373][ T5667] ? vfs_parse_fs_param+0x540/0x540 [ 660.314574][ T5667] ? btrfs_remount+0x11f0/0x11f0 [ 660.319516][ T5667] legacy_get_tree+0x108/0x220 [ 660.324280][ T5667] ? legacy_get_tree+0x108/0x220 [ 660.329226][ T5667] ? legacy_parse_monolithic+0x11f/0x180 [ 660.334951][ T5667] vfs_get_tree+0x8e/0x390 [ 660.339375][ T5667] do_mount+0x138c/0x1c00 [ 660.343714][ T5667] ? copy_mount_string+0x40/0x40 [ 660.348655][ T5667] ? copy_mount_options+0x234/0x3f0 [ 660.353858][ T5667] ? copy_mount_options+0x245/0x3f0 [ 660.359064][ T5667] ? __sanitizer_cov_trace_pc+0x26/0x50 [ 660.364617][ T5667] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 660.370862][ T5667] ? copy_mount_options+0x2db/0x3f0 [ 660.376068][ T5667] ksys_mount+0xdb/0x150 [ 660.380329][ T5667] __x64_sys_mount+0xbe/0x150 [ 660.385021][ T5667] do_syscall_64+0xfd/0x680 [ 660.389531][ T5667] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 660.395417][ T5667] RIP: 0033:0x45bcca [ 660.399310][ T5667] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 660.418917][ T5667] RSP: 002b:00007f34331e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 660.427333][ T5667] RAX: ffffffffffffffda RBX: 00007f34331e1b40 RCX: 000000000045bcca [ 660.435301][ T5667] RDX: 00007f34331e1ae0 RSI: 00000000200000c0 RDI: 00007f34331e1b00 [ 660.443273][ T5667] RBP: 0000000000000001 R08: 00007f34331e1b40 R09: 00007f34331e1ae0 23:08:17 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x806000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 660.451243][ T5667] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 660.459213][ T5667] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:08:17 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xe80]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:17 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r0, 0x0, 0x0) 23:08:17 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x29]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:17 executing program 1 (fault-call:0 fault-nth:75): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:08:17 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xd00000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:17 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r0, 0x0, 0x0) [ 660.713341][ T5693] FAULT_INJECTION: forcing a failure. [ 660.713341][ T5693] name failslab, interval 1, probability 0, space 0, times 0 [ 660.768219][ T5693] CPU: 0 PID: 5693 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 660.777208][ T5693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 660.787270][ T5693] Call Trace: [ 660.790573][ T5693] dump_stack+0x172/0x1f0 [ 660.794917][ T5693] should_fail.cold+0xa/0x15 [ 660.794948][ T5693] ? alloc_page_buffers+0x16a/0x5c0 [ 660.804735][ T5693] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 660.810558][ T5693] ? __lock_acquire+0x54f/0x5490 23:08:17 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:08:17 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x2b]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 660.815498][ T5693] ? mark_held_locks+0xf0/0xf0 [ 660.815520][ T5693] __should_failslab+0x121/0x190 [ 660.815535][ T5693] should_failslab+0x9/0x14 [ 660.815546][ T5693] kmem_cache_alloc+0x47/0x6f0 [ 660.815562][ T5693] ? ___might_sleep+0x163/0x280 [ 660.815579][ T5693] ? mempool_alloc+0x380/0x380 [ 660.815592][ T5693] mempool_alloc_slab+0x47/0x60 [ 660.815606][ T5693] mempool_alloc+0x169/0x380 [ 660.815625][ T5693] ? mempool_destroy+0x40/0x40 [ 660.815647][ T5693] ? mark_held_locks+0xa4/0xf0 [ 660.839497][ T5693] ? lock_downgrade+0x880/0x880 [ 660.849112][ T5693] ? __find_get_block+0x9b8/0xcf0 [ 660.849128][ T5693] ? __getblk_gfp+0x1b1/0x970 [ 660.877736][ T5693] ? __find_get_block+0x9b8/0xcf0 [ 660.882764][ T5693] ? lockdep_hardirqs_on+0x418/0x5d0 [ 660.888061][ T5693] bio_alloc_bioset+0x3b9/0x680 [ 660.892916][ T5693] ? __find_get_block+0x317/0xcf0 [ 660.897945][ T5693] ? bvec_alloc+0x2f0/0x2f0 [ 660.902467][ T5693] submit_bh_wbc+0x133/0x7f0 [ 660.907069][ T5693] __bread_gfp+0x13d/0x300 [ 660.911489][ T5693] btrfs_read_dev_one_super+0xb6/0x2a0 23:08:17 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2800]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 660.916950][ T5693] btrfs_read_dev_super+0x6c/0xd0 [ 660.921991][ T5693] ? btrfs_read_dev_one_super+0x2a0/0x2a0 [ 660.927723][ T5693] btrfs_get_bdev_and_sb+0xff/0x300 [ 660.932934][ T5693] open_fs_devices+0x68e/0xbd0 [ 660.937722][ T5693] ? find_fsid+0x2e0/0x2e0 [ 660.942165][ T5693] btrfs_open_devices+0x147/0x170 [ 660.947290][ T5693] btrfs_mount_root+0x79a/0x1220 [ 660.952244][ T5693] ? btrfs_decode_error+0x70/0x70 [ 660.957272][ T5693] ? rcu_read_lock_sched_held+0x110/0x130 [ 660.962988][ T5693] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 660.969232][ T5693] ? vfs_parse_fs_string+0x111/0x170 [ 660.974519][ T5693] ? vfs_parse_fs_string+0x111/0x170 [ 660.979808][ T5693] ? rcu_read_lock_sched_held+0x110/0x130 [ 660.985534][ T5693] ? kfree+0x1f7/0x220 [ 660.989615][ T5693] ? vfs_parse_fs_string+0x116/0x170 [ 660.994903][ T5693] ? vfs_parse_fs_param+0x540/0x540 [ 661.000122][ T5693] ? btrfs_decode_error+0x70/0x70 [ 661.005149][ T5693] legacy_get_tree+0x108/0x220 [ 661.009922][ T5693] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 661.016213][ T5693] vfs_get_tree+0x8e/0x390 [ 661.020720][ T5693] fc_mount+0x17/0xc0 [ 661.024706][ T5693] vfs_kern_mount.part.0+0xd8/0xf0 [ 661.029821][ T5693] vfs_kern_mount+0x40/0x60 [ 661.034331][ T5693] btrfs_mount+0x2b4/0x15e2 [ 661.038843][ T5693] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 661.044475][ T5693] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 661.050725][ T5693] ? should_fail+0x1de/0x852 [ 661.055326][ T5693] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 661.061150][ T5693] ? btrfs_remount+0x11f0/0x11f0 [ 661.066102][ T5693] ? rcu_read_lock_sched_held+0x110/0x130 [ 661.071825][ T5693] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 661.078072][ T5693] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 661.084317][ T5693] ? vfs_parse_fs_string+0x111/0x170 [ 661.089606][ T5693] ? vfs_parse_fs_string+0x111/0x170 [ 661.094900][ T5693] ? rcu_read_lock_sched_held+0x110/0x130 [ 661.100621][ T5693] ? kfree+0x1f7/0x220 [ 661.104697][ T5693] ? vfs_parse_fs_string+0x116/0x170 [ 661.109987][ T5693] ? vfs_parse_fs_param+0x540/0x540 [ 661.115197][ T5693] ? btrfs_remount+0x11f0/0x11f0 [ 661.120149][ T5693] legacy_get_tree+0x108/0x220 [ 661.124928][ T5693] ? legacy_get_tree+0x108/0x220 [ 661.129877][ T5693] ? legacy_parse_monolithic+0x11f/0x180 [ 661.135521][ T5693] vfs_get_tree+0x8e/0x390 [ 661.139949][ T5693] do_mount+0x138c/0x1c00 [ 661.144290][ T5693] ? copy_mount_string+0x40/0x40 [ 661.149245][ T5693] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 661.155487][ T5693] ? copy_mount_options+0x2db/0x3f0 [ 661.160705][ T5693] ksys_mount+0xdb/0x150 [ 661.164963][ T5693] __x64_sys_mount+0xbe/0x150 [ 661.169650][ T5693] do_syscall_64+0xfd/0x680 [ 661.174175][ T5693] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 661.180069][ T5693] RIP: 0033:0x45bcca [ 661.183970][ T5693] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 661.203579][ T5693] RSP: 002b:00007f34331e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 23:08:18 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2800000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:18 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x2c]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 661.214468][ T5693] RAX: ffffffffffffffda RBX: 00007f34331e1b40 RCX: 000000000045bcca [ 661.222450][ T5693] RDX: 00007f34331e1ae0 RSI: 00000000200000c0 RDI: 00007f34331e1b00 [ 661.230425][ T5693] RBP: 0000000000000001 R08: 00007f34331e1b40 R09: 00007f34331e1ae0 [ 661.238401][ T5693] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 661.246374][ T5693] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:08:18 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r0, 0x0, 0x0) 23:08:18 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2900000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:18 executing program 1 (fault-call:0 fault-nth:76): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:08:18 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x2f]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:18 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2900]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 661.410813][ T5709] hfsplus: unable to find HFS+ superblock 23:08:18 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2b00000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:18 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r0, &(0x7f0000000300)={0x2, 0x0, @loopback}, 0x10) [ 661.509211][ T5719] hfsplus: unable to find HFS+ superblock [ 661.576067][ T5723] FAULT_INJECTION: forcing a failure. [ 661.576067][ T5723] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 661.589345][ T5723] CPU: 0 PID: 5723 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 661.598292][ T5723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 661.608357][ T5723] Call Trace: [ 661.611666][ T5723] dump_stack+0x172/0x1f0 [ 661.616017][ T5723] should_fail.cold+0xa/0x15 [ 661.620624][ T5723] ? vfs_kern_mount+0x40/0x60 [ 661.625335][ T5723] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 661.631152][ T5723] ? mark_held_locks+0xf0/0xf0 [ 661.635933][ T5723] should_fail_alloc_page+0x50/0x60 [ 661.641143][ T5723] __alloc_pages_nodemask+0x1a1/0x8d0 [ 661.646524][ T5723] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 661.652170][ T5723] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 661.657897][ T5723] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 661.663543][ T5723] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 661.669788][ T5723] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 661.669808][ T5723] cache_grow_begin+0x9d/0x650 [ 661.669823][ T5723] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 661.669838][ T5723] kmem_cache_alloc_trace+0x67a/0x750 [ 661.669850][ T5723] ? kasan_kmalloc+0x9/0x10 [ 661.669875][ T5723] btrfs_mount_root+0x1d0/0x1220 [ 661.669892][ T5723] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 661.669911][ T5723] ? btrfs_decode_error+0x70/0x70 [ 661.686676][ T5723] ? rcu_read_lock_sched_held+0x110/0x130 [ 661.686691][ T5723] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 661.686705][ T5723] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 661.686722][ T5723] ? vfs_parse_fs_string+0x111/0x170 [ 661.686741][ T5723] ? vfs_parse_fs_string+0x111/0x170 [ 661.741486][ T5723] ? rcu_read_lock_sched_held+0x110/0x130 [ 661.747214][ T5723] ? kfree+0x1f7/0x220 [ 661.751289][ T5723] ? vfs_parse_fs_string+0x116/0x170 [ 661.756589][ T5723] ? vfs_parse_fs_param+0x540/0x540 [ 661.761788][ T5723] ? btrfs_decode_error+0x70/0x70 [ 661.766816][ T5723] legacy_get_tree+0x108/0x220 [ 661.771584][ T5723] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 661.777832][ T5723] vfs_get_tree+0x8e/0x390 [ 661.782249][ T5723] fc_mount+0x17/0xc0 [ 661.786232][ T5723] vfs_kern_mount.part.0+0xd8/0xf0 [ 661.791356][ T5723] vfs_kern_mount+0x40/0x60 [ 661.796037][ T5723] btrfs_mount+0x2b4/0x15e2 [ 661.800543][ T5723] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 661.806178][ T5723] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 661.812422][ T5723] ? should_fail+0x1de/0x852 [ 661.817030][ T5723] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 661.822845][ T5723] ? btrfs_remount+0x11f0/0x11f0 [ 661.827789][ T5723] ? rcu_read_lock_sched_held+0x110/0x130 [ 661.833545][ T5723] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 661.839821][ T5723] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 661.846065][ T5723] ? vfs_parse_fs_string+0x111/0x170 [ 661.851354][ T5723] ? vfs_parse_fs_string+0x111/0x170 [ 661.856642][ T5723] ? rcu_read_lock_sched_held+0x110/0x130 [ 661.862362][ T5723] ? kfree+0x1f7/0x220 [ 661.866438][ T5723] ? vfs_parse_fs_string+0x116/0x170 [ 661.871725][ T5723] ? vfs_parse_fs_param+0x540/0x540 [ 661.876935][ T5723] ? btrfs_remount+0x11f0/0x11f0 [ 661.881877][ T5723] legacy_get_tree+0x108/0x220 [ 661.886666][ T5723] ? legacy_get_tree+0x108/0x220 [ 661.891606][ T5723] ? legacy_parse_monolithic+0x11f/0x180 [ 661.897240][ T5723] vfs_get_tree+0x8e/0x390 [ 661.901661][ T5723] do_mount+0x138c/0x1c00 [ 661.905998][ T5723] ? copy_mount_string+0x40/0x40 [ 661.910950][ T5723] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 661.917191][ T5723] ? copy_mount_options+0x2db/0x3f0 [ 661.922395][ T5723] ksys_mount+0xdb/0x150 [ 661.926644][ T5723] __x64_sys_mount+0xbe/0x150 [ 661.931515][ T5723] do_syscall_64+0xfd/0x680 [ 661.936027][ T5723] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 661.941924][ T5723] RIP: 0033:0x45bcca [ 661.945823][ T5723] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 661.965424][ T5723] RSP: 002b:00007f34331e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 23:08:19 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:08:19 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2c00000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:19 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x3c]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:19 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2b00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 661.973833][ T5723] RAX: ffffffffffffffda RBX: 00007f34331e1b40 RCX: 000000000045bcca [ 661.981805][ T5723] RDX: 00007f34331e1ae0 RSI: 00000000200000c0 RDI: 00007f34331e1b00 [ 661.989868][ T5723] RBP: 0000000000000001 R08: 00007f34331e1b40 R09: 00007f34331e1ae0 [ 661.997840][ T5723] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 662.005809][ T5723] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 23:08:19 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r0, &(0x7f0000000300)={0x2, 0x0, @loopback}, 0x10) 23:08:19 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x6c]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:19 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2f00000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:19 executing program 1 (fault-call:0 fault-nth:77): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:08:19 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2c00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 662.175911][ T5737] hfsplus: unable to find HFS+ superblock 23:08:19 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0xf0]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:19 executing program 3: r0 = socket$inet(0x2b, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r0, &(0x7f0000000300)={0x2, 0x0, @loopback}, 0x10) 23:08:19 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x3c00000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 662.271740][ T5747] hfsplus: unable to find HFS+ superblock [ 662.344023][ T5750] FAULT_INJECTION: forcing a failure. [ 662.344023][ T5750] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 662.357270][ T5750] CPU: 0 PID: 5750 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 662.366205][ T5750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 662.376268][ T5750] Call Trace: [ 662.379569][ T5750] dump_stack+0x172/0x1f0 [ 662.383919][ T5750] should_fail.cold+0xa/0x15 [ 662.388532][ T5750] ? fault_create_debugfs_attr+0x1e0/0x1e0 23:08:19 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:08:19 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2f00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 662.394355][ T5750] ? mark_held_locks+0xf0/0xf0 [ 662.399129][ T5750] should_fail_alloc_page+0x50/0x60 [ 662.404335][ T5750] __alloc_pages_nodemask+0x1a1/0x8d0 [ 662.409713][ T5750] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 662.415355][ T5750] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 662.421087][ T5750] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 662.426734][ T5750] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 662.432557][ T5750] cache_grow_begin+0x9d/0x650 [ 662.437326][ T5750] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 23:08:19 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x543]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 662.437350][ T5750] kmem_cache_alloc+0x628/0x6f0 [ 662.448410][ T5750] ? fc_mount+0x17/0xc0 [ 662.448422][ T5750] ? vfs_kern_mount.part.0+0xd8/0xf0 [ 662.448433][ T5750] ? vfs_kern_mount+0x40/0x60 [ 662.448447][ T5750] ? legacy_get_tree+0x108/0x220 [ 662.448467][ T5750] getname_kernel+0x53/0x370 [ 662.448483][ T5750] kern_path+0x20/0x40 [ 662.448497][ T5750] lookup_bdev.part.0+0x7b/0x1b0 [ 662.448508][ T5750] ? blkdev_open+0x290/0x290 [ 662.448520][ T5750] ? lock_downgrade+0x880/0x880 23:08:19 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x4000000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:19 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x3580]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 662.448541][ T5750] blkdev_get_by_path+0x81/0x130 [ 662.495459][ T5750] btrfs_scan_one_device+0xd3/0x720 [ 662.500667][ T5750] ? kfree+0x170/0x220 [ 662.504749][ T5750] ? device_list_add+0x14d0/0x14d0 [ 662.509873][ T5750] ? trace_hardirqs_off_caller+0x190/0x220 [ 662.515685][ T5750] ? btrfs_mount_root+0xb36/0x1220 [ 662.515707][ T5750] btrfs_mount_root+0x718/0x1220 [ 662.515726][ T5750] ? btrfs_decode_error+0x70/0x70 [ 662.515742][ T5750] ? rcu_read_lock_sched_held+0x110/0x130 [ 662.515757][ T5750] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 662.515775][ T5750] ? vfs_parse_fs_string+0x111/0x170 [ 662.515789][ T5750] ? vfs_parse_fs_string+0x111/0x170 [ 662.515802][ T5750] ? rcu_read_lock_sched_held+0x110/0x130 [ 662.515814][ T5750] ? kfree+0x1f7/0x220 [ 662.515832][ T5750] ? vfs_parse_fs_string+0x116/0x170 [ 662.548076][ T5750] ? vfs_parse_fs_param+0x540/0x540 [ 662.548097][ T5750] ? btrfs_decode_error+0x70/0x70 [ 662.548109][ T5750] legacy_get_tree+0x108/0x220 [ 662.548125][ T5750] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 662.548142][ T5750] vfs_get_tree+0x8e/0x390 [ 662.548157][ T5750] fc_mount+0x17/0xc0 [ 662.548172][ T5750] vfs_kern_mount.part.0+0xd8/0xf0 [ 662.548188][ T5750] vfs_kern_mount+0x40/0x60 [ 662.548205][ T5750] btrfs_mount+0x2b4/0x15e2 [ 662.548224][ T5750] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 662.573717][ T5750] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 662.573737][ T5750] ? should_fail+0x1de/0x852 [ 662.573758][ T5750] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 662.603253][ T5750] ? btrfs_remount+0x11f0/0x11f0 [ 662.603277][ T5750] ? rcu_read_lock_sched_held+0x110/0x130 23:08:19 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x3c00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 662.603290][ T5750] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 662.603307][ T5750] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 662.624141][ T5750] ? vfs_parse_fs_string+0x111/0x170 [ 662.624159][ T5750] ? vfs_parse_fs_string+0x111/0x170 [ 662.624175][ T5750] ? rcu_read_lock_sched_held+0x110/0x130 [ 662.624192][ T5750] ? kfree+0x1f7/0x220 [ 662.651452][ T5750] ? vfs_parse_fs_string+0x116/0x170 [ 662.651470][ T5750] ? vfs_parse_fs_param+0x540/0x540 [ 662.651489][ T5750] ? btrfs_remount+0x11f0/0x11f0 [ 662.651506][ T5750] legacy_get_tree+0x108/0x220 [ 662.663016][ T5750] ? legacy_get_tree+0x108/0x220 [ 662.663032][ T5750] ? legacy_parse_monolithic+0x11f/0x180 [ 662.663052][ T5750] vfs_get_tree+0x8e/0x390 [ 662.663068][ T5750] do_mount+0x138c/0x1c00 [ 662.663087][ T5750] ? copy_mount_string+0x40/0x40 [ 662.693520][ T5750] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 662.693538][ T5750] ? copy_mount_options+0x2db/0x3f0 [ 662.693559][ T5750] ksys_mount+0xdb/0x150 [ 662.693578][ T5750] __x64_sys_mount+0xbe/0x150 [ 662.713305][ T5750] do_syscall_64+0xfd/0x680 [ 662.733956][ T5750] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 662.733970][ T5750] RIP: 0033:0x45bcca [ 662.733985][ T5750] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 662.733998][ T5750] RSP: 002b:00007f34331e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 662.753339][ T5750] RAX: ffffffffffffffda RBX: 00007f34331e1b40 RCX: 000000000045bcca 23:08:19 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x600]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 662.753349][ T5750] RDX: 00007f34331e1ae0 RSI: 00000000200000c0 RDI: 00007f34331e1b00 [ 662.753357][ T5750] RBP: 0000000000000001 R08: 00007f34331e1b40 R09: 00007f34331e1ae0 [ 662.753366][ T5750] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 662.753375][ T5750] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 [ 662.860697][ T5767] hfsplus: unable to find HFS+ superblock 23:08:19 executing program 1 (fault-call:0 fault-nth:78): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:08:19 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x3f00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:19 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x4305000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:19 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x608]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:19 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f00000000c0)=0x5) r1 = socket$inet(0x2b, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r1, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) [ 662.958480][ T5773] hfsplus: unable to find HFS+ superblock 23:08:20 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:08:20 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x6c00000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:20 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x4000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:20 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f00000000c0)=0x5) r1 = socket$inet(0x2b, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r1, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:08:20 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x689]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 663.158482][ T5784] FAULT_INJECTION: forcing a failure. [ 663.158482][ T5784] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 663.171737][ T5784] CPU: 0 PID: 5784 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 663.180678][ T5784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 663.190733][ T5784] Call Trace: [ 663.194053][ T5784] dump_stack+0x172/0x1f0 [ 663.198408][ T5784] should_fail.cold+0xa/0x15 [ 663.203013][ T5784] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 663.208835][ T5784] ? mark_held_locks+0xf0/0xf0 [ 663.216112][ T5784] should_fail_alloc_page+0x50/0x60 [ 663.221320][ T5784] __alloc_pages_nodemask+0x1a1/0x8d0 [ 663.226693][ T5784] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 663.232333][ T5784] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 663.238071][ T5784] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 663.243730][ T5784] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 663.249557][ T5784] cache_grow_begin+0x9d/0x650 [ 663.254338][ T5784] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 663.260579][ T5784] kmem_cache_alloc+0x628/0x6f0 [ 663.260594][ T5784] ? fc_mount+0x17/0xc0 [ 663.260606][ T5784] ? vfs_kern_mount.part.0+0xd8/0xf0 [ 663.260617][ T5784] ? vfs_kern_mount+0x40/0x60 [ 663.260631][ T5784] ? legacy_get_tree+0x108/0x220 [ 663.260648][ T5784] getname_kernel+0x53/0x370 [ 663.260667][ T5784] kern_path+0x20/0x40 [ 663.274951][ T5784] lookup_bdev.part.0+0x7b/0x1b0 [ 663.289283][ T5784] ? blkdev_open+0x290/0x290 [ 663.289299][ T5784] ? lock_downgrade+0x880/0x880 23:08:20 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x800e000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:20 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x806]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 663.289319][ T5784] blkdev_get_by_path+0x81/0x130 [ 663.298302][ T5784] btrfs_scan_one_device+0xd3/0x720 [ 663.298315][ T5784] ? kfree+0x170/0x220 [ 663.298332][ T5784] ? device_list_add+0x14d0/0x14d0 [ 663.298351][ T5784] ? trace_hardirqs_off_caller+0x190/0x220 [ 663.298373][ T5784] ? btrfs_mount_root+0xb36/0x1220 [ 663.327128][ T5784] btrfs_mount_root+0x718/0x1220 [ 663.327150][ T5784] ? btrfs_decode_error+0x70/0x70 [ 663.327170][ T5784] ? rcu_read_lock_sched_held+0x110/0x130 [ 663.342989][ T5784] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 663.343011][ T5784] ? vfs_parse_fs_string+0x111/0x170 [ 663.343026][ T5784] ? vfs_parse_fs_string+0x111/0x170 [ 663.343046][ T5784] ? rcu_read_lock_sched_held+0x110/0x130 [ 663.359997][ T5784] ? kfree+0x1f7/0x220 [ 663.376259][ T5784] ? vfs_parse_fs_string+0x116/0x170 [ 663.376277][ T5784] ? vfs_parse_fs_param+0x540/0x540 [ 663.376295][ T5784] ? btrfs_decode_error+0x70/0x70 [ 663.376307][ T5784] legacy_get_tree+0x108/0x220 [ 663.376323][ T5784] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 663.376340][ T5784] vfs_get_tree+0x8e/0x390 [ 663.376356][ T5784] fc_mount+0x17/0xc0 [ 663.376368][ T5784] vfs_kern_mount.part.0+0xd8/0xf0 [ 663.376383][ T5784] vfs_kern_mount+0x40/0x60 [ 663.376400][ T5784] btrfs_mount+0x2b4/0x15e2 [ 663.376413][ T5784] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 663.376424][ T5784] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 663.376438][ T5784] ? should_fail+0x1de/0x852 [ 663.376453][ T5784] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 663.376469][ T5784] ? btrfs_remount+0x11f0/0x11f0 [ 663.376488][ T5784] ? rcu_read_lock_sched_held+0x110/0x130 [ 663.376501][ T5784] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 663.376515][ T5784] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 663.376529][ T5784] ? vfs_parse_fs_string+0x111/0x170 [ 663.376542][ T5784] ? vfs_parse_fs_string+0x111/0x170 [ 663.376555][ T5784] ? rcu_read_lock_sched_held+0x110/0x130 [ 663.376567][ T5784] ? kfree+0x1f7/0x220 [ 663.376580][ T5784] ? vfs_parse_fs_string+0x116/0x170 [ 663.376594][ T5784] ? vfs_parse_fs_param+0x540/0x540 [ 663.376610][ T5784] ? btrfs_remount+0x11f0/0x11f0 [ 663.376624][ T5784] legacy_get_tree+0x108/0x220 [ 663.376641][ T5784] ? legacy_get_tree+0x108/0x220 [ 663.425619][ T5784] ? legacy_parse_monolithic+0x11f/0x180 [ 663.425639][ T5784] vfs_get_tree+0x8e/0x390 [ 663.425657][ T5784] do_mount+0x138c/0x1c00 [ 663.425674][ T5784] ? copy_mount_string+0x40/0x40 [ 663.425696][ T5784] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 663.425708][ T5784] ? copy_mount_options+0x2db/0x3f0 [ 663.425724][ T5784] ksys_mount+0xdb/0x150 [ 663.425742][ T5784] __x64_sys_mount+0xbe/0x150 [ 663.435944][ T5784] do_syscall_64+0xfd/0x680 [ 663.435966][ T5784] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 663.435978][ T5784] RIP: 0033:0x45bcca [ 663.435991][ T5784] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 663.435998][ T5784] RSP: 002b:00007f34331e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 663.436012][ T5784] RAX: ffffffffffffffda RBX: 00007f34331e1b40 RCX: 000000000045bcca [ 663.436019][ T5784] RDX: 00007f34331e1ae0 RSI: 00000000200000c0 RDI: 00007f34331e1b00 [ 663.436027][ T5784] RBP: 0000000000000001 R08: 00007f34331e1b40 R09: 00007f34331e1ae0 [ 663.436034][ T5784] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 663.436047][ T5784] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 [ 663.667181][ T5797] hfsplus: unable to find HFS+ superblock 23:08:20 executing program 1 (fault-call:0 fault-nth:79): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:08:20 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0xd00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:20 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x8035000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:20 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x4305]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:20 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f00000000c0)=0x5) r1 = socket$inet(0x2b, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) socket$packet(0x11, 0x3, 0x300) connect$inet(r1, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:08:20 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:08:20 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0xe80]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:20 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x4788]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 663.919662][ T5813] FAULT_INJECTION: forcing a failure. [ 663.919662][ T5813] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 663.932923][ T5813] CPU: 0 PID: 5813 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 663.941865][ T5813] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 663.951936][ T5813] Call Trace: [ 663.955241][ T5813] dump_stack+0x172/0x1f0 [ 663.959584][ T5813] should_fail.cold+0xa/0x15 [ 663.964191][ T5813] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 663.970009][ T5813] ? mark_held_locks+0xf0/0xf0 [ 663.974784][ T5813] should_fail_alloc_page+0x50/0x60 [ 663.979997][ T5813] __alloc_pages_nodemask+0x1a1/0x8d0 [ 663.985370][ T5813] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 663.991008][ T5813] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 663.996729][ T5813] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 664.002371][ T5813] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 664.008286][ T5813] cache_grow_begin+0x9d/0x650 [ 664.013052][ T5813] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 664.019297][ T5813] kmem_cache_alloc+0x628/0x6f0 [ 664.024149][ T5813] ? fc_mount+0x17/0xc0 [ 664.028311][ T5813] ? vfs_kern_mount.part.0+0xd8/0xf0 [ 664.033596][ T5813] ? vfs_kern_mount+0x40/0x60 [ 664.038274][ T5813] ? legacy_get_tree+0x108/0x220 [ 664.043219][ T5813] getname_kernel+0x53/0x370 [ 664.047819][ T5813] kern_path+0x20/0x40 [ 664.051895][ T5813] lookup_bdev.part.0+0x7b/0x1b0 [ 664.056841][ T5813] ? blkdev_open+0x290/0x290 [ 664.061439][ T5813] ? lock_downgrade+0x880/0x880 [ 664.066307][ T5813] blkdev_get_by_path+0x81/0x130 [ 664.071265][ T5813] btrfs_scan_one_device+0xd3/0x720 [ 664.071280][ T5813] ? kfree+0x170/0x220 [ 664.071294][ T5813] ? device_list_add+0x14d0/0x14d0 [ 664.071315][ T5813] ? trace_hardirqs_off_caller+0x190/0x220 [ 664.091447][ T5813] ? btrfs_mount_root+0xb36/0x1220 [ 664.091467][ T5813] btrfs_mount_root+0x718/0x1220 [ 664.091489][ T5813] ? btrfs_decode_error+0x70/0x70 [ 664.106543][ T5813] ? rcu_read_lock_sched_held+0x110/0x130 [ 664.112266][ T5813] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 664.118520][ T5813] ? vfs_parse_fs_string+0x111/0x170 [ 664.123830][ T5813] ? vfs_parse_fs_string+0x111/0x170 [ 664.128286][ T5818] hfsplus: unable to find HFS+ superblock [ 664.129124][ T5813] ? rcu_read_lock_sched_held+0x110/0x130 [ 664.129141][ T5813] ? kfree+0x1f7/0x220 [ 664.129160][ T5813] ? vfs_parse_fs_string+0x116/0x170 [ 664.129173][ T5813] ? vfs_parse_fs_param+0x540/0x540 [ 664.129195][ T5813] ? btrfs_decode_error+0x70/0x70 [ 664.160172][ T5813] legacy_get_tree+0x108/0x220 [ 664.164947][ T5813] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 664.171192][ T5813] vfs_get_tree+0x8e/0x390 [ 664.175613][ T5813] fc_mount+0x17/0xc0 [ 664.179603][ T5813] vfs_kern_mount.part.0+0xd8/0xf0 [ 664.184722][ T5813] vfs_kern_mount+0x40/0x60 [ 664.189237][ T5813] btrfs_mount+0x2b4/0x15e2 [ 664.193741][ T5813] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 664.199396][ T5813] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 664.205653][ T5813] ? should_fail+0x1de/0x852 [ 664.210257][ T5813] ? fault_create_debugfs_attr+0x1e0/0x1e0 23:08:21 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x4888]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 664.216543][ T5813] ? btrfs_remount+0x11f0/0x11f0 [ 664.221490][ T5813] ? rcu_read_lock_sched_held+0x110/0x130 [ 664.227220][ T5813] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 664.233480][ T5813] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 664.239750][ T5813] ? vfs_parse_fs_string+0x111/0x170 [ 664.245054][ T5813] ? vfs_parse_fs_string+0x111/0x170 [ 664.250349][ T5813] ? rcu_read_lock_sched_held+0x110/0x130 [ 664.256075][ T5813] ? kfree+0x1f7/0x220 [ 664.260152][ T5813] ? vfs_parse_fs_string+0x116/0x170 [ 664.265439][ T5813] ? vfs_parse_fs_param+0x540/0x540 23:08:21 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x2800]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 664.270655][ T5813] ? btrfs_remount+0x11f0/0x11f0 [ 664.275608][ T5813] legacy_get_tree+0x108/0x220 [ 664.280533][ T5813] ? legacy_get_tree+0x108/0x220 [ 664.285477][ T5813] ? legacy_parse_monolithic+0x11f/0x180 [ 664.291127][ T5813] vfs_get_tree+0x8e/0x390 [ 664.295562][ T5813] do_mount+0x138c/0x1c00 [ 664.299915][ T5813] ? copy_mount_string+0x40/0x40 [ 664.304872][ T5813] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 664.311203][ T5813] ? copy_mount_options+0x2db/0x3f0 [ 664.316412][ T5813] ksys_mount+0xdb/0x150 [ 664.320664][ T5813] __x64_sys_mount+0xbe/0x150 [ 664.325353][ T5813] do_syscall_64+0xfd/0x680 [ 664.329867][ T5813] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 664.335763][ T5813] RIP: 0033:0x45bcca [ 664.339669][ T5813] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 664.359359][ T5813] RSP: 002b:00007f34331e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 23:08:21 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x8100000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:21 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f00000000c0)=0x5) r1 = socket$inet(0x2b, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r1, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) [ 664.367780][ T5813] RAX: ffffffffffffffda RBX: 00007f34331e1b40 RCX: 000000000045bcca [ 664.375757][ T5813] RDX: 00007f34331e1ae0 RSI: 00000000200000c0 RDI: 00007f34331e1b00 [ 664.383743][ T5813] RBP: 0000000000000001 R08: 00007f34331e1b40 R09: 00007f34331e1ae0 [ 664.391721][ T5813] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 664.399693][ T5813] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 [ 664.512183][ T5822] hfsplus: unable to find HFS+ superblock 23:08:21 executing program 1 (fault-call:0 fault-nth:80): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:08:21 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x6488]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:21 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f00000000c0)=0x5) r1 = socket$inet(0x2b, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r1, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:08:21 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:08:21 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x86ddffff00000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:21 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x2900]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:21 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x8847000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:21 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x2b00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:21 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x6c00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:21 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f00000000c0)=0x5) r1 = socket$inet(0x2b, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r1, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) [ 664.745942][ T5842] FAULT_INJECTION: forcing a failure. [ 664.745942][ T5842] name failslab, interval 1, probability 0, space 0, times 0 [ 664.758591][ T5842] CPU: 0 PID: 5842 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 664.767529][ T5842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 664.777595][ T5842] Call Trace: [ 664.780908][ T5842] dump_stack+0x172/0x1f0 [ 664.785249][ T5842] should_fail.cold+0xa/0x15 [ 664.785272][ T5842] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 664.795674][ T5842] __should_failslab+0x121/0x190 [ 664.800623][ T5842] should_failslab+0x9/0x14 [ 664.805134][ T5842] kmem_cache_alloc+0x47/0x6f0 [ 664.809927][ T5842] xas_alloc+0x2dc/0x3d0 [ 664.814185][ T5842] xas_create+0x2cd/0x1040 [ 664.818619][ T5842] xas_store+0x9a/0x19b0 [ 664.822874][ T5842] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 664.829119][ T5842] ? xas_start+0x166/0x560 [ 664.833551][ T5842] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 664.839790][ T5842] ? xas_load+0x67/0x150 [ 664.839813][ T5842] __add_to_page_cache_locked+0x5be/0xe70 [ 664.849764][ T5842] ? file_fdatawait_range+0x70/0x70 [ 664.854973][ T5842] ? __alloc_pages_nodemask+0x61b/0x8d0 [ 664.860542][ T5842] ? count_shadow_nodes+0x830/0x830 [ 664.865767][ T5842] add_to_page_cache_lru+0x1cb/0x760 [ 664.871060][ T5842] ? add_to_page_cache_locked+0x40/0x40 [ 664.876620][ T5842] ? __page_cache_alloc+0x131/0x460 [ 664.876636][ T5842] pagecache_get_page+0x357/0x850 [ 664.876657][ T5842] __getblk_gfp+0x27e/0x970 [ 664.876675][ T5842] ? kasan_check_write+0x14/0x20 [ 664.876694][ T5842] __bread_gfp+0x2f/0x300 [ 664.900625][ T5842] btrfs_read_dev_one_super+0xb6/0x2a0 [ 664.906112][ T5842] btrfs_read_dev_super+0x6c/0xd0 [ 664.911165][ T5842] ? btrfs_read_dev_one_super+0x2a0/0x2a0 [ 664.916902][ T5842] btrfs_get_bdev_and_sb+0xff/0x300 [ 664.922112][ T5842] open_fs_devices+0x68e/0xbd0 [ 664.926895][ T5842] ? find_fsid+0x2e0/0x2e0 [ 664.931335][ T5842] btrfs_open_devices+0x147/0x170 [ 664.936373][ T5842] btrfs_mount_root+0x79a/0x1220 [ 664.941326][ T5842] ? btrfs_decode_error+0x70/0x70 23:08:21 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x2c00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:21 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x800e]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 664.946353][ T5842] ? rcu_read_lock_sched_held+0x110/0x130 [ 664.946367][ T5842] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 664.946386][ T5842] ? vfs_parse_fs_string+0x111/0x170 [ 664.946401][ T5842] ? vfs_parse_fs_string+0x111/0x170 [ 664.946414][ T5842] ? rcu_read_lock_sched_held+0x110/0x130 [ 664.946427][ T5842] ? kfree+0x1f7/0x220 [ 664.946444][ T5842] ? vfs_parse_fs_string+0x116/0x170 [ 664.946459][ T5842] ? vfs_parse_fs_param+0x540/0x540 [ 664.946481][ T5842] ? btrfs_decode_error+0x70/0x70 [ 664.978801][ T5842] legacy_get_tree+0x108/0x220 [ 664.978819][ T5842] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 664.978836][ T5842] vfs_get_tree+0x8e/0x390 [ 664.978851][ T5842] fc_mount+0x17/0xc0 [ 664.978864][ T5842] vfs_kern_mount.part.0+0xd8/0xf0 [ 664.978880][ T5842] vfs_kern_mount+0x40/0x60 [ 664.978899][ T5842] btrfs_mount+0x2b4/0x15e2 [ 664.978917][ T5842] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 665.018821][ T5842] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 665.018837][ T5842] ? should_fail+0x1de/0x852 [ 665.018854][ T5842] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 665.018874][ T5842] ? btrfs_remount+0x11f0/0x11f0 [ 665.018894][ T5842] ? rcu_read_lock_sched_held+0x110/0x130 [ 665.018908][ T5842] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 665.018922][ T5842] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 665.018939][ T5842] ? vfs_parse_fs_string+0x111/0x170 [ 665.018956][ T5842] ? vfs_parse_fs_string+0x111/0x170 [ 665.050145][ T5842] ? rcu_read_lock_sched_held+0x110/0x130 [ 665.060626][ T5839] hfsplus: unable to find HFS+ superblock [ 665.060781][ T5842] ? kfree+0x1f7/0x220 [ 665.078504][ T5842] ? vfs_parse_fs_string+0x116/0x170 [ 665.078522][ T5842] ? vfs_parse_fs_param+0x540/0x540 [ 665.078546][ T5842] ? btrfs_remount+0x11f0/0x11f0 [ 665.089522][ T5842] legacy_get_tree+0x108/0x220 [ 665.089537][ T5842] ? legacy_get_tree+0x108/0x220 [ 665.089552][ T5842] ? legacy_parse_monolithic+0x11f/0x180 [ 665.089568][ T5842] vfs_get_tree+0x8e/0x390 [ 665.089584][ T5842] do_mount+0x138c/0x1c00 [ 665.089603][ T5842] ? copy_mount_string+0x40/0x40 [ 665.089623][ T5842] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 665.089637][ T5842] ? copy_mount_options+0x2db/0x3f0 [ 665.089657][ T5842] ksys_mount+0xdb/0x150 [ 665.089673][ T5842] __x64_sys_mount+0xbe/0x150 [ 665.089690][ T5842] do_syscall_64+0xfd/0x680 [ 665.089707][ T5842] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 665.089722][ T5842] RIP: 0033:0x45bcca [ 665.104752][ T5842] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 665.104761][ T5842] RSP: 002b:00007f34331e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 665.104776][ T5842] RAX: ffffffffffffffda RBX: 00007f34331e1b40 RCX: 000000000045bcca [ 665.104783][ T5842] RDX: 00007f34331e1ae0 RSI: 00000000200000c0 RDI: 00007f34331e1b00 [ 665.104796][ T5842] RBP: 0000000000000001 R08: 00007f34331e1b40 R09: 00007f34331e1ae0 [ 665.114899][ T5842] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 665.114908][ T5842] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 [ 665.292781][ T5857] hfsplus: unable to find HFS+ superblock 23:08:22 executing program 1 (fault-call:0 fault-nth:81): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a0000010000000000ffffffffffffffff5f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 23:08:22 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x8848000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:22 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f00000000c0)=0x5) r1 = socket$inet(0x2b, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x3, 0x300) connect$inet(r1, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) 23:08:22 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x2f00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:22 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x8035]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:22 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000027c0), &(0x7f0000002800)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:08:22 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x8864000000000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:22 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x3580]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:22 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x8100]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:22 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f00000000c0)=0x5) r1 = socket$inet(0x2b, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$packet(0x11, 0x3, 0x300) connect$inet(r1, &(0x7f0000000300)={0x2, 0x4e23, @loopback}, 0x10) [ 665.511887][ T5866] hfsplus: unable to find HFS+ superblock [ 665.597016][ T5871] FAULT_INJECTION: forcing a failure. [ 665.597016][ T5871] name failslab, interval 1, probability 0, space 0, times 0 23:08:22 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x88a8ffff00000000]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) 23:08:22 executing program 5: syz_emit_ethernet(0x7a, &(0x7f0000000380)={@link_local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "f5f29c", 0x44, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x3c00]}, @ipv4={[], [], @broadcast}, {[], @gre}}}}}, 0x0) [ 665.638750][ T5871] CPU: 0 PID: 5871 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 665.647735][ T5871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 665.657798][ T5871] Call Trace: [ 665.661095][ T5871] dump_stack+0x172/0x1f0 [ 665.665441][ T5871] should_fail.cold+0xa/0x15 [ 665.670047][ T5871] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 665.675868][ T5871] ? ___might_sleep+0x163/0x280 [ 665.680736][ T5871] __should_failslab+0x121/0x190 [ 665.685676][ T5871] should_failslab+0x9/0x14 [ 665.690224][ T5871] kmem_cache_alloc_trace+0x2ce/0x750 [ 665.690239][ T5871] ? bd_set_size+0xb0/0xb0 [ 665.690258][ T5871] ? wait_for_completion+0x440/0x440 [ 665.705315][ T5871] btrfs_alloc_device+0xb4/0x720 [ 665.710270][ T5871] ? btrfs_find_device_by_devspec+0x5b0/0x5b0 [ 665.716346][ T5871] ? blkdev_put+0x98/0x560 [ 665.720785][ T5871] close_fs_devices.part.0+0x1af/0x790 [ 665.726269][ T5871] btrfs_close_devices+0xa0/0x200 [ 665.731300][ T5871] btrfs_mount_root+0xf0c/0x1220 [ 665.731322][ T5871] ? btrfs_decode_error+0x70/0x70 [ 665.731341][ T5871] ? rcu_read_lock_sched_held+0x110/0x130 [ 665.747080][ T5871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 665.753337][ T5871] ? vfs_parse_fs_string+0x111/0x170 [ 665.758634][ T5871] ? vfs_parse_fs_string+0x111/0x170 [ 665.763935][ T5871] ? rcu_read_lock_sched_held+0x110/0x130 [ 665.769667][ T5871] ? kfree+0x1f7/0x220 [ 665.773757][ T5871] ? vfs_parse_fs_string+0x116/0x170 [ 665.779099][ T5871] ? vfs_parse_fs_param+0x540/0x540 [ 665.784313][ T5871] ? btrfs_decode_error+0x70/0x70 [ 665.789345][ T5871] legacy_get_tree+0x108/0x220 [ 665.789365][ T5871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 665.789383][ T5871] vfs_get_tree+0x8e/0x390 [ 665.804775][ T5871] fc_mount+0x17/0xc0 [ 665.804790][ T5871] vfs_kern_mount.part.0+0xd8/0xf0 [ 665.804807][ T5871] vfs_kern_mount+0x40/0x60 [ 665.818482][ T5871] btrfs_mount+0x2b4/0x15e2 [ 665.823013][ T5871] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 665.828651][ T5871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 665.834894][ T5871] ? should_fail+0x1de/0x852 [ 665.834913][ T5871] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 665.834934][ T5871] ? btrfs_remount+0x11f0/0x11f0 [ 665.850233][ T5871] ? rcu_read_lock_sched_held+0x110/0x130 [ 665.855977][ T5871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 665.862310][ T5871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 665.868553][ T5871] ? vfs_parse_fs_string+0x111/0x170 [ 665.868569][ T5871] ? vfs_parse_fs_string+0x111/0x170 [ 665.868583][ T5871] ? rcu_read_lock_sched_held+0x110/0x130 [ 665.868597][ T5871] ? kfree+0x1f7/0x220 [ 665.868614][ T5871] ? vfs_parse_fs_string+0x116/0x170 [ 665.868627][ T5871] ? vfs_parse_fs_param+0x540/0x540 [ 665.868647][ T5871] ? btrfs_remount+0x11f0/0x11f0 [ 665.868661][ T5871] legacy_get_tree+0x108/0x220 [ 665.868672][ T5871] ? legacy_get_tree+0x108/0x220 [ 665.868689][ T5871] ? legacy_parse_monolithic+0x11f/0x180 [ 665.868706][ T5871] vfs_get_tree+0x8e/0x390 [ 665.868725][ T5871] do_mount+0x138c/0x1c00 [ 665.881761][ T5877] hfsplus: unable to find HFS+ superblock [ 665.884984][ T5871] ? copy_mount_string+0x40/0x40 [ 665.885008][ T5871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 665.904476][ T5871] ? copy_mount_options+0x2db/0x3f0 [ 665.904496][ T5871] ksys_mount+0xdb/0x150 [ 665.914344][ T5871] __x64_sys_mount+0xbe/0x150 [ 665.914364][ T5871] do_syscall_64+0xfd/0x680 [ 665.914384][ T5871] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 665.927251][ T3880] kobject: 'loop4' (00000000c3000005): kobject_uevent_env [ 665.928706][ T5871] RIP: 0033:0x45bcca [ 665.928724][ T5871] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 665.928737][ T5871] RSP: 002b:00007f34331e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 665.934529][ T3880] kobject: 'loop4' (00000000c3000005): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 665.939359][ T5871] RAX: ffffffffffffffda RBX: 00007f34331e1b40 RCX: 000000000045bcca [ 665.939367][ T5871] RDX: 00007f34331e1ae0 RSI: 00000000200000c0 RDI: 00007f34331e1b00 [ 665.939374][ T5871] RBP: 0000000000000001 R08: 00007f34331e1b40 R09: 00007f34331e1ae0 [ 665.939382][ T5871] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 665.939390][ T5871] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 [ 665.940550][ T5871] ------------[ cut here ]------------ [ 665.953199][ T3880] kobject: 'loop5' (000000006bd0de22): kobject_uevent_env [ 665.955148][ T5871] kernel BUG at fs/btrfs/volumes.c:1270! [ 665.960224][ T3880] kobject: 'loop5' (000000006bd0de22): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 665.964658][ T5871] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 666.093461][ T5871] CPU: 0 PID: 5871 Comm: syz-executor.1 Not tainted 5.2.0-rc2-next-20190531 #4 [ 666.102382][ T5871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 666.112454][ T5871] RIP: 0010:close_fs_devices.part.0+0x5b9/0x790 [ 666.118700][ T5871] Code: 3c 03 0f 8e 44 01 00 00 48 8b 45 c0 c7 80 20 01 00 00 00 00 00 00 48 83 c4 48 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 a7 b8 c3 fe <0f> 0b e8 a0 b8 c3 fe 0f 0b e8 99 b8 c3 fe 0f 0b e9 16 ff ff ff e8 [ 666.138306][ T5871] RSP: 0018:ffff8880a90977a0 EFLAGS: 00010246 [ 666.144374][ T5871] RAX: 0000000000040000 RBX: ffff88809af72040 RCX: ffffc90012987000 [ 666.152344][ T5871] RDX: 0000000000040000 RSI: ffffffff82ad31c9 RDI: 0000000000000007 [ 666.160314][ T5871] RBP: ffff8880a9097810 R08: ffff888097800500 R09: ffffed1015d06be8 [ 666.168286][ T5871] R10: ffffed1015d06be7 R11: ffff8880ae835f3b R12: 0000000000000000 [ 666.176254][ T5871] R13: dffffc0000000000 R14: ffff8880952dadc0 R15: fffffffffffffff4 [ 666.184311][ T5871] FS: 00007f34331e2700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 666.193235][ T5871] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 666.199824][ T5871] CR2: 0000000000738000 CR3: 0000000099ca9000 CR4: 00000000001406f0 [ 666.207794][ T5871] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 666.215762][ T5871] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 666.223733][ T5871] Call Trace: [ 666.227032][ T5871] btrfs_close_devices+0xa0/0x200 [ 666.232155][ T5871] btrfs_mount_root+0xf0c/0x1220 [ 666.237096][ T5871] ? btrfs_decode_error+0x70/0x70 [ 666.242120][ T5871] ? rcu_read_lock_sched_held+0x110/0x130 [ 666.247840][ T5871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 666.254081][ T5871] ? vfs_parse_fs_string+0x111/0x170 [ 666.259364][ T5871] ? vfs_parse_fs_string+0x111/0x170 [ 666.264650][ T5871] ? rcu_read_lock_sched_held+0x110/0x130 [ 666.270374][ T5871] ? kfree+0x1f7/0x220 [ 666.274445][ T5871] ? vfs_parse_fs_string+0x116/0x170 [ 666.279732][ T5871] ? vfs_parse_fs_param+0x540/0x540 [ 666.284933][ T5871] ? btrfs_decode_error+0x70/0x70 [ 666.289960][ T5871] legacy_get_tree+0x108/0x220 [ 666.294728][ T5871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 666.300969][ T5871] vfs_get_tree+0x8e/0x390 [ 666.305395][ T5871] fc_mount+0x17/0xc0 [ 666.309381][ T5871] vfs_kern_mount.part.0+0xd8/0xf0 [ 666.314491][ T5871] vfs_kern_mount+0x40/0x60 [ 666.319006][ T5871] btrfs_mount+0x2b4/0x15e2 [ 666.323510][ T5871] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 666.329140][ T5871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 666.335379][ T5871] ? should_fail+0x1de/0x852 [ 666.339969][ T5871] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 666.345772][ T5871] ? btrfs_remount+0x11f0/0x11f0 [ 666.350717][ T5871] ? rcu_read_lock_sched_held+0x110/0x130 [ 666.356435][ T5871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 666.362677][ T5871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 666.368916][ T5871] ? vfs_parse_fs_string+0x111/0x170 [ 666.374200][ T5871] ? vfs_parse_fs_string+0x111/0x170 [ 666.379485][ T5871] ? rcu_read_lock_sched_held+0x110/0x130 [ 666.385200][ T5871] ? kfree+0x1f7/0x220 [ 666.389274][ T5871] ? vfs_parse_fs_string+0x116/0x170 [ 666.395069][ T5871] ? vfs_parse_fs_param+0x540/0x540 [ 666.400269][ T5871] ? btrfs_remount+0x11f0/0x11f0 [ 666.405208][ T5871] legacy_get_tree+0x108/0x220 [ 666.409971][ T5871] ? legacy_get_tree+0x108/0x220 [ 666.414907][ T5871] ? legacy_parse_monolithic+0x11f/0x180 [ 666.420546][ T5871] vfs_get_tree+0x8e/0x390 [ 666.424960][ T5871] do_mount+0x138c/0x1c00 [ 666.429294][ T5871] ? copy_mount_string+0x40/0x40 [ 666.434232][ T5871] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 666.440478][ T5871] ? copy_mount_options+0x2db/0x3f0 [ 666.445677][ T5871] ksys_mount+0xdb/0x150 [ 666.449921][ T5871] __x64_sys_mount+0xbe/0x150 [ 666.454597][ T5871] do_syscall_64+0xfd/0x680 [ 666.459106][ T5871] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 666.465032][ T5871] RIP: 0033:0x45bcca [ 666.468933][ T5871] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 666.488551][ T5871] RSP: 002b:00007f34331e1a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 666.496965][ T5871] RAX: ffffffffffffffda RBX: 00007f34331e1b40 RCX: 000000000045bcca [ 666.505027][ T5871] RDX: 00007f34331e1ae0 RSI: 00000000200000c0 RDI: 00007f34331e1b00 [ 666.513090][ T5871] RBP: 0000000000000001 R08: 00007f34331e1b40 R09: 00007f34331e1ae0 [ 666.521055][ T5871] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 666.529027][ T5871] R13: 00000000004c7ebe R14: 00000000004de3b8 R15: 0000000000000003 [ 666.536998][ T5871] Modules linked in: [ 666.548815][ T5871] ---[ end trace 87bbe84d847473a2 ]--- [ 666.551001][ T3880] kobject: 'loop1' (000000001109f2ef): kobject_uevent_env [ 666.554411][ T5871] RIP: 0010:close_fs_devices.part.0+0x5b9/0x790 [ 666.570163][ T5871] Code: 3c 03 0f 8e 44 01 00 00 48 8b 45 c0 c7 80 20 01 00 00 00 00 00 00 48 83 c4 48 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 a7 b8 c3 fe <0f> 0b e8 a0 b8 c3 fe 0f 0b e8 99 b8 c3 fe 0f 0b e9 16 ff ff ff e8 [ 666.574299][ T3880] kobject: 'loop1' (000000001109f2ef): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 666.595530][ T5871] RSP: 0018:ffff8880a90977a0 EFLAGS: 00010246 [ 666.604713][ T3880] kobject: 'loop3' (000000004e37a3e3): kobject_uevent_env [ 666.607470][ T5871] RAX: 0000000000040000 RBX: ffff88809af72040 RCX: ffffc90012987000 [ 666.613439][ T3880] kobject: 'loop3' (000000004e37a3e3): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 666.621424][ T5871] RDX: 0000000000040000 RSI: ffffffff82ad31c9 RDI: 0000000000000007 [ 666.621438][ T5871] RBP: ffff8880a9097810 R08: ffff888097800500 R09: ffffed1015d06be8 [ 666.647744][ T5871] R10: ffffed1015d06be7 R11: ffff8880ae835f3b R12: 0000000000000000 [ 666.656318][ T5871] R13: dffffc0000000000 R14: ffff8880952dadc0 R15: fffffffffffffff4 [ 666.664366][ T5871] FS: 00007f34331e2700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 666.673406][ T5871] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 666.680292][ T5871] CR2: 00005555569f19b8 CR3: 0000000099ca9000 CR4: 00000000001406f0 [ 666.688359][ T5871] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 666.696458][T15769] kobject: 'loop2' (0000000098c9826e): kobject_uevent_env [ 666.703600][T15769] kobject: 'loop2' (0000000098c9826e): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 666.713907][ T5871] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 666.721997][ T5871] Kernel panic - not syncing: Fatal exception [ 666.729471][ T5871] Kernel Offset: disabled [ 666.733797][ T5871] Rebooting in 86400 seconds..