{0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r6, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r6, 0x0, 0x0) setsockopt$sock_int(r7, 0x1, 0x8, &(0x7f0000785000), 0x34a) sendmmsg$alg(r7, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:21:38 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 13:21:38 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x3c00000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 506.710296][T22312] binder: 22303:22312 unknown command 0 [ 506.734585][T22312] binder: 22303:22312 ioctl c0306201 20000080 returned -22 13:21:38 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x4000000) [ 506.758087][T22312] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor.5' sets config #0 13:21:38 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 13:21:38 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x4000000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:21:38 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x6000000) 13:21:38 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x4305000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:21:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:21:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0xa000000) 13:21:41 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101040, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000200)=r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r4 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000080)={0x8a, 0x0, &(0x7f0000000180)=[@release={0x400c630f}], 0x66, 0x0, 0x0}) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000340)={0x7fff, 0x5, 0x1600000000000, 0xf1e3, 0x2, 0x28, 0xf, "0ab06d14baa813bd2eb1bd78a29ffe5ea1ae4392", "8fcb8ae537eb761367e41f9158c40d0e52d34dcb"}) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r5 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8000000000b, 0x200000000001) ioctl$FS_IOC_FSGETXATTR(r5, 0x80045505, &(0x7f0000000240)) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000380)=0x7aa, 0x4) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r5, 0xc00c642d, &(0x7f0000000280)={0x0, 0x9125cec8be83f6d8, r0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r6, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r6, 0x0, 0x0) setsockopt$sock_int(r7, 0x1, 0x8, &(0x7f0000785000), 0x34a) sendmmsg$alg(r7, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:21:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 13:21:41 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x5000000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:21:41 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(0xffffffffffffffff, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 13:21:41 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x5800000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:21:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0xc000000) 13:21:41 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(0xffffffffffffffff, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 509.824683][T22357] binder: 22348:22357 unknown command 0 [ 509.855578][T22357] binder: 22348:22357 ioctl c0306201 20000080 returned -22 13:21:41 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240), 0x0, 0x10000}], 0x0, 0x0) [ 509.911762][T22357] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor.5' sets config #0 13:21:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0xe000000) 13:21:41 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x6000000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:21:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:21:44 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(0xffffffffffffffff, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 13:21:44 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240), 0x0, 0x10000}], 0x0, 0x0) 13:21:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x10000000) 13:21:44 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x800e000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:21:44 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101040, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000200)=r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r4 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000080)={0x8a, 0x0, &(0x7f0000000180)=[@release={0x400c630f}], 0x66, 0x0, 0x0}) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000340)={0x7fff, 0x5, 0x1600000000000, 0xf1e3, 0x2, 0x28, 0xf, "0ab06d14baa813bd2eb1bd78a29ffe5ea1ae4392", "8fcb8ae537eb761367e41f9158c40d0e52d34dcb"}) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r5 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8000000000b, 0x200000000001) ioctl$FS_IOC_FSGETXATTR(r5, 0x80045505, &(0x7f0000000240)) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000380)=0x7aa, 0x4) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r5, 0xc00c642d, &(0x7f0000000280)={0x0, 0x9125cec8be83f6d8, r0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r6, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r6, 0x0, 0x0) writev(r6, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r7, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:21:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x40000000) 13:21:44 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x8035000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:21:44 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 512.847844][T22398] binder: 22397:22398 unknown command 0 [ 512.876747][T22398] binder: 22397:22398 ioctl c0306201 20000080 returned -22 13:21:44 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240), 0x0, 0x10000}], 0x0, 0x0) [ 512.946889][T22398] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor.5' sets config #0 13:21:44 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x8100000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:21:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x60000000) 13:21:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:21:47 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 13:21:47 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x65580000) 13:21:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2", 0x24, 0x10000}], 0x0, 0x0) 13:21:47 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:21:47 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101040, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000200)=r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r4 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000080)={0x8a, 0x0, &(0x7f0000000180)=[@release={0x400c630f}], 0x66, 0x0, 0x0}) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000340)={0x7fff, 0x5, 0x1600000000000, 0xf1e3, 0x2, 0x28, 0xf, "0ab06d14baa813bd2eb1bd78a29ffe5ea1ae4392", "8fcb8ae537eb761367e41f9158c40d0e52d34dcb"}) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r5 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8000000000b, 0x200000000001) ioctl$FS_IOC_FSGETXATTR(r5, 0x80045505, &(0x7f0000000240)) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000380)=0x7aa, 0x4) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r5, 0xc00c642d, &(0x7f0000000280)={0x0, 0x9125cec8be83f6d8, r0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r6, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r6, 0x0, 0x0) writev(r6, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r7, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) [ 515.901210][T22440] binder: 22435:22440 unknown command 0 [ 515.906949][T22440] binder: 22435:22440 ioctl c0306201 20000080 returned -22 13:21:47 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, 0xffffffffffffffff) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 13:21:47 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x8847000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:21:47 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x81000000) 13:21:47 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2", 0x24, 0x10000}], 0x0, 0x0) [ 516.043795][T22440] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor.5' sets config #0 13:21:47 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 13:21:47 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x8848000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:21:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:21:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x88a8ffff) 13:21:50 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2", 0x24, 0x10000}], 0x0, 0x0) 13:21:50 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x8864000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:21:50 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 13:21:50 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101040, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000200)=r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r4 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000080)={0x8a, 0x0, &(0x7f0000000180)=[@release={0x400c630f}], 0x66, 0x0, 0x0}) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000340)={0x7fff, 0x5, 0x1600000000000, 0xf1e3, 0x2, 0x28, 0xf, "0ab06d14baa813bd2eb1bd78a29ffe5ea1ae4392", "8fcb8ae537eb761367e41f9158c40d0e52d34dcb"}) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r5 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8000000000b, 0x200000000001) ioctl$FS_IOC_FSGETXATTR(r5, 0x80045505, &(0x7f0000000240)) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000380)=0x7aa, 0x4) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r5, 0xc00c642d, &(0x7f0000000280)={0x0, 0x9125cec8be83f6d8, r0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r6, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r6, 0x0, 0x0) writev(r6, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r7, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:21:50 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 519.011605][T22482] binder: 22476:22482 unknown command 0 [ 519.034311][T22482] binder: 22476:22482 ioctl c0306201 20000080 returned -22 13:21:50 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x88a8ffff00000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 519.090718][T22482] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor.5' sets config #0 13:21:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x9effffff) 13:21:50 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 13:21:50 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x0, 0x0, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 13:21:50 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x0, 0x0, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 13:21:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:21:53 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x88caffff00000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:21:53 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 13:21:53 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0xaa010000) 13:21:53 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x0, 0x0, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 13:21:53 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101040, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000200)=r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r4 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000080)={0x8a, 0x0, &(0x7f0000000180)=[@release={0x400c630f}], 0x66, 0x0, 0x0}) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000340)={0x7fff, 0x5, 0x1600000000000, 0xf1e3, 0x2, 0x28, 0xf, "0ab06d14baa813bd2eb1bd78a29ffe5ea1ae4392", "8fcb8ae537eb761367e41f9158c40d0e52d34dcb"}) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r5 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8000000000b, 0x200000000001) ioctl$FS_IOC_FSGETXATTR(r5, 0x80045505, &(0x7f0000000240)) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000380)=0x7aa, 0x4) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r5, 0xc00c642d, &(0x7f0000000280)={0x0, 0x9125cec8be83f6d8, r0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r6, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) setsockopt$sock_int(r7, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r6, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r7, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:21:53 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x8906000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 522.065769][T22527] binder: 22524:22527 unknown command 0 [ 522.079698][T22527] binder: 22524:22527 ioctl c0306201 20000080 returned -22 13:21:53 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0xf0ffffff) 13:21:53 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000200), 0x0) 13:21:53 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000", 0x36, 0x10000}], 0x0, 0x0) 13:21:53 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101040, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000200)=r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r4 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000080)={0x8a, 0x0, &(0x7f0000000180)=[@release={0x400c630f}], 0x66, 0x0, 0x0}) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000340)={0x7fff, 0x5, 0x1600000000000, 0xf1e3, 0x2, 0x28, 0xf, "0ab06d14baa813bd2eb1bd78a29ffe5ea1ae4392", "8fcb8ae537eb761367e41f9158c40d0e52d34dcb"}) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r5 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8000000000b, 0x200000000001) ioctl$FS_IOC_FSGETXATTR(r5, 0x80045505, &(0x7f0000000240)) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000380)=0x7aa, 0x4) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r5, 0xc00c642d, &(0x7f0000000280)={0x0, 0x9125cec8be83f6d8, r0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r6, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) setsockopt$sock_int(r7, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r6, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r7, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:21:53 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x89ffffff00000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 522.562045][T22554] binder: 22551:22554 unknown command 0 [ 522.567745][T22554] binder: 22551:22554 ioctl c0306201 20000080 returned -22 [ 522.623732][T22558] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor.5' sets config #0 13:21:56 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000200), 0x0) 13:21:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0xffffa888) 13:21:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:21:56 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, 0x0) 13:21:56 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x8dffffff00000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:21:56 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101040, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000200)=r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r4 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000080)={0x8a, 0x0, &(0x7f0000000180)=[@release={0x400c630f}], 0x66, 0x0, 0x0}) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000340)={0x7fff, 0x5, 0x1600000000000, 0xf1e3, 0x2, 0x28, 0xf, "0ab06d14baa813bd2eb1bd78a29ffe5ea1ae4392", "8fcb8ae537eb761367e41f9158c40d0e52d34dcb"}) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r5 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8000000000b, 0x200000000001) ioctl$FS_IOC_FSGETXATTR(r5, 0x80045505, &(0x7f0000000240)) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000380)=0x7aa, 0x4) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r5, 0xc00c642d, &(0x7f0000000280)={0x0, 0x9125cec8be83f6d8, r0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r6, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) setsockopt$sock_int(r7, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r6, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r7, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:21:56 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:21:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0xfffff000) [ 525.206089][T22574] binder: 22565:22574 unknown command 0 [ 525.235598][T22574] binder: 22565:22574 ioctl c0306201 20000080 returned -22 13:21:56 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000200), 0x0) 13:21:56 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, 0x0) [ 525.315270][T22574] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor.5' sets config #0 13:21:56 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0xfc00000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:21:56 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101040, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000200)=r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r4 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000080)={0x8a, 0x0, &(0x7f0000000180)=[@release={0x400c630f}], 0x66, 0x0, 0x0}) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000340)={0x7fff, 0x5, 0x1600000000000, 0xf1e3, 0x2, 0x28, 0xf, "0ab06d14baa813bd2eb1bd78a29ffe5ea1ae4392", "8fcb8ae537eb761367e41f9158c40d0e52d34dcb"}) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r5 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8000000000b, 0x200000000001) ioctl$FS_IOC_FSGETXATTR(r5, 0x80045505, &(0x7f0000000240)) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000380)=0x7aa, 0x4) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r5, 0xc00c642d, &(0x7f0000000280)={0x0, 0x9125cec8be83f6d8, r0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, 0x0, 0x0) setsockopt$sock_int(r7, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r6, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r7, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:21:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0xffffff7f) 13:21:57 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140), &(0x7f0000000200), 0x0) [ 525.672677][T22601] binder: 22599:22601 unknown command 0 [ 525.703500][T22601] binder: 22599:22601 ioctl c0306201 20000080 returned -22 [ 525.797501][T22601] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor.5' sets config #0 13:21:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:21:59 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0xfe80000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:21:59 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000", 0x3f, 0x10000}], 0x0, 0x0) 13:21:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0xffffff9e) 13:21:59 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140), &(0x7f0000000200), 0x0) 13:21:59 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101040, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000200)=r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r4 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000080)={0x8a, 0x0, &(0x7f0000000180)=[@release={0x400c630f}], 0x66, 0x0, 0x0}) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000340)={0x7fff, 0x5, 0x1600000000000, 0xf1e3, 0x2, 0x28, 0xf, "0ab06d14baa813bd2eb1bd78a29ffe5ea1ae4392", "8fcb8ae537eb761367e41f9158c40d0e52d34dcb"}) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r5 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8000000000b, 0x200000000001) ioctl$FS_IOC_FSGETXATTR(r5, 0x80045505, &(0x7f0000000240)) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000380)=0x7aa, 0x4) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r5, 0xc00c642d, &(0x7f0000000280)={0x0, 0x9125cec8be83f6d8, r0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, 0x0, 0x0) setsockopt$sock_int(r7, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r6, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r7, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:21:59 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0xfec0000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:21:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0xfffffff0) [ 528.390064][T22623] binder: 22618:22623 unknown command 0 [ 528.395722][T22623] binder: 22618:22623 ioctl c0306201 20000080 returned -22 13:21:59 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140), &(0x7f0000000200), 0x0) 13:21:59 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0xf0ffffffffffff) 13:22:00 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, 0x0) [ 528.504121][T22623] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor.5' sets config #0 13:22:00 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0xff00000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:02 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 13:22:02 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101040, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000200)=r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r4 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000080)={0x8a, 0x0, &(0x7f0000000180)=[@release={0x400c630f}], 0x66, 0x0, 0x0}) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000340)={0x7fff, 0x5, 0x1600000000000, 0xf1e3, 0x2, 0x28, 0xf, "0ab06d14baa813bd2eb1bd78a29ffe5ea1ae4392", "8fcb8ae537eb761367e41f9158c40d0e52d34dcb"}) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r5 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8000000000b, 0x200000000001) ioctl$FS_IOC_FSGETXATTR(r5, 0x80045505, &(0x7f0000000240)) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000380)=0x7aa, 0x4) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r5, 0xc00c642d, &(0x7f0000000280)={0x0, 0x9125cec8be83f6d8, r0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, 0x0, 0x0) setsockopt$sock_int(r7, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r6, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r7, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:02 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0xffffffff00000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x100000000000000) 13:22:02 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, 0x0) 13:22:02 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x200000000000000) 13:22:02 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 531.420187][T22670] binder: 22661:22670 unknown command 0 [ 531.442519][T22670] binder: 22661:22670 ioctl c0306201 20000080 returned -22 13:22:02 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 13:22:03 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f424852", 0x44, 0x10000}], 0x0, 0x0) [ 531.506209][T22670] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor.5' sets config #0 13:22:03 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x400000000000000) 13:22:03 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101040, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000200)=r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r4 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000080)={0x8a, 0x0, &(0x7f0000000180)=[@release={0x400c630f}], 0x66, 0x0, 0x0}) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000340)={0x7fff, 0x5, 0x1600000000000, 0xf1e3, 0x2, 0x28, 0xf, "0ab06d14baa813bd2eb1bd78a29ffe5ea1ae4392", "8fcb8ae537eb761367e41f9158c40d0e52d34dcb"}) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r5 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8000000000b, 0x200000000001) ioctl$FS_IOC_FSGETXATTR(r5, 0x80045505, &(0x7f0000000240)) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000380)=0x7aa, 0x4) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r5, 0xc00c642d, &(0x7f0000000280)={0x0, 0x9125cec8be83f6d8, r0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(0xffffffffffffffff, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:03 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:03 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) [ 531.875472][T22693] binder: 22689:22693 unknown command 0 [ 531.909830][T22693] binder: 22689:22693 ioctl c0306201 20000080 returned -22 [ 531.945213][T22693] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor.5' sets config #0 13:22:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x600000000000000) 13:22:05 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 13:22:05 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:05 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101040, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000200)=r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r4 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000080)={0x8a, 0x0, &(0x7f0000000180)=[@release={0x400c630f}], 0x66, 0x0, 0x0}) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000340)={0x7fff, 0x5, 0x1600000000000, 0xf1e3, 0x2, 0x28, 0xf, "0ab06d14baa813bd2eb1bd78a29ffe5ea1ae4392", "8fcb8ae537eb761367e41f9158c40d0e52d34dcb"}) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r5 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8000000000b, 0x200000000001) ioctl$FS_IOC_FSGETXATTR(r5, 0x80045505, &(0x7f0000000240)) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000380)=0x7aa, 0x4) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r5, 0xc00c642d, &(0x7f0000000280)={0x0, 0x9125cec8be83f6d8, r0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(0xffffffffffffffff, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:05 executing program 3: gettid() ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0xffffffc2}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 13:22:05 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:05 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0xa00000000000000) [ 534.490806][T22715] binder: 22714:22715 unknown command 0 [ 534.496552][T22715] binder: 22714:22715 ioctl c0306201 20000080 returned -22 13:22:06 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 13:22:06 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x5], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:06 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101040, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000200)=r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r4 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000080)={0x8a, 0x0, &(0x7f0000000180)=[@release={0x400c630f}], 0x66, 0x0, 0x0}) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000340)={0x7fff, 0x5, 0x1600000000000, 0xf1e3, 0x2, 0x28, 0xf, "0ab06d14baa813bd2eb1bd78a29ffe5ea1ae4392", "8fcb8ae537eb761367e41f9158c40d0e52d34dcb"}) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r5 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8000000000b, 0x200000000001) ioctl$FS_IOC_FSGETXATTR(r5, 0x80045505, &(0x7f0000000240)) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000380)=0x7aa, 0x4) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r5, 0xc00c642d, &(0x7f0000000280)={0x0, 0x9125cec8be83f6d8, r0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(0xffffffffffffffff, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0xc00000000000000) [ 535.081744][T22744] binder: 22743:22744 unknown command 0 [ 535.098166][T22744] binder: 22743:22744 ioctl c0306201 20000080 returned -22 [ 535.141596][T22744] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor.5' sets config #0 13:22:08 executing program 3: 13:22:08 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 13:22:08 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x6], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0b") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:08 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0xe00000000000000) 13:22:08 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101040, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000200)=r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r4 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000080)={0x8a, 0x0, &(0x7f0000000180)=[@release={0x400c630f}], 0x66, 0x0, 0x0}) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000340)={0x7fff, 0x5, 0x1600000000000, 0xf1e3, 0x2, 0x28, 0xf, "0ab06d14baa813bd2eb1bd78a29ffe5ea1ae4392", "8fcb8ae537eb761367e41f9158c40d0e52d34dcb"}) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r5 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8000000000b, 0x200000000001) ioctl$FS_IOC_FSGETXATTR(r5, 0x80045505, &(0x7f0000000240)) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000380)=0x7aa, 0x4) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r5, 0xc00c642d, &(0x7f0000000280)={0x0, 0x9125cec8be83f6d8, r0}) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r6, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r6, 0x0, 0x0) setsockopt$sock_int(r7, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r6, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r7, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) [ 537.514415][T22762] binder: 22760:22762 unknown command 0 13:22:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x1000000000000000) 13:22:09 executing program 3: 13:22:09 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x7], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 537.558046][T22762] binder: 22760:22762 ioctl c0306201 20000080 returned -22 13:22:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) [ 537.643440][T22774] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor.5' sets config #0 13:22:09 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:09 executing program 3: 13:22:09 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 13:22:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x4000000000000000) 13:22:09 executing program 3: 13:22:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0b") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:12 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x6000000000000000) 13:22:12 executing program 3: 13:22:12 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xb], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 13:22:12 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101040, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000200)=r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r4 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000080)={0x8a, 0x0, &(0x7f0000000180)=[@release={0x400c630f}], 0x66, 0x0, 0x0}) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000340)={0x7fff, 0x5, 0x1600000000000, 0xf1e3, 0x2, 0x28, 0xf, "0ab06d14baa813bd2eb1bd78a29ffe5ea1ae4392", "8fcb8ae537eb761367e41f9158c40d0e52d34dcb"}) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r5 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8000000000b, 0x200000000001) ioctl$FS_IOC_FSGETXATTR(r5, 0x80045505, &(0x7f0000000240)) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000380)=0x7aa, 0x4) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r6, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r6, 0x0, 0x0) setsockopt$sock_int(r7, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r6, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r7, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:12 executing program 3: [ 540.601349][T22810] binder: 22806:22810 unknown command 0 [ 540.613849][T22810] binder: 22806:22810 ioctl c0306201 20000080 returned -22 13:22:12 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xd], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 540.654563][T22810] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor.5' sets config #0 13:22:12 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0xffffffc2}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) 13:22:12 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, 0x0) 13:22:12 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x6558000000000000) 13:22:12 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x28], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, 0x0) 13:22:15 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x8100000000000000) 13:22:15 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x29], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0b") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:15 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x8, 0x0, &(0x7f0000000040)) 13:22:15 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101040, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000200)=r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r4 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000080)={0x8a, 0x0, &(0x7f0000000180)=[@release={0x400c630f}], 0x66, 0x0, 0x0}) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000340)={0x7fff, 0x5, 0x1600000000000, 0xf1e3, 0x2, 0x28, 0xf, "0ab06d14baa813bd2eb1bd78a29ffe5ea1ae4392", "8fcb8ae537eb761367e41f9158c40d0e52d34dcb"}) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r5 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8000000000b, 0x200000000001) ioctl$FS_IOC_FSGETXATTR(r5, 0x80045505, &(0x7f0000000240)) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r6, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r6, 0x0, 0x0) setsockopt$sock_int(r7, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r6, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r7, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:15 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x2b], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 543.698498][T22854] binder: 22849:22854 unknown command 0 [ 543.723537][T22854] binder: 22849:22854 ioctl c0306201 20000080 returned -22 13:22:15 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x88a8ffff00000000) 13:22:15 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0xffffffc2}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) 13:22:15 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48}], 0x0, 0x0) [ 543.810136][T22854] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor.5' sets config #0 13:22:15 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x2c], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:15 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x9effffff00000000) 13:22:15 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x2f], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:15 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0xffffffc2}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) 13:22:15 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0xaa01000000000000) 13:22:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7b") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:18 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0xffffffc2}], 0x100000c7, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) 13:22:18 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x3c], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:18 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0xf0ffffff00000000) 13:22:18 executing program 3: openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_dev$media(0x0, 0x57, 0x5a402) accept(r0, &(0x7f0000000140)=@xdp, &(0x7f00000000c0)=0x80) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) listen(r1, 0x8) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) prctl$PR_SET_TSC(0x1a, 0x2) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, &(0x7f0000000100)) close(0xffffffffffffffff) 13:22:18 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101040, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000200)=r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r4 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000080)={0x8a, 0x0, &(0x7f0000000180)=[@release={0x400c630f}], 0x66, 0x0, 0x0}) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000340)={0x7fff, 0x5, 0x1600000000000, 0xf1e3, 0x2, 0x28, 0xf, "0ab06d14baa813bd2eb1bd78a29ffe5ea1ae4392", "8fcb8ae537eb761367e41f9158c40d0e52d34dcb"}) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8000000000b, 0x200000000001) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r5, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r5, 0x0, 0x0) setsockopt$sock_int(r6, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r5, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r6, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:18 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x50], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 546.773506][T22912] binder: 22911:22912 unknown command 0 [ 546.807681][T22912] binder: 22911:22912 ioctl c0306201 20000080 returned -22 13:22:18 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0xffffff7f00000000) 13:22:18 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101040, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000200)=r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r4 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000080)={0x8a, 0x0, &(0x7f0000000180)=[@release={0x400c630f}], 0x66, 0x0, 0x0}) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000340)={0x7fff, 0x5, 0x1600000000000, 0xf1e3, 0x2, 0x28, 0xf, "0ab06d14baa813bd2eb1bd78a29ffe5ea1ae4392", "8fcb8ae537eb761367e41f9158c40d0e52d34dcb"}) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r5 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8000000000b, 0x200000000001) ioctl$FS_IOC_FSGETXATTR(r5, 0x80045505, &(0x7f0000000240)) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000380)=0x7aa, 0x4) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r5, 0xc00c642d, &(0x7f0000000280)={0x0, 0x9125cec8be83f6d8, r0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r6, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) setsockopt$sock_int(r7, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r6, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r7, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:18 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x58], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:18 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x60], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:18 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0xfffffffffffff000) [ 547.406745][T22932] binder: 22930:22932 unknown command 0 [ 547.447388][T22932] binder: 22930:22932 ioctl c0306201 20000080 returned -22 [ 547.530573][T22932] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor.1' sets config #0 13:22:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7b") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:21 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101040, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000200)=r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r4 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000080)={0x8a, 0x0, &(0x7f0000000180)=[@release={0x400c630f}], 0x66, 0x0, 0x0}) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000340)={0x7fff, 0x5, 0x1600000000000, 0xf1e3, 0x2, 0x28, 0xf, "0ab06d14baa813bd2eb1bd78a29ffe5ea1ae4392", "8fcb8ae537eb761367e41f9158c40d0e52d34dcb"}) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r5 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8000000000b, 0x200000000001) ioctl$FS_IOC_FSGETXATTR(r5, 0x80045505, &(0x7f0000000240)) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000380)=0x7aa, 0x4) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r5, 0xc00c642d, &(0x7f0000000280)={0x0, 0x9125cec8be83f6d8, r0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r6, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r6, 0x0, 0x0) writev(r6, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r7, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:21 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x0) ioctl(r0, 0x1, &(0x7f0000000040)="f4830dfef9f65451ae5dca504360e146bbbe4723edfd3d47d2e393641a6b8a5d8e1fbdd497f5150c5b86684db92576cbcfc592b455d6ad67f9dad7212fb8") 13:22:21 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xf0], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:21 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 13:22:21 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101040, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000200)=r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r4 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000080)={0x8a, 0x0, &(0x7f0000000180)=[@release={0x400c630f}], 0x66, 0x0, 0x0}) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000340)={0x7fff, 0x5, 0x1600000000000, 0xf1e3, 0x2, 0x28, 0xf, "0ab06d14baa813bd2eb1bd78a29ffe5ea1ae4392", "8fcb8ae537eb761367e41f9158c40d0e52d34dcb"}) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r5, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r5, 0x0, 0x0) setsockopt$sock_int(r6, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r5, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r6, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:21 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xfc], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 549.827969][T22953] binder: 22949:22953 unknown command 0 [ 549.846586][T22953] binder: 22949:22953 ioctl c0306201 20000080 returned -22 [ 549.911978][T22954] binder: BINDER_SET_CONTEXT_MGR already set 13:22:21 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:22:21 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x1ff, 0x800) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000040)) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$sock(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="14cfe793daaabfea6c8de706538b3f35ddf7c2612395c8a8bfa016472b11c405ba4a4688bbedb7cb887eb958b42afd02c317f5a6d32575cfc3ab7b14c3cb12e583518335f717d2ac5f99ef2d3ef89c32538f9494b5328e30c99e1a4719b0c0b2904b136a89e98c684ac1eadc04b73bead32f3292bae983889927155fb862eaa27b07a93123099b516d2d7714177867d9924648b087bd28470ad8c35c3eb8a5239a4dccfdbe73cf", 0xa7}, {&(0x7f00000002c0)="a7159811559ae1b8513b505df10f5d4cd734c5d6b403ef249e92825369755c7ea9d1e2563997596ccba3fccc43903a3ed38d83db3ca5ec5c5634fcc7a2ab7ec69950f4bdc4bec886adcad2d01be84a03a2a21d733606a2989e19580d70a48f87d16840937f6c699c083b924cdc90fd499d185edd0842b7b9c93f8c1ad3f169a6a65997ce80b82741c6e40b76265c1e4886e30d47", 0x94}], 0x2, &(0x7f0000000100)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}, @timestamping={{0x14, 0x1, 0x25, 0x6}}], 0x30}, 0x240048c0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") write$P9_RFSYNC(r0, &(0x7f0000000580)={0x7, 0x33, 0x1}, 0x7) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f00000003c0)={0x0, @in={{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0xfffffffffffffffd, 0xad, 0x1, 0x5}, &(0x7f0000000480)=0x98) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000004c0)={r3, 0x71, "0c0e975c167251121d8403bb078f9fcce95643cb5ba4ef35e842b3ae2eba775107f690493e95395688f4e27dbe3e37effce8ba00bdf6901464603eab488837ef98eed16269a2e4e0df6333f5bef6fc2d2464a0371da5058445f4edc0ce592f1de7360637dec16431b85cedef0286b0ea0e"}, &(0x7f0000000540)=0x79) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000280002e6f594"], 0x1}}, 0x0) [ 549.952400][T22954] binder: 22952:22954 ioctl 40046207 0 returned -16 13:22:21 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x300], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 550.056898][T22954] binder: 22952:22954 unknown command 0 [ 550.092606][T22954] binder: 22952:22954 ioctl c0306201 20000080 returned -22 13:22:21 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9d"], 0x1}}, 0x0) [ 550.148969][T22954] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor.3' sets config #0 13:22:21 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r2 = getpgid(0xffffffffffffffff) ptrace$peek(0x3, r2, &(0x7f00000000c0)) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="0000008020030000080002e6f59435009425136b38f718c256718b081c2ecd9c062234fd477ce8614183ee62ad1d71474103c00c7df12943f60803b736d5ab97d6d354daf74aca881dcf7cba894a2e51ed45b2a3b825bf570ea7bd647da66d"], 0x1}}, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x200, 0x0) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0), 0x4) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, &(0x7f0000000200)=r4) 13:22:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7b") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:24 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x500], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:24 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:22:24 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x210400, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r2, &(0x7f0000000040)={0x2, 0x5}, 0x2) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="00ff00776a284bf01b526ce6f59d"], 0x1}}, 0x0) 13:22:24 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101040, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000200)=r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r4 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r4, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000080)={0x8a, 0x0, &(0x7f0000000180)=[@release={0x400c630f}], 0x66, 0x0, 0x0}) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000340)={0x7fff, 0x5, 0x1600000000000, 0xf1e3, 0x2, 0x28, 0xf, "0ab06d14baa813bd2eb1bd78a29ffe5ea1ae4392", "8fcb8ae537eb761367e41f9158c40d0e52d34dcb"}) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r5 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8000000000b, 0x200000000001) ioctl$FS_IOC_FSGETXATTR(r5, 0x80045505, &(0x7f0000000240)) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000380)=0x7aa, 0x4) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r5, 0xc00c642d, &(0x7f0000000280)={0x0, 0x9125cec8be83f6d8, r0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r7, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r7, 0x0, 0x0) setsockopt$sock_int(r8, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r7, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) close(0xffffffffffffffff) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x9) sendmmsg$alg(r8, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) ioctl$DRM_IOCTL_GEM_FLINK(r5, 0xc008640a, &(0x7f00000002c0)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000300)={r6, r9}) 13:22:24 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101040, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000200)=r1) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r3 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000080)={0x8a, 0x0, &(0x7f0000000180)=[@release={0x400c630f}], 0x66, 0x0, 0x0}) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000340)={0x7fff, 0x5, 0x1600000000000, 0xf1e3, 0x2, 0x28, 0xf, "0ab06d14baa813bd2eb1bd78a29ffe5ea1ae4392", "8fcb8ae537eb761367e41f9158c40d0e52d34dcb"}) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r4, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r4, 0x0, 0x0) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r4, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r5, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:24 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x543], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 552.954718][T22992] binder: 22991:22992 unknown command 0 [ 552.977793][T22992] binder: 22991:22992 ioctl c0306201 20000080 returned -22 [ 552.996920][T23002] binder: BINDER_SET_CONTEXT_MGR already set 13:22:24 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r1, 0x111, 0x1, 0x6, 0x4) [ 553.015196][T23002] binder: 22994:23002 ioctl 40046207 0 returned -16 13:22:24 executing program 1: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x800e000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 553.067236][T23002] binder: 22994:23002 unknown command 0 [ 553.091602][T23002] binder: 22994:23002 ioctl c0306201 20000080 returned -22 13:22:24 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x600], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:24 executing program 1: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x400000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:24 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x4000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f0000000240)=0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="0b0000f20003000001cb0ee6f594d358a731"], 0x1}}, 0x0) ioctl$VIDIOC_G_PRIORITY(r1, 0x80045643, 0x3) readv(r0, &(0x7f00000000c0)=[{}, {&(0x7f0000000040)=""/62, 0x3e}], 0x2) connect(r0, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @broadcast}, 0x1, 0x0, 0x1, 0x1}}, 0x80) r3 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) bind$inet6(r3, &(0x7f00000001c0)={0xa, 0x4e24, 0x8, @rand_addr="658c185959cc07533e2c990e7320eab1", 0xab}, 0x1c) [ 553.221233][T23002] usb usb9: usbfs: interface 0 claimed by hub while 'syz-executor.3' sets config #0 13:22:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be0") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:27 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x608], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:27 executing program 1: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0xfc000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") fcntl$getownex(r1, 0x10, &(0x7f0000000000)={0x0, 0x0}) fcntl$setown(r1, 0x8, r2) lsetxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x2) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000340)={0x8001, 0x1, 0x1}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000380)={0x0, 0x0, 0x5, 0x7}) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0xa2000, 0x0) ioctl$sock_x25_SIOCDELRT(r3, 0x890c, &(0x7f0000000200)={@remote={[], 0x0}, 0xe, 'bcsh0\x00'}) 13:22:27 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101040, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000200)=r1) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r3 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000080)={0x8a, 0x0, &(0x7f0000000180)=[@release={0x400c630f}], 0x66, 0x0, 0x0}) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r4, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r4, 0x0, 0x0) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r4, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r5, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:27 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x9, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000080)={0x7fffffff, 0x0, [], {0x0, @bt={0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffff}}}) 13:22:27 executing program 1: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x88470000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 556.050796][T23039] binder: 23036:23039 unknown command 0 [ 556.056550][T23039] binder: 23036:23039 ioctl c0306201 20000080 returned -22 13:22:27 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x689], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x0) 13:22:27 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x9, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000080)={0x7fffffff, 0x0, [], {0x0, @bt={0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffff}}}) 13:22:27 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$RTC_PIE_ON(r0, 0x7005) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) 13:22:27 executing program 1: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x3c000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be0") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:30 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x9, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000080)={0x7fffffff, 0x0, [], {0x0, @bt={0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0xffffffff, 0x8, 0x0, 0x1, 0x0, 0x10}}}) 13:22:30 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x700], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="0000008000030000080002e6f5947a6588952f6e6e514684e23cdf5022e58435388eecc24a7a1dac8cbacf1b03da96df2d1f7e92c83a4264a63c7e6109063dff70e4fcea51aa7a487bd42e6c565de104ee58ad59f6248799024c5416a399cc9e23faebb28282fc041caad9395ecc91bc07c7422527692bcd743200"/144], 0x1}}, 0x0) 13:22:30 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8000000000a, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x8108551b, &(0x7f0000000240)={0x0, 0x100000001, 0x2}) getresgid(&(0x7f0000000100)=0x0, &(0x7f0000000140), &(0x7f0000000180)) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x1ff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000280)="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", 0x1000, 0x4}], 0x800000, &(0x7f0000001280)={[{@gid={'gid', 0x3d, r1}}, {@type={'type', 0x3d, "09822742"}}, {@type={'type', 0x3d, "152c4973"}}, {@umask={'umask', 0x3d, 0x2}}], [{@smackfsdef={'smackfsdef', 0x3d, '/dev/bus/usb/00#/00#\x00'}}, {@obj_user={'obj_user', 0x3d, '(security{*keyring'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]'}}, {@context={'context', 0x3d, 'user_u'}}]}) 13:22:30 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101040, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000200)=r1) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r3 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r4, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r4, 0x0, 0x0) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r4, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r5, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:30 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x806], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 559.133960][T23082] hfs: type requires a 4 character value 13:22:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$addseals(r1, 0x409, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x400, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x39, &(0x7f0000000200)=@srh={0x7f, 0xc, 0x4, 0x6, 0x3, 0x10, 0xdcca, [@mcast1, @remote, @rand_addr="096764f47e3e4b113ad408d4a3add830", @local, @mcast1, @ipv4={[], [], @empty}]}, 0x68) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0500000094"], 0x1}}, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x800, 0x0) getsockname$tipc(r3, &(0x7f0000000040)=@id, &(0x7f00000000c0)=0x10) 13:22:30 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x9, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000080)={0x7fffffff, 0x0, [], {0x0, @bt={0x80, 0x0, 0x0, 0x0, 0xff, 0x0, 0x8, 0x8, 0x2, 0x4, 0xffffffff, 0x8, 0x0, 0x1, 0x0, 0x10}}}) [ 559.185924][T23082] hfs: unable to parse mount options 13:22:30 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8000000000a, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x8108551b, &(0x7f0000000240)={0x0, 0x100000001, 0x2}) getresgid(&(0x7f0000000100)=0x0, &(0x7f0000000140), &(0x7f0000000180)) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x1ff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000280)="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", 0x1000, 0x4}], 0x800000, &(0x7f0000001280)={[{@gid={'gid', 0x3d, r1}}, {@type={'type', 0x3d, "09822742"}}, {@type={'type', 0x3d, "152c4973"}}, {@umask={'umask', 0x3d, 0x2}}], [{@smackfsdef={'smackfsdef', 0x3d, '/dev/bus/usb/00#/00#\x00'}}, {@obj_user={'obj_user', 0x3d, '(security{*keyring'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]'}}, {@context={'context', 0x3d, 'user_u'}}]}) 13:22:30 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xb00], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:30 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000600)='/dev/autofs\x00', 0x800, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000640)=0x7, 0x4) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x0) connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x1, @remote, 'gretap0\x00'}}, 0x1e) [ 559.450277][T23102] hfs: type requires a 4 character value [ 559.469214][T23102] hfs: unable to parse mount options 13:22:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be0") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:33 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x9, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000080)={0x0, 0x0, [], {0x0, @bt={0x80, 0xc919, 0x1, 0x3, 0xff, 0x0, 0x8, 0x8, 0x2, 0x4, 0xffffffff, 0x8, 0x0, 0x1, 0x0, 0x10}}}) 13:22:33 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xd00], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:33 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000040)={0x0, 0x0}) setpgid(r2, r3) clock_getres(0x7, &(0x7f00000000c0)) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="0000009300e2840389878eba0000000000001a00000000"], 0x1}}, 0x0) 13:22:33 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8000000000a, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x8108551b, &(0x7f0000000240)={0x0, 0x100000001, 0x2}) getresgid(&(0x7f0000000100)=0x0, &(0x7f0000000140), &(0x7f0000000180)) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x1ff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000280)="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", 0x1000, 0x4}], 0x800000, &(0x7f0000001280)={[{@gid={'gid', 0x3d, r1}}, {@type={'type', 0x3d, "09822742"}}, {@type={'type', 0x3d, "152c4973"}}, {@umask={'umask', 0x3d, 0x2}}], [{@smackfsdef={'smackfsdef', 0x3d, '/dev/bus/usb/00#/00#\x00'}}, {@obj_user={'obj_user', 0x3d, '(security{*keyring'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]'}}, {@context={'context', 0x3d, 'user_u'}}]}) 13:22:33 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101040, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000200)=r1) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r3 = syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r4, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r4, 0x0, 0x0) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r4, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r5, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:33 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$rxrpc(0x21, 0x2, 0xa) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x200, 0x0) ioctl$KDMKTONE(r1, 0x4b30, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x42, 0x4000000008000) ioctl$VHOST_GET_VRING_BASE(r3, 0xc008af12, &(0x7f0000000040)) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x0) socket$unix(0x1, 0xeab331910a8d4a08, 0x0) 13:22:33 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xe80], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 562.238141][T23125] hfs: type requires a 4 character value [ 562.255628][T23125] hfs: unable to parse mount options 13:22:33 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x9, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000080)={0x0, 0x0, [], {0x0, @bt={0x80, 0xc919, 0x1, 0x3, 0xff, 0x0, 0x8, 0x8, 0x2, 0x4, 0xffffffff, 0x8, 0x0, 0x1, 0x0, 0x10}}}) 13:22:33 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8000000000a, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x8108551b, &(0x7f0000000240)={0x0, 0x100000001, 0x2}) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x1ff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000280)="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", 0x1000, 0x4}], 0x800000, &(0x7f0000001280)={[{@gid={'gid'}}, {@type={'type', 0x3d, "09822742"}}, {@type={'type', 0x3d, "152c4973"}}, {@umask={'umask', 0x3d, 0x2}}], [{@smackfsdef={'smackfsdef', 0x3d, '/dev/bus/usb/00#/00#\x00'}}, {@obj_user={'obj_user', 0x3d, '(security{*keyring'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]'}}, {@context={'context', 0x3d, 'user_u'}}]}) 13:22:33 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x2800], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:34 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) syz_open_procfs(r2, &(0x7f0000000040)='net/igmp6\x00') sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x0) [ 562.617960][T23149] hfs: type requires a 4 character value [ 562.640065][T23149] hfs: unable to parse mount options 13:22:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x0, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:36 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x9, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000080)={0x0, 0x0, [], {0x0, @bt={0x80, 0xc919, 0x1, 0x3, 0xff, 0x0, 0x8, 0x8, 0x2, 0x4, 0xffffffff, 0x8, 0x0, 0x1, 0x0, 0x10}}}) 13:22:36 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x2900], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:36 executing program 4: r0 = accept$netrom(0xffffffffffffff9c, 0x0, &(0x7f0000000380)) ioctl$sock_ifreq(r0, 0x89bf, &(0x7f00000003c0)={'ip6gre0\x00', @ifru_addrs=@vsock={0x28, 0x0, 0x2711, @host}}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x141, 0x0) r4 = syz_open_dev$adsp(&(0x7f0000000280)='/dev/adsp#\x00', 0x1f, 0x4001) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000340)=[@textreal={0x8, &(0x7f00000002c0)="66b9800000c00f326635008000000f302e0fc79c00080f21cf0f01d10f20e06635200000000f22e03e0f01df2e36f08233000f20d86635200000000f22d8b88b0e8ed0b807008ee8", 0x48}], 0x1, 0x44, &(0x7f0000000380), 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0bdaa100"/14], 0x1}}, 0x0) r5 = accept(r1, &(0x7f0000000000)=@nfc, &(0x7f00000000c0)=0x80) ioctl$SIOCGETLINKNAME(r5, 0x89e0, &(0x7f0000000200)={0x4}) 13:22:36 executing program 1: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8000000000a, 0x1) syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x1ff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000280)="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", 0x1000, 0x4}], 0x800000, &(0x7f0000001280)={[{@gid={'gid'}}, {@type={'type', 0x3d, "09822742"}}, {@type={'type', 0x3d, "152c4973"}}, {@umask={'umask', 0x3d, 0x2}}], [{@smackfsdef={'smackfsdef', 0x3d, '/dev/bus/usb/00#/00#\x00'}}, {@obj_user={'obj_user', 0x3d, '(security{*keyring'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]'}}, {@context={'context', 0x3d, 'user_u'}}]}) 13:22:36 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101040, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000200)=r1) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") syz_open_dev$binder(&(0x7f0000872936)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r3, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r3, 0x0, 0x0) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r3, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r4, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:36 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x2b00], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 565.356513][T23167] hfs: type requires a 4 character value [ 565.391430][T23167] hfs: unable to parse mount options 13:22:36 executing program 1: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x1ff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000280)="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", 0x1000, 0x4}], 0x800000, &(0x7f0000001280)={[{@gid={'gid'}}, {@type={'type', 0x3d, "09822742"}}, {@type={'type', 0x3d, "152c4973"}}, {@umask={'umask', 0x3d, 0x2}}], [{@smackfsdef={'smackfsdef', 0x3d, '/dev/bus/usb/00#/00#\x00'}}, {@obj_user={'obj_user', 0x3d, '(security{*keyring'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]'}}, {@context={'context', 0x3d, 'user_u'}}]}) 13:22:36 executing program 3: 13:22:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x0, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:37 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x2c00], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:37 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008910, &(0x7f0000000200)="aedca1ffff7be070c463ba9f7a0c6ddcce74a8ee1f00000000000000e28db80be8d71952dd26149f2f4f90b372235e21d08aec52e1638fe7f223322fb383f5aa1e29eb8b1bfa0b73dfb1d760c9776de6b2a55ee0a4d74e4b8f437f080000000000000082558ce814c471817e7a9ad02974e71ee1cbb1de2d12fb4ae29362bc200928465af2b2ddca1199a08d5a3fc0dc82284dd7d59feaea5e54491563e57fc16a5a739e1667db1efb7da1fa2b2565340a37d32b4b9d19be2ecff5d9c4ac5ca59de6959f3f997fbe664e96f6ec2cfde483b21969bb51d5217e2da56c5d") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000000)=0x9deb) 13:22:37 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000080)={0x18}, 0x18) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cuse\x00', 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000180)="11dca5055e0bcfe47bf070") unshare(0x40600) splice(r0, 0x0, r2, 0x0, 0x18, 0x0) 13:22:37 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x2f00], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 565.631381][T23189] hfs: type requires a 4 character value [ 565.667476][T23189] hfs: unable to parse mount options 13:22:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x0, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:37 executing program 1: syz_mount_image$hfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1ff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000280)="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", 0x1000, 0x4}], 0x800000, &(0x7f0000001280)={[{@gid={'gid'}}, {@type={'type', 0x3d, "09822742"}}, {@type={'type', 0x3d, "152c4973"}}, {@umask={'umask', 0x3d, 0x2}}], [{@smackfsdef={'smackfsdef', 0x3d, '/dev/bus/usb/00#/00#\x00'}}, {@obj_user={'obj_user', 0x3d, '(security{*keyring'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]'}}, {@context={'context', 0x3d, 'user_u'}}]}) 13:22:37 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x3580], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:39 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101040, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000200)=r1) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r3, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r3, 0x0, 0x0) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r3, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r4, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:39 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080), 0x22b) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x23) fcntl$setstatus(r1, 0x4, 0x42803) 13:22:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008600030000080002e6f594"], 0x1}}, 0x0) 13:22:39 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x3c00], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x0, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:39 executing program 1: syz_mount_image$hfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1ff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000280)="5c09067227b40b6cfd400d97fe09b1341cb6e7ee2fb91478703e54d3d93b2256a3d4f6b70870e3eebde203b98ab5547300a14e1749748cc63b8c29eaff8359888b19e089215aef5b489e98f3b6391f44d5b1653633421f012ce2f8c490354702c1b1762439a4b6de3290cb2636f1cdde69d4e8f4a35a40a44b0b36e015ccc4d40e3cf6c95eeea347b4403aa7d891e6b346fd9af2befa5f4a93d980e43084a4baec7e3f3f447d925b4629a6d7a3793933d13f4df551690e75134f8d9ca49e713683cd1b8e1cff25e5445f8bf39ebe4f833890917d9b0a745ae5137382c95eb3f23535002cac4142bf8ca8fce04ef7f4d8ad524cce53c218ccfeef35373a2c5040308da6a73feb5c7fbcc6ec61d01be905cc092d1327af2fc342b84a18e0d973b338d147d85ba467882e407f9cd9d9948462da5a4d1bf991445b26d96d0490d51650d2d81f108c60cf7fd2ff9f7d68216c080156bdf57c8aec0d023ee7a3cf036e5d30b944a9a5431b1781a14270d66769175cd638fca953788663e6af69b8455445672597eac1754b39c5bf554f4ed9ccba081ce2b24ebc428634b4670ec6b81d1a48067f1264cb113eae0422925f2492ec41385363483a9e2e94e1a368525b854c655bb2046e08e96aca1eb4296c87085c370dfb4347712a4459016ef2b3d435386c49951e5742c17776609de87edb3313ce105a00de1df369d35cbe74fb70626c4f05f1932e71b3c5f54052f97f01bb61d1886adeb5d44b74a3083d12c801d6ba310e8987cf9cd09ae27b996b67981463ca9f5ce027e9fb15ad8a2d46878149375f2da32640fe7e80be79395c5306337f87a24fcec7a5e98762be5da018e47d760e747e7201e8872c1b993cf055041f25451fe9fdbe1eb35a6b547a7d922c0a3d0e14dea9e097115a891c7064be2c45f6937e6f0c7687b1d762afbed9a8d665e69a913e3ca1a905e01f286aa02e0a8dce7f7f3ac23166f7f337729457da62e643626672f81a266d2efabb17953631c4593559ff0d441353f4a1ab3481ed41964453006ceae68f256a7e01daffd9661b32d35e088f7ea1d69bf75b91218c39c8b2530e55d7923a641c10ab0037ae2f41a2b944565aa2a484035291e4f06ab584887c5fa569049b19ab0096a7fc624b3a664baeaa94fc2981e40d6444f71e5acd4963f64c9e22e776a3128ed9243b602e9c832d81663f0cfc6db5f6b365ad9337c0252fe23a2a4662b074c48f79891db087a4219b2da1c42a4077337a1564083cf06c1d7a8d64464cf3d9082e5312178ee5975c2fd73a24f23834f721013ad47c18cfb28ffb6c450683d7012d27fa15de673d5887bac78db7071f06cc3aa49c68bd88c329df054c7d799479e26bbf437a42199b621c4c92add014a925d0da8b762c7fcd44c082904c19b4f6fa825abafc9e6135b2baa728155a1fe610a0b8f681643952706d5a8fe0859f19eef1461e2509eba7729d113168f9fdb3135392337ba7fd6c49c5628b0e4e2207bb51787212bc9678a2ecda2edf72ac6e885ad09783a6b0e1cd01d7bda1f844ab4cc2d3526e9b5abef62bbb16504a00d002d4959dcc7ea174c1afd7f2d2f2ae07ef326768f508498f0e980f76ba05b8b1d7577a60d8e1952da96bc9715e0cbb109fe2ae786b0790c9fea2775f5cfa7e074eb5d55c4eed123b826fd6b8a4b1b16d5475086e5404bb1e8056a156cd694235a1450b788beddbbbca88a34fbad2a15bf7213ec3c2addd71c0e7fdb9a7e9cd0ef77497c9818956f84542b35ded37ed840ee4fc1f810aabeed9ba473367aec973d0a359c0a197309f715464ac08348289873eab45c500e47314a2d3528217f73471c8542c6187705e9f8cc47e5f63b515484a84578cb101fd798ed8b680b0fa5689a9930fb765bd0362897b00995e74866e62c1ecca5605b8704ba2ad589853d6ccd8fb9b05c2aaaf9589651f3261f50008b103d73f86c2f8cf63545cf5258492f85ae8ecf07168eef812332821bb9c60ae39a2b4c7248f40c1a5954b556c710007be3c7bc2cffddd682089ee026e88572c891604f8d21b93a1c27cd3265aa865d301093f2f79339d59ab9c0307412ed1ae2b63bbff2f0f76e96c4dce8f31061b715b297bb42ecb58ff242e49ad80f1fb62098b25af19e586d07f67a695212f0f8648b9793750bd3ae946ff4eb73fb0f69acab83827deefb75a39e11bb4283b4ec32bdb13034dc40d5219ef51cb1691da9f310ccf6f7b23d37aeb1e714f730ddae523d5fb830c7e45bdfc1e25cf34a7f4d9e3638fad189a70be09b1915ab84584272658425003a97526cbdb8332f8b242c813f721a5f1691c4da7bace19301509539ae47f7e3df30cbe32ef63ab172c3fe471cdfaa887ea0adad341139bcd2925ba7fd1265b77055c41986336439a17bdc3da10ab171c8df3082437da38023e8b2cc227e2829a47dc4378b44ec5d46298983b69fe477809413569225709bff30528298b3b9d955db9e1b3ddabdb4b41a5fd20d4948245f8c9fa76848a432b8840b13865da13c25468f6a6380c58478f83848eb70d7df26e3e918a9dccb8fa74513ba5434326029aba3ffd889cee5684336f02ef9dc1e0be84f54fd2963b9825884f36fb8d58c57368152d490ca83cf81bbfe14356052ffa57ff053085d399a7779732a40526ddb80cc422b6bac6dd42ccc3d26c1e423476bd18f91e5d9a2a2c240a1c3f59a9154f08a811251931ce455e53d8f17130803b6c9a97e96f13a56eb5e877808460658b4d9356d3db710f5498877b6b9b7d603076a8e446bcce9771e496bf76166dc2cc237d6d44693c2e03463c2f9967694593163f97d5aa7449675bf280275a70af66015468914312a520a13ecbdd52602cd61e5f76fe33184c4b49633a9b97637f2261ea846486f8cb83b4cac73c5eac2f56f52b72795e6600ad62848dcde686b090c8ea2d8ea40ee6cb227d9f614273367984268ccc18cdf472f58f987da3cc8d39bea9239980172c948892db5caaa63e4c43e87dd4df2dd74c7e64785b7ba6c369e49eff54e7c4838f4242506bcbe316951345a63e6ae2012b06f89ee66f6b0642c9d6084ae9742c05cc5517ecaed5cce8c9f4c782758d3ea92b8128d3757daec5f869b8bcb8a4ba9947994c062e9dfbd5495745e72d93b6947cbee0bebc9f26d65641836879b481d939f78ee01b07d6de19ca373b5d9a513757e120af18a55c5151492efa80c2a0894bccc07bd0e25aba40d5957b2d113ccada2010f238ca658917b7c2ac42cd300a0f2474e6b3b3f1732a85215f9d893756af76f1a9bff8f30b996edfc13e33c998459ded8c155e8ff2c5310c84986401ecf44b08dbfed8d0ef5b370438a7630f9a7016632dffe9c55733342daeddab9f6d45c0f8b5706cfaa742ea20892c26bc5ad00d1b85d86e1501fa6f3bcc0ce139d5cbe7859391ce7ed0d410cd422cc066359b08e73ca8502a8b3718a99f85829ab4540350a444744935fef73dd32ab28559680dc47fd9a47806c4fe993e8f514c31317a3d512c0b55079a6b0d00ad0bd683574f2afe00f016e3ee505fe102a4e1a5e45637e7893056df862bf0516d2be0af8a2fd392df98e0c8ece8329e0e25305671c24d44db356da84e96a871ed3d66d452568bac6f98fbdb31fcfe7e7bda3e15a1ce9a8b54758014f098c98b9bcb8d7e93df105912058b0a4b31438a35879a248bc6c548fcc4c491472ec24f973d84a22ac0295b3b2baeef4fd2353751f3af58feaab1fa917f0b2642b899b4a7a92f53370cfd56619fc2f0d2b4637ff02cd41fde5eda010c89feddeb28fde0daf3ad5b526a49c807c74802f761dce50f21325cc434868b093689e8355bb22ab6b21722472f60fa4b83c08c1d7bcb1c0102fe04bee0683f259c0e5ca4c452800313e18e7381e5093543a0684c40aa78e3ae36dc7bf6359a6a0733dfbaf79b49552ea9adfafb42e6bd56191fd34ead65deabd40b30b303490f8e5ed932a4a4eb42c8bf77efbec87be2d60bb6ff947dd604a4d1e2933214474b966e511db5647833fcb3780d2faeb5922a539adf28d42626ec02e460b38e28fe6e57dd537a2cc34cd610e5f14b42952a577f0466dda9f061d3085fc33bb26226a0b5c6a7117e780582febe7d739165ae82f236ab6318363ede00dec929b6bd4f55ab5c5fb276a1b2b9c519bdcceaef5f9c7cc30ef7ac9544dcdfa1a75b4547a0d7b7a33afb9a83491fbca27328618574ce8dbd1d63098fd555205ce33fe4d067462a02773e04f743be5cce11d96640ad3b9d09cbe0905f623ce9ad76f91577d7b41375791a82d6394ae4d2e56233deea94936af8649621ccf0e3fdb14aa0875a068b17161021d81864053c18f532dced889523d7cbe3343d8efaf0f12d10f58737dea5220d942ae1da282831be311538617a5da27d96671c14a198ce441738e6e90adac5d07a4152079b8d1433466ec1df3743c585183ae97c2c82a73e901ecb97ffcd9b0f4e972dc7a85ab54ee722fa217ce6c3a590fa5244979f8d17fee5db2f97e3ce75efb301cb5d93bdd982c9c2da5ff78da23cac294cde51e08214e7b4232ec3f1d14744d3c97f0a61d0b780734fc606757033ec77f978bb4d2523f2057ff5cf76b617b03805a95769e196466f2a36fdb7dabef52417dd3b2cecda72c9ab198931c9c16b5210983c17bfc11c3f1fb70bd7560092f86ba7a8066bee3c14747dc8c6aa8e4cd4e3122b2c1145eb0a1a93a993e22d23da1669c31d80345879fce439e7294ce6471e1d6e72d736453928a02be5cc8578d918b7a31f67589b1d6c4134543dc6eb96c5c29c93102ad48eff09dd29733659ec2612cc40177c56fc1fb869e76a715b03a8f41c4170ba72f5d64dff6219e5523cfeaa3b8dc99633b869739a9c281dc3f606bca4cf3bcd91102fc9770ca29c169f04afbd474c02813819b8b271ba6689823a32cf9d22173e3e342894a09bc2a918db2842451432dd2128156d18f4e8386e75b8f52ede8ad175f8b6a1338eed558f38e373801f9ee59b1b8695af2d7c70aeea319a0817db3a0e456f2881de5e054732b13f975d0762f3f6c3f10772da4ab1b40e1ad068f1620ba2319b2bd03964a2f43ff66a11e1ad31351d0ae798d970e137e47a9c83c1e2941705b01a7889af2231cb9367874e0efa4c9e1a4668a3bec2bdea9c0652464330b0d63999ea5e93dc7ac273e7339785da19171fee4b4b4ebef2632bc173f46ade91438f35ca9eaeeafe99e549516641aad37c6f0cf744c72d6427dcf9bedfcf9432c71517328f3ad8989e8be9e673b47a1a0a8f4786e4ee1d3b91c3f18dbac4606f5c7d388af54f05aebdda0e2d40e2d53e02c4a4ee33ef70c036dd912c362dfe9e0fd913a8ee3a7d0615450d2dc466010ddb85162341ef20edcca14d03e860c0fa121438ecd9a6bd8c3c111d1dfe905e3d0861f9c82232cfc63c130f4fde7ab2bafd38613a5f52432a6f5c3ff35af6e20071a751438172694c4ba8d7015751d76832d4e4a58dfe87bf73116677f68a8eada03679dbe4dcbfba6de35229a38d2eb158757046fa9b2a6a66f107f48f5ab7ae799de328373276eea5ef852d1fa2a06dc3aa021c6e266427b581acf6cc6d66c3cb2ab981b1e6cd076c0bbd80979f6a4bfe613c926f1ee0e50846435259fc3bd6671c52de1e26ff9b35329c14bb02b383f833027de0d1152f08d2db6ee3b6e418d944e8a9e5f8f8facbfe4bc9a035b8233e64dd8a416fee1bfcc3a72760ef977138ab01316ce5413aabe480dabfd495ca84e828b239e1f3d0ab13ed5084207a78", 0x1000, 0x4}], 0x800000, &(0x7f0000001280)={[{@gid={'gid'}}, {@type={'type', 0x3d, "09822742"}}, {@type={'type', 0x3d, "152c4973"}}, {@umask={'umask', 0x3d, 0x2}}], [{@smackfsdef={'smackfsdef', 0x3d, '/dev/bus/usb/00#/00#\x00'}}, {@obj_user={'obj_user', 0x3d, '(security{*keyring'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]'}}, {@context={'context', 0x3d, 'user_u'}}]}) 13:22:39 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x4000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x400, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0xffffffff, 0x4040) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000200)={'HL\x00'}, &(0x7f0000000100)=0x1e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x0) 13:22:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x0, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:39 executing program 1: syz_mount_image$hfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1ff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000280)="5c09067227b40b6cfd400d97fe09b1341cb6e7ee2fb91478703e54d3d93b2256a3d4f6b70870e3eebde203b98ab5547300a14e1749748cc63b8c29eaff8359888b19e089215aef5b489e98f3b6391f44d5b1653633421f012ce2f8c490354702c1b1762439a4b6de3290cb2636f1cdde69d4e8f4a35a40a44b0b36e015ccc4d40e3cf6c95eeea347b4403aa7d891e6b346fd9af2befa5f4a93d980e43084a4baec7e3f3f447d925b4629a6d7a3793933d13f4df551690e75134f8d9ca49e713683cd1b8e1cff25e5445f8bf39ebe4f833890917d9b0a745ae5137382c95eb3f23535002cac4142bf8ca8fce04ef7f4d8ad524cce53c218ccfeef35373a2c5040308da6a73feb5c7fbcc6ec61d01be905cc092d1327af2fc342b84a18e0d973b338d147d85ba467882e407f9cd9d9948462da5a4d1bf991445b26d96d0490d51650d2d81f108c60cf7fd2ff9f7d68216c080156bdf57c8aec0d023ee7a3cf036e5d30b944a9a5431b1781a14270d66769175cd638fca953788663e6af69b8455445672597eac1754b39c5bf554f4ed9ccba081ce2b24ebc428634b4670ec6b81d1a48067f1264cb113eae0422925f2492ec41385363483a9e2e94e1a368525b854c655bb2046e08e96aca1eb4296c87085c370dfb4347712a4459016ef2b3d435386c49951e5742c17776609de87edb3313ce105a00de1df369d35cbe74fb70626c4f05f1932e71b3c5f54052f97f01bb61d1886adeb5d44b74a3083d12c801d6ba310e8987cf9cd09ae27b996b67981463ca9f5ce027e9fb15ad8a2d46878149375f2da32640fe7e80be79395c5306337f87a24fcec7a5e98762be5da018e47d760e747e7201e8872c1b993cf055041f25451fe9fdbe1eb35a6b547a7d922c0a3d0e14dea9e097115a891c7064be2c45f6937e6f0c7687b1d762afbed9a8d665e69a913e3ca1a905e01f286aa02e0a8dce7f7f3ac23166f7f337729457da62e643626672f81a266d2efabb17953631c4593559ff0d441353f4a1ab3481ed41964453006ceae68f256a7e01daffd9661b32d35e088f7ea1d69bf75b91218c39c8b2530e55d7923a641c10ab0037ae2f41a2b944565aa2a484035291e4f06ab584887c5fa569049b19ab0096a7fc624b3a664baeaa94fc2981e40d6444f71e5acd4963f64c9e22e776a3128ed9243b602e9c832d81663f0cfc6db5f6b365ad9337c0252fe23a2a4662b074c48f79891db087a4219b2da1c42a4077337a1564083cf06c1d7a8d64464cf3d9082e5312178ee5975c2fd73a24f23834f721013ad47c18cfb28ffb6c450683d7012d27fa15de673d5887bac78db7071f06cc3aa49c68bd88c329df054c7d799479e26bbf437a42199b621c4c92add014a925d0da8b762c7fcd44c082904c19b4f6fa825abafc9e6135b2baa728155a1fe610a0b8f681643952706d5a8fe0859f19eef1461e2509eba7729d113168f9fdb3135392337ba7fd6c49c5628b0e4e2207bb51787212bc9678a2ecda2edf72ac6e885ad09783a6b0e1cd01d7bda1f844ab4cc2d3526e9b5abef62bbb16504a00d002d4959dcc7ea174c1afd7f2d2f2ae07ef326768f508498f0e980f76ba05b8b1d7577a60d8e1952da96bc9715e0cbb109fe2ae786b0790c9fea2775f5cfa7e074eb5d55c4eed123b826fd6b8a4b1b16d5475086e5404bb1e8056a156cd694235a1450b788beddbbbca88a34fbad2a15bf7213ec3c2addd71c0e7fdb9a7e9cd0ef77497c9818956f84542b35ded37ed840ee4fc1f810aabeed9ba473367aec973d0a359c0a197309f715464ac08348289873eab45c500e47314a2d3528217f73471c8542c6187705e9f8cc47e5f63b515484a84578cb101fd798ed8b680b0fa5689a9930fb765bd0362897b00995e74866e62c1ecca5605b8704ba2ad589853d6ccd8fb9b05c2aaaf9589651f3261f50008b103d73f86c2f8cf63545cf5258492f85ae8ecf07168eef812332821bb9c60ae39a2b4c7248f40c1a5954b556c710007be3c7bc2cffddd682089ee026e88572c891604f8d21b93a1c27cd3265aa865d301093f2f79339d59ab9c0307412ed1ae2b63bbff2f0f76e96c4dce8f31061b715b297bb42ecb58ff242e49ad80f1fb62098b25af19e586d07f67a695212f0f8648b9793750bd3ae946ff4eb73fb0f69acab83827deefb75a39e11bb4283b4ec32bdb13034dc40d5219ef51cb1691da9f310ccf6f7b23d37aeb1e714f730ddae523d5fb830c7e45bdfc1e25cf34a7f4d9e3638fad189a70be09b1915ab84584272658425003a97526cbdb8332f8b242c813f721a5f1691c4da7bace19301509539ae47f7e3df30cbe32ef63ab172c3fe471cdfaa887ea0adad341139bcd2925ba7fd1265b77055c41986336439a17bdc3da10ab171c8df3082437da38023e8b2cc227e2829a47dc4378b44ec5d46298983b69fe477809413569225709bff30528298b3b9d955db9e1b3ddabdb4b41a5fd20d4948245f8c9fa76848a432b8840b13865da13c25468f6a6380c58478f83848eb70d7df26e3e918a9dccb8fa74513ba5434326029aba3ffd889cee5684336f02ef9dc1e0be84f54fd2963b9825884f36fb8d58c57368152d490ca83cf81bbfe14356052ffa57ff053085d399a7779732a40526ddb80cc422b6bac6dd42ccc3d26c1e423476bd18f91e5d9a2a2c240a1c3f59a9154f08a811251931ce455e53d8f17130803b6c9a97e96f13a56eb5e877808460658b4d9356d3db710f5498877b6b9b7d603076a8e446bcce9771e496bf76166dc2cc237d6d44693c2e03463c2f9967694593163f97d5aa7449675bf280275a70af66015468914312a520a13ecbdd52602cd61e5f76fe33184c4b49633a9b97637f2261ea846486f8cb83b4cac73c5eac2f56f52b72795e6600ad62848dcde686b090c8ea2d8ea40ee6cb227d9f614273367984268ccc18cdf472f58f987da3cc8d39bea9239980172c948892db5caaa63e4c43e87dd4df2dd74c7e64785b7ba6c369e49eff54e7c4838f4242506bcbe316951345a63e6ae2012b06f89ee66f6b0642c9d6084ae9742c05cc5517ecaed5cce8c9f4c782758d3ea92b8128d3757daec5f869b8bcb8a4ba9947994c062e9dfbd5495745e72d93b6947cbee0bebc9f26d65641836879b481d939f78ee01b07d6de19ca373b5d9a513757e120af18a55c5151492efa80c2a0894bccc07bd0e25aba40d5957b2d113ccada2010f238ca658917b7c2ac42cd300a0f2474e6b3b3f1732a85215f9d893756af76f1a9bff8f30b996edfc13e33c998459ded8c155e8ff2c5310c84986401ecf44b08dbfed8d0ef5b370438a7630f9a7016632dffe9c55733342daeddab9f6d45c0f8b5706cfaa742ea20892c26bc5ad00d1b85d86e1501fa6f3bcc0ce139d5cbe7859391ce7ed0d410cd422cc066359b08e73ca8502a8b3718a99f85829ab4540350a444744935fef73dd32ab28559680dc47fd9a47806c4fe993e8f514c31317a3d512c0b55079a6b0d00ad0bd683574f2afe00f016e3ee505fe102a4e1a5e45637e7893056df862bf0516d2be0af8a2fd392df98e0c8ece8329e0e25305671c24d44db356da84e96a871ed3d66d452568bac6f98fbdb31fcfe7e7bda3e15a1ce9a8b54758014f098c98b9bcb8d7e93df105912058b0a4b31438a35879a248bc6c548fcc4c491472ec24f973d84a22ac0295b3b2baeef4fd2353751f3af58feaab1fa917f0b2642b899b4a7a92f53370cfd56619fc2f0d2b4637ff02cd41fde5eda010c89feddeb28fde0daf3ad5b526a49c807c74802f761dce50f21325cc434868b093689e8355bb22ab6b21722472f60fa4b83c08c1d7bcb1c0102fe04bee0683f259c0e5ca4c452800313e18e7381e5093543a0684c40aa78e3ae36dc7bf6359a6a0733dfbaf79b49552ea9adfafb42e6bd56191fd34ead65deabd40b30b303490f8e5ed932a4a4eb42c8bf77efbec87be2d60bb6ff947dd604a4d1e2933214474b966e511db5647833fcb3780d2faeb5922a539adf28d42626ec02e460b38e28fe6e57dd537a2cc34cd610e5f14b42952a577f0466dda9f061d3085fc33bb26226a0b5c6a7117e780582febe7d739165ae82f236ab6318363ede00dec929b6bd4f55ab5c5fb276a1b2b9c519bdcceaef5f9c7cc30ef7ac9544dcdfa1a75b4547a0d7b7a33afb9a83491fbca27328618574ce8dbd1d63098fd555205ce33fe4d067462a02773e04f743be5cce11d96640ad3b9d09cbe0905f623ce9ad76f91577d7b41375791a82d6394ae4d2e56233deea94936af8649621ccf0e3fdb14aa0875a068b17161021d81864053c18f532dced889523d7cbe3343d8efaf0f12d10f58737dea5220d942ae1da282831be311538617a5da27d96671c14a198ce441738e6e90adac5d07a4152079b8d1433466ec1df3743c585183ae97c2c82a73e901ecb97ffcd9b0f4e972dc7a85ab54ee722fa217ce6c3a590fa5244979f8d17fee5db2f97e3ce75efb301cb5d93bdd982c9c2da5ff78da23cac294cde51e08214e7b4232ec3f1d14744d3c97f0a61d0b780734fc606757033ec77f978bb4d2523f2057ff5cf76b617b03805a95769e196466f2a36fdb7dabef52417dd3b2cecda72c9ab198931c9c16b5210983c17bfc11c3f1fb70bd7560092f86ba7a8066bee3c14747dc8c6aa8e4cd4e3122b2c1145eb0a1a93a993e22d23da1669c31d80345879fce439e7294ce6471e1d6e72d736453928a02be5cc8578d918b7a31f67589b1d6c4134543dc6eb96c5c29c93102ad48eff09dd29733659ec2612cc40177c56fc1fb869e76a715b03a8f41c4170ba72f5d64dff6219e5523cfeaa3b8dc99633b869739a9c281dc3f606bca4cf3bcd91102fc9770ca29c169f04afbd474c02813819b8b271ba6689823a32cf9d22173e3e342894a09bc2a918db2842451432dd2128156d18f4e8386e75b8f52ede8ad175f8b6a1338eed558f38e373801f9ee59b1b8695af2d7c70aeea319a0817db3a0e456f2881de5e054732b13f975d0762f3f6c3f10772da4ab1b40e1ad068f1620ba2319b2bd03964a2f43ff66a11e1ad31351d0ae798d970e137e47a9c83c1e2941705b01a7889af2231cb9367874e0efa4c9e1a4668a3bec2bdea9c0652464330b0d63999ea5e93dc7ac273e7339785da19171fee4b4b4ebef2632bc173f46ade91438f35ca9eaeeafe99e549516641aad37c6f0cf744c72d6427dcf9bedfcf9432c71517328f3ad8989e8be9e673b47a1a0a8f4786e4ee1d3b91c3f18dbac4606f5c7d388af54f05aebdda0e2d40e2d53e02c4a4ee33ef70c036dd912c362dfe9e0fd913a8ee3a7d0615450d2dc466010ddb85162341ef20edcca14d03e860c0fa121438ecd9a6bd8c3c111d1dfe905e3d0861f9c82232cfc63c130f4fde7ab2bafd38613a5f52432a6f5c3ff35af6e20071a751438172694c4ba8d7015751d76832d4e4a58dfe87bf73116677f68a8eada03679dbe4dcbfba6de35229a38d2eb158757046fa9b2a6a66f107f48f5ab7ae799de328373276eea5ef852d1fa2a06dc3aa021c6e266427b581acf6cc6d66c3cb2ab981b1e6cd076c0bbd80979f6a4bfe613c926f1ee0e50846435259fc3bd6671c52de1e26ff9b35329c14bb02b383f833027de0d1152f08d2db6ee3b6e418d944e8a9e5f8f8facbfe4bc9a035b8233e64dd8a416fee1bfcc3a72760ef977138ab01316ce5413aabe480dabfd495ca84e828b239e1f3d0ab13ed5084207a78", 0x1000, 0x4}], 0x800000, &(0x7f0000001280)={[{@gid={'gid'}}, {@type={'type', 0x3d, "09822742"}}, {@type={'type', 0x3d, "152c4973"}}, {@umask={'umask', 0x3d, 0x2}}], [{@smackfsdef={'smackfsdef', 0x3d, '/dev/bus/usb/00#/00#\x00'}}, {@obj_user={'obj_user', 0x3d, '(security{*keyring'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]'}}, {@context={'context', 0x3d, 'user_u'}}]}) 13:22:40 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x4305], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:40 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000800060dfe3e60300000820"], 0x1}}, 0x0) 13:22:42 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101040, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000200)=r1) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r2, 0x0, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r2, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r3, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x0, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:42 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x4788], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:42 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x10405, 0x0) ioctl$SIOCX25SSUBSCRIP(r2, 0x89e1, &(0x7f0000000280)={'erspan0\x00', 0x401, 0xfd4}) r3 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r3, 0x29, 0xd2, &(0x7f0000000200)={{0xa, 0x4e23, 0x49f7, @ipv4={[], [], @loopback}, 0x2}, {0xa, 0x4e21, 0x0, @empty, 0x81}, 0x0, [0x8, 0x9, 0x401, 0x8000, 0xd9f, 0x871c, 0xa7, 0x3f]}, 0x5c) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x0) 13:22:42 executing program 1: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', 0x0, 0x1ff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000280)="5c09067227b40b6cfd400d97fe09b1341cb6e7ee2fb91478703e54d3d93b2256a3d4f6b70870e3eebde203b98ab5547300a14e1749748cc63b8c29eaff8359888b19e089215aef5b489e98f3b6391f44d5b1653633421f012ce2f8c490354702c1b1762439a4b6de3290cb2636f1cdde69d4e8f4a35a40a44b0b36e015ccc4d40e3cf6c95eeea347b4403aa7d891e6b346fd9af2befa5f4a93d980e43084a4baec7e3f3f447d925b4629a6d7a3793933d13f4df551690e75134f8d9ca49e713683cd1b8e1cff25e5445f8bf39ebe4f833890917d9b0a745ae5137382c95eb3f23535002cac4142bf8ca8fce04ef7f4d8ad524cce53c218ccfeef35373a2c5040308da6a73feb5c7fbcc6ec61d01be905cc092d1327af2fc342b84a18e0d973b338d147d85ba467882e407f9cd9d9948462da5a4d1bf991445b26d96d0490d51650d2d81f108c60cf7fd2ff9f7d68216c080156bdf57c8aec0d023ee7a3cf036e5d30b944a9a5431b1781a14270d66769175cd638fca953788663e6af69b8455445672597eac1754b39c5bf554f4ed9ccba081ce2b24ebc428634b4670ec6b81d1a48067f1264cb113eae0422925f2492ec41385363483a9e2e94e1a368525b854c655bb2046e08e96aca1eb4296c87085c370dfb4347712a4459016ef2b3d435386c49951e5742c17776609de87edb3313ce105a00de1df369d35cbe74fb70626c4f05f1932e71b3c5f54052f97f01bb61d1886adeb5d44b74a3083d12c801d6ba310e8987cf9cd09ae27b996b67981463ca9f5ce027e9fb15ad8a2d46878149375f2da32640fe7e80be79395c5306337f87a24fcec7a5e98762be5da018e47d760e747e7201e8872c1b993cf055041f25451fe9fdbe1eb35a6b547a7d922c0a3d0e14dea9e097115a891c7064be2c45f6937e6f0c7687b1d762afbed9a8d665e69a913e3ca1a905e01f286aa02e0a8dce7f7f3ac23166f7f337729457da62e643626672f81a266d2efabb17953631c4593559ff0d441353f4a1ab3481ed41964453006ceae68f256a7e01daffd9661b32d35e088f7ea1d69bf75b91218c39c8b2530e55d7923a641c10ab0037ae2f41a2b944565aa2a484035291e4f06ab584887c5fa569049b19ab0096a7fc624b3a664baeaa94fc2981e40d6444f71e5acd4963f64c9e22e776a3128ed9243b602e9c832d81663f0cfc6db5f6b365ad9337c0252fe23a2a4662b074c48f79891db087a4219b2da1c42a4077337a1564083cf06c1d7a8d64464cf3d9082e5312178ee5975c2fd73a24f23834f721013ad47c18cfb28ffb6c450683d7012d27fa15de673d5887bac78db7071f06cc3aa49c68bd88c329df054c7d799479e26bbf437a42199b621c4c92add014a925d0da8b762c7fcd44c082904c19b4f6fa825abafc9e6135b2baa728155a1fe610a0b8f681643952706d5a8fe0859f19eef1461e2509eba7729d113168f9fdb3135392337ba7fd6c49c5628b0e4e2207bb51787212bc9678a2ecda2edf72ac6e885ad09783a6b0e1cd01d7bda1f844ab4cc2d3526e9b5abef62bbb16504a00d002d4959dcc7ea174c1afd7f2d2f2ae07ef326768f508498f0e980f76ba05b8b1d7577a60d8e1952da96bc9715e0cbb109fe2ae786b0790c9fea2775f5cfa7e074eb5d55c4eed123b826fd6b8a4b1b16d5475086e5404bb1e8056a156cd694235a1450b788beddbbbca88a34fbad2a15bf7213ec3c2addd71c0e7fdb9a7e9cd0ef77497c9818956f84542b35ded37ed840ee4fc1f810aabeed9ba473367aec973d0a359c0a197309f715464ac08348289873eab45c500e47314a2d3528217f73471c8542c6187705e9f8cc47e5f63b515484a84578cb101fd798ed8b680b0fa5689a9930fb765bd0362897b00995e74866e62c1ecca5605b8704ba2ad589853d6ccd8fb9b05c2aaaf9589651f3261f50008b103d73f86c2f8cf63545cf5258492f85ae8ecf07168eef812332821bb9c60ae39a2b4c7248f40c1a5954b556c710007be3c7bc2cffddd682089ee026e88572c891604f8d21b93a1c27cd3265aa865d301093f2f79339d59ab9c0307412ed1ae2b63bbff2f0f76e96c4dce8f31061b715b297bb42ecb58ff242e49ad80f1fb62098b25af19e586d07f67a695212f0f8648b9793750bd3ae946ff4eb73fb0f69acab83827deefb75a39e11bb4283b4ec32bdb13034dc40d5219ef51cb1691da9f310ccf6f7b23d37aeb1e714f730ddae523d5fb830c7e45bdfc1e25cf34a7f4d9e3638fad189a70be09b1915ab84584272658425003a97526cbdb8332f8b242c813f721a5f1691c4da7bace19301509539ae47f7e3df30cbe32ef63ab172c3fe471cdfaa887ea0adad341139bcd2925ba7fd1265b77055c41986336439a17bdc3da10ab171c8df3082437da38023e8b2cc227e2829a47dc4378b44ec5d46298983b69fe477809413569225709bff30528298b3b9d955db9e1b3ddabdb4b41a5fd20d4948245f8c9fa76848a432b8840b13865da13c25468f6a6380c58478f83848eb70d7df26e3e918a9dccb8fa74513ba5434326029aba3ffd889cee5684336f02ef9dc1e0be84f54fd2963b9825884f36fb8d58c57368152d490ca83cf81bbfe14356052ffa57ff053085d399a7779732a40526ddb80cc422b6bac6dd42ccc3d26c1e423476bd18f91e5d9a2a2c240a1c3f59a9154f08a811251931ce455e53d8f17130803b6c9a97e96f13a56eb5e877808460658b4d9356d3db710f5498877b6b9b7d603076a8e446bcce9771e496bf76166dc2cc237d6d44693c2e03463c2f9967694593163f97d5aa7449675bf280275a70af66015468914312a520a13ecbdd52602cd61e5f76fe33184c4b49633a9b97637f2261ea846486f8cb83b4cac73c5eac2f56f52b72795e6600ad62848dcde686b090c8ea2d8ea40ee6cb227d9f614273367984268ccc18cdf472f58f987da3cc8d39bea9239980172c948892db5caaa63e4c43e87dd4df2dd74c7e64785b7ba6c369e49eff54e7c4838f4242506bcbe316951345a63e6ae2012b06f89ee66f6b0642c9d6084ae9742c05cc5517ecaed5cce8c9f4c782758d3ea92b8128d3757daec5f869b8bcb8a4ba9947994c062e9dfbd5495745e72d93b6947cbee0bebc9f26d65641836879b481d939f78ee01b07d6de19ca373b5d9a513757e120af18a55c5151492efa80c2a0894bccc07bd0e25aba40d5957b2d113ccada2010f238ca658917b7c2ac42cd300a0f2474e6b3b3f1732a85215f9d893756af76f1a9bff8f30b996edfc13e33c998459ded8c155e8ff2c5310c84986401ecf44b08dbfed8d0ef5b370438a7630f9a7016632dffe9c55733342daeddab9f6d45c0f8b5706cfaa742ea20892c26bc5ad00d1b85d86e1501fa6f3bcc0ce139d5cbe7859391ce7ed0d410cd422cc066359b08e73ca8502a8b3718a99f85829ab4540350a444744935fef73dd32ab28559680dc47fd9a47806c4fe993e8f514c31317a3d512c0b55079a6b0d00ad0bd683574f2afe00f016e3ee505fe102a4e1a5e45637e7893056df862bf0516d2be0af8a2fd392df98e0c8ece8329e0e25305671c24d44db356da84e96a871ed3d66d452568bac6f98fbdb31fcfe7e7bda3e15a1ce9a8b54758014f098c98b9bcb8d7e93df105912058b0a4b31438a35879a248bc6c548fcc4c491472ec24f973d84a22ac0295b3b2baeef4fd2353751f3af58feaab1fa917f0b2642b899b4a7a92f53370cfd56619fc2f0d2b4637ff02cd41fde5eda010c89feddeb28fde0daf3ad5b526a49c807c74802f761dce50f21325cc434868b093689e8355bb22ab6b21722472f60fa4b83c08c1d7bcb1c0102fe04bee0683f259c0e5ca4c452800313e18e7381e5093543a0684c40aa78e3ae36dc7bf6359a6a0733dfbaf79b49552ea9adfafb42e6bd56191fd34ead65deabd40b30b303490f8e5ed932a4a4eb42c8bf77efbec87be2d60bb6ff947dd604a4d1e2933214474b966e511db5647833fcb3780d2faeb5922a539adf28d42626ec02e460b38e28fe6e57dd537a2cc34cd610e5f14b42952a577f0466dda9f061d3085fc33bb26226a0b5c6a7117e780582febe7d739165ae82f236ab6318363ede00dec929b6bd4f55ab5c5fb276a1b2b9c519bdcceaef5f9c7cc30ef7ac9544dcdfa1a75b4547a0d7b7a33afb9a83491fbca27328618574ce8dbd1d63098fd555205ce33fe4d067462a02773e04f743be5cce11d96640ad3b9d09cbe0905f623ce9ad76f91577d7b41375791a82d6394ae4d2e56233deea94936af8649621ccf0e3fdb14aa0875a068b17161021d81864053c18f532dced889523d7cbe3343d8efaf0f12d10f58737dea5220d942ae1da282831be311538617a5da27d96671c14a198ce441738e6e90adac5d07a4152079b8d1433466ec1df3743c585183ae97c2c82a73e901ecb97ffcd9b0f4e972dc7a85ab54ee722fa217ce6c3a590fa5244979f8d17fee5db2f97e3ce75efb301cb5d93bdd982c9c2da5ff78da23cac294cde51e08214e7b4232ec3f1d14744d3c97f0a61d0b780734fc606757033ec77f978bb4d2523f2057ff5cf76b617b03805a95769e196466f2a36fdb7dabef52417dd3b2cecda72c9ab198931c9c16b5210983c17bfc11c3f1fb70bd7560092f86ba7a8066bee3c14747dc8c6aa8e4cd4e3122b2c1145eb0a1a93a993e22d23da1669c31d80345879fce439e7294ce6471e1d6e72d736453928a02be5cc8578d918b7a31f67589b1d6c4134543dc6eb96c5c29c93102ad48eff09dd29733659ec2612cc40177c56fc1fb869e76a715b03a8f41c4170ba72f5d64dff6219e5523cfeaa3b8dc99633b869739a9c281dc3f606bca4cf3bcd91102fc9770ca29c169f04afbd474c02813819b8b271ba6689823a32cf9d22173e3e342894a09bc2a918db2842451432dd2128156d18f4e8386e75b8f52ede8ad175f8b6a1338eed558f38e373801f9ee59b1b8695af2d7c70aeea319a0817db3a0e456f2881de5e054732b13f975d0762f3f6c3f10772da4ab1b40e1ad068f1620ba2319b2bd03964a2f43ff66a11e1ad31351d0ae798d970e137e47a9c83c1e2941705b01a7889af2231cb9367874e0efa4c9e1a4668a3bec2bdea9c0652464330b0d63999ea5e93dc7ac273e7339785da19171fee4b4b4ebef2632bc173f46ade91438f35ca9eaeeafe99e549516641aad37c6f0cf744c72d6427dcf9bedfcf9432c71517328f3ad8989e8be9e673b47a1a0a8f4786e4ee1d3b91c3f18dbac4606f5c7d388af54f05aebdda0e2d40e2d53e02c4a4ee33ef70c036dd912c362dfe9e0fd913a8ee3a7d0615450d2dc466010ddb85162341ef20edcca14d03e860c0fa121438ecd9a6bd8c3c111d1dfe905e3d0861f9c82232cfc63c130f4fde7ab2bafd38613a5f52432a6f5c3ff35af6e20071a751438172694c4ba8d7015751d76832d4e4a58dfe87bf73116677f68a8eada03679dbe4dcbfba6de35229a38d2eb158757046fa9b2a6a66f107f48f5ab7ae799de328373276eea5ef852d1fa2a06dc3aa021c6e266427b581acf6cc6d66c3cb2ab981b1e6cd076c0bbd80979f6a4bfe613c926f1ee0e50846435259fc3bd6671c52de1e26ff9b35329c14bb02b383f833027de0d1152f08d2db6ee3b6e418d944e8a9e5f8f8facbfe4bc9a035b8233e64dd8a416fee1bfcc3a72760ef977138ab01316ce5413aabe480dabfd495ca84e828b239e1f3d0ab13ed5084207a78", 0x1000, 0x4}], 0x800000, &(0x7f0000001280)={[{@gid={'gid'}}, {@type={'type', 0x3d, "09822742"}}, {@type={'type', 0x3d, "152c4973"}}, {@umask={'umask', 0x3d, 0x2}}], [{@smackfsdef={'smackfsdef', 0x3d, '/dev/bus/usb/00#/00#\x00'}}, {@obj_user={'obj_user', 0x3d, '(security{*keyring'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]'}}, {@context={'context', 0x3d, 'user_u'}}]}) 13:22:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp6\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x10400003) 13:22:43 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x4888], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(0xffffffffffffffff, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:43 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x400, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f0000000180)={0x0, 0x5, 0x7ff, 0x240, 0x4, 0xfffffffffffffffc, 0x4}) socket$unix(0x1, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f00000001c0)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") syz_extract_tcp_res(&(0x7f0000000000), 0x4d4, 0xb1) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYRESOCT=r2], 0x1}, 0x1, 0x0, 0x0, 0x811}, 0x0) 13:22:43 executing program 1: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', 0x0, 0x1ff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000280)="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", 0x1000, 0x4}], 0x800000, &(0x7f0000001280)={[{@gid={'gid'}}, {@type={'type', 0x3d, "09822742"}}, {@type={'type', 0x3d, "152c4973"}}, {@umask={'umask', 0x3d, 0x2}}], [{@smackfsdef={'smackfsdef', 0x3d, '/dev/bus/usb/00#/00#\x00'}}, {@obj_user={'obj_user', 0x3d, '(security{*keyring'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]'}}, {@context={'context', 0x3d, 'user_u'}}]}) 13:22:43 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000540)='/dev/usbmon#\x00', 0x7f, 0x2000) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000000600)=0x80000001) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000580)) r2 = fcntl$dupfd(r0, 0x40a, r1) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f0000000100)={'ipvs\x00'}, 0x0) splice(r1, &(0x7f0000000000), r0, &(0x7f0000000140), 0x8, 0xc) r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) pwritev(r0, &(0x7f0000001ac0)=[{&(0x7f0000000ac0)}], 0x1, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) r5 = dup(r4) ioctl$FICLONE(r5, 0x40049409, r4) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x7, 0x0, 0x0) prctl$PR_MCE_KILL_GET(0x22) setsockopt$inet6_tcp_int(r4, 0x6, 0x12, &(0x7f00000003c0)=0x7f, 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000000300)) ioctl$PPPIOCSACTIVE(r1, 0x40107446, &(0x7f0000000400)={0x3, &(0x7f0000000280)=[{0x3, 0x0, 0x1a1a, 0x4}, {0x100000001, 0x0, 0x1cb, 0x4}, {0x80000001, 0x3, 0x1, 0x7}]}) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x2000000c, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback, 0x8}, 0x1c) openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x4000, 0x0) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000180)='syz_tun\x00', 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r6, 0x2007ffc) sendfile(r5, r6, 0x0, 0x8000fffffffe) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f00000001c0)={'ip_vti0\x00', 0x200}) 13:22:43 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x5000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 571.907212][T23309] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 13:22:46 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101040, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000200)=r1) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r2, 0x0, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r2, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r3, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:46 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r2, 0x800455d1, &(0x7f0000000040)) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', 0x18000, 0x0) fchownat(r3, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) setxattr$security_smack_transmute(&(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000500)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000540)='TRUE', 0x4, 0x1) lsetxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000280)={'U-', 0x1f}, 0x28, 0x3) sendto$isdn(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="000000000004000061f3aecb31a0e2a9d3cbf10ada22700dbc97454308ae438164c094d3dec054a67b380bc39589d58b5b168ecfff431c45dac6e9491bd96938be2f58b013c6da"], 0x47, 0x10, &(0x7f0000000100)={0x22, 0xbf82, 0xffffffff, 0x8, 0x5}, 0x6) prctl$PR_SET_KEEPCAPS(0x8, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="080002e6f59400000000000000cce5153bf5c100"], 0x1}}, 0x0) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) 13:22:46 executing program 1: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', 0x0, 0x1ff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000280)="5c09067227b40b6cfd400d97fe09b1341cb6e7ee2fb91478703e54d3d93b2256a3d4f6b70870e3eebde203b98ab5547300a14e1749748cc63b8c29eaff8359888b19e089215aef5b489e98f3b6391f44d5b1653633421f012ce2f8c490354702c1b1762439a4b6de3290cb2636f1cdde69d4e8f4a35a40a44b0b36e015ccc4d40e3cf6c95eeea347b4403aa7d891e6b346fd9af2befa5f4a93d980e43084a4baec7e3f3f447d925b4629a6d7a3793933d13f4df551690e75134f8d9ca49e713683cd1b8e1cff25e5445f8bf39ebe4f833890917d9b0a745ae5137382c95eb3f23535002cac4142bf8ca8fce04ef7f4d8ad524cce53c218ccfeef35373a2c5040308da6a73feb5c7fbcc6ec61d01be905cc092d1327af2fc342b84a18e0d973b338d147d85ba467882e407f9cd9d9948462da5a4d1bf991445b26d96d0490d51650d2d81f108c60cf7fd2ff9f7d68216c080156bdf57c8aec0d023ee7a3cf036e5d30b944a9a5431b1781a14270d66769175cd638fca953788663e6af69b8455445672597eac1754b39c5bf554f4ed9ccba081ce2b24ebc428634b4670ec6b81d1a48067f1264cb113eae0422925f2492ec41385363483a9e2e94e1a368525b854c655bb2046e08e96aca1eb4296c87085c370dfb4347712a4459016ef2b3d435386c49951e5742c17776609de87edb3313ce105a00de1df369d35cbe74fb70626c4f05f1932e71b3c5f54052f97f01bb61d1886adeb5d44b74a3083d12c801d6ba310e8987cf9cd09ae27b996b67981463ca9f5ce027e9fb15ad8a2d46878149375f2da32640fe7e80be79395c5306337f87a24fcec7a5e98762be5da018e47d760e747e7201e8872c1b993cf055041f25451fe9fdbe1eb35a6b547a7d922c0a3d0e14dea9e097115a891c7064be2c45f6937e6f0c7687b1d762afbed9a8d665e69a913e3ca1a905e01f286aa02e0a8dce7f7f3ac23166f7f337729457da62e643626672f81a266d2efabb17953631c4593559ff0d441353f4a1ab3481ed41964453006ceae68f256a7e01daffd9661b32d35e088f7ea1d69bf75b91218c39c8b2530e55d7923a641c10ab0037ae2f41a2b944565aa2a484035291e4f06ab584887c5fa569049b19ab0096a7fc624b3a664baeaa94fc2981e40d6444f71e5acd4963f64c9e22e776a3128ed9243b602e9c832d81663f0cfc6db5f6b365ad9337c0252fe23a2a4662b074c48f79891db087a4219b2da1c42a4077337a1564083cf06c1d7a8d64464cf3d9082e5312178ee5975c2fd73a24f23834f721013ad47c18cfb28ffb6c450683d7012d27fa15de673d5887bac78db7071f06cc3aa49c68bd88c329df054c7d799479e26bbf437a42199b621c4c92add014a925d0da8b762c7fcd44c082904c19b4f6fa825abafc9e6135b2baa728155a1fe610a0b8f681643952706d5a8fe0859f19eef1461e2509eba7729d113168f9fdb3135392337ba7fd6c49c5628b0e4e2207bb51787212bc9678a2ecda2edf72ac6e885ad09783a6b0e1cd01d7bda1f844ab4cc2d3526e9b5abef62bbb16504a00d002d4959dcc7ea174c1afd7f2d2f2ae07ef326768f508498f0e980f76ba05b8b1d7577a60d8e1952da96bc9715e0cbb109fe2ae786b0790c9fea2775f5cfa7e074eb5d55c4eed123b826fd6b8a4b1b16d5475086e5404bb1e8056a156cd694235a1450b788beddbbbca88a34fbad2a15bf7213ec3c2addd71c0e7fdb9a7e9cd0ef77497c9818956f84542b35ded37ed840ee4fc1f810aabeed9ba473367aec973d0a359c0a197309f715464ac08348289873eab45c500e47314a2d3528217f73471c8542c6187705e9f8cc47e5f63b515484a84578cb101fd798ed8b680b0fa5689a9930fb765bd0362897b00995e74866e62c1ecca5605b8704ba2ad589853d6ccd8fb9b05c2aaaf9589651f3261f50008b103d73f86c2f8cf63545cf5258492f85ae8ecf07168eef812332821bb9c60ae39a2b4c7248f40c1a5954b556c710007be3c7bc2cffddd682089ee026e88572c891604f8d21b93a1c27cd3265aa865d301093f2f79339d59ab9c0307412ed1ae2b63bbff2f0f76e96c4dce8f31061b715b297bb42ecb58ff242e49ad80f1fb62098b25af19e586d07f67a695212f0f8648b9793750bd3ae946ff4eb73fb0f69acab83827deefb75a39e11bb4283b4ec32bdb13034dc40d5219ef51cb1691da9f310ccf6f7b23d37aeb1e714f730ddae523d5fb830c7e45bdfc1e25cf34a7f4d9e3638fad189a70be09b1915ab84584272658425003a97526cbdb8332f8b242c813f721a5f1691c4da7bace19301509539ae47f7e3df30cbe32ef63ab172c3fe471cdfaa887ea0adad341139bcd2925ba7fd1265b77055c41986336439a17bdc3da10ab171c8df3082437da38023e8b2cc227e2829a47dc4378b44ec5d46298983b69fe477809413569225709bff30528298b3b9d955db9e1b3ddabdb4b41a5fd20d4948245f8c9fa76848a432b8840b13865da13c25468f6a6380c58478f83848eb70d7df26e3e918a9dccb8fa74513ba5434326029aba3ffd889cee5684336f02ef9dc1e0be84f54fd2963b9825884f36fb8d58c57368152d490ca83cf81bbfe14356052ffa57ff053085d399a7779732a40526ddb80cc422b6bac6dd42ccc3d26c1e423476bd18f91e5d9a2a2c240a1c3f59a9154f08a811251931ce455e53d8f17130803b6c9a97e96f13a56eb5e877808460658b4d9356d3db710f5498877b6b9b7d603076a8e446bcce9771e496bf76166dc2cc237d6d44693c2e03463c2f9967694593163f97d5aa7449675bf280275a70af66015468914312a520a13ecbdd52602cd61e5f76fe33184c4b49633a9b97637f2261ea846486f8cb83b4cac73c5eac2f56f52b72795e6600ad62848dcde686b090c8ea2d8ea40ee6cb227d9f614273367984268ccc18cdf472f58f987da3cc8d39bea9239980172c948892db5caaa63e4c43e87dd4df2dd74c7e64785b7ba6c369e49eff54e7c4838f4242506bcbe316951345a63e6ae2012b06f89ee66f6b0642c9d6084ae9742c05cc5517ecaed5cce8c9f4c782758d3ea92b8128d3757daec5f869b8bcb8a4ba9947994c062e9dfbd5495745e72d93b6947cbee0bebc9f26d65641836879b481d939f78ee01b07d6de19ca373b5d9a513757e120af18a55c5151492efa80c2a0894bccc07bd0e25aba40d5957b2d113ccada2010f238ca658917b7c2ac42cd300a0f2474e6b3b3f1732a85215f9d893756af76f1a9bff8f30b996edfc13e33c998459ded8c155e8ff2c5310c84986401ecf44b08dbfed8d0ef5b370438a7630f9a7016632dffe9c55733342daeddab9f6d45c0f8b5706cfaa742ea20892c26bc5ad00d1b85d86e1501fa6f3bcc0ce139d5cbe7859391ce7ed0d410cd422cc066359b08e73ca8502a8b3718a99f85829ab4540350a444744935fef73dd32ab28559680dc47fd9a47806c4fe993e8f514c31317a3d512c0b55079a6b0d00ad0bd683574f2afe00f016e3ee505fe102a4e1a5e45637e7893056df862bf0516d2be0af8a2fd392df98e0c8ece8329e0e25305671c24d44db356da84e96a871ed3d66d452568bac6f98fbdb31fcfe7e7bda3e15a1ce9a8b54758014f098c98b9bcb8d7e93df105912058b0a4b31438a35879a248bc6c548fcc4c491472ec24f973d84a22ac0295b3b2baeef4fd2353751f3af58feaab1fa917f0b2642b899b4a7a92f53370cfd56619fc2f0d2b4637ff02cd41fde5eda010c89feddeb28fde0daf3ad5b526a49c807c74802f761dce50f21325cc434868b093689e8355bb22ab6b21722472f60fa4b83c08c1d7bcb1c0102fe04bee0683f259c0e5ca4c452800313e18e7381e5093543a0684c40aa78e3ae36dc7bf6359a6a0733dfbaf79b49552ea9adfafb42e6bd56191fd34ead65deabd40b30b303490f8e5ed932a4a4eb42c8bf77efbec87be2d60bb6ff947dd604a4d1e2933214474b966e511db5647833fcb3780d2faeb5922a539adf28d42626ec02e460b38e28fe6e57dd537a2cc34cd610e5f14b42952a577f0466dda9f061d3085fc33bb26226a0b5c6a7117e780582febe7d739165ae82f236ab6318363ede00dec929b6bd4f55ab5c5fb276a1b2b9c519bdcceaef5f9c7cc30ef7ac9544dcdfa1a75b4547a0d7b7a33afb9a83491fbca27328618574ce8dbd1d63098fd555205ce33fe4d067462a02773e04f743be5cce11d96640ad3b9d09cbe0905f623ce9ad76f91577d7b41375791a82d6394ae4d2e56233deea94936af8649621ccf0e3fdb14aa0875a068b17161021d81864053c18f532dced889523d7cbe3343d8efaf0f12d10f58737dea5220d942ae1da282831be311538617a5da27d96671c14a198ce441738e6e90adac5d07a4152079b8d1433466ec1df3743c585183ae97c2c82a73e901ecb97ffcd9b0f4e972dc7a85ab54ee722fa217ce6c3a590fa5244979f8d17fee5db2f97e3ce75efb301cb5d93bdd982c9c2da5ff78da23cac294cde51e08214e7b4232ec3f1d14744d3c97f0a61d0b780734fc606757033ec77f978bb4d2523f2057ff5cf76b617b03805a95769e196466f2a36fdb7dabef52417dd3b2cecda72c9ab198931c9c16b5210983c17bfc11c3f1fb70bd7560092f86ba7a8066bee3c14747dc8c6aa8e4cd4e3122b2c1145eb0a1a93a993e22d23da1669c31d80345879fce439e7294ce6471e1d6e72d736453928a02be5cc8578d918b7a31f67589b1d6c4134543dc6eb96c5c29c93102ad48eff09dd29733659ec2612cc40177c56fc1fb869e76a715b03a8f41c4170ba72f5d64dff6219e5523cfeaa3b8dc99633b869739a9c281dc3f606bca4cf3bcd91102fc9770ca29c169f04afbd474c02813819b8b271ba6689823a32cf9d22173e3e342894a09bc2a918db2842451432dd2128156d18f4e8386e75b8f52ede8ad175f8b6a1338eed558f38e373801f9ee59b1b8695af2d7c70aeea319a0817db3a0e456f2881de5e054732b13f975d0762f3f6c3f10772da4ab1b40e1ad068f1620ba2319b2bd03964a2f43ff66a11e1ad31351d0ae798d970e137e47a9c83c1e2941705b01a7889af2231cb9367874e0efa4c9e1a4668a3bec2bdea9c0652464330b0d63999ea5e93dc7ac273e7339785da19171fee4b4b4ebef2632bc173f46ade91438f35ca9eaeeafe99e549516641aad37c6f0cf744c72d6427dcf9bedfcf9432c71517328f3ad8989e8be9e673b47a1a0a8f4786e4ee1d3b91c3f18dbac4606f5c7d388af54f05aebdda0e2d40e2d53e02c4a4ee33ef70c036dd912c362dfe9e0fd913a8ee3a7d0615450d2dc466010ddb85162341ef20edcca14d03e860c0fa121438ecd9a6bd8c3c111d1dfe905e3d0861f9c82232cfc63c130f4fde7ab2bafd38613a5f52432a6f5c3ff35af6e20071a751438172694c4ba8d7015751d76832d4e4a58dfe87bf73116677f68a8eada03679dbe4dcbfba6de35229a38d2eb158757046fa9b2a6a66f107f48f5ab7ae799de328373276eea5ef852d1fa2a06dc3aa021c6e266427b581acf6cc6d66c3cb2ab981b1e6cd076c0bbd80979f6a4bfe613c926f1ee0e50846435259fc3bd6671c52de1e26ff9b35329c14bb02b383f833027de0d1152f08d2db6ee3b6e418d944e8a9e5f8f8facbfe4bc9a035b8233e64dd8a416fee1bfcc3a72760ef977138ab01316ce5413aabe480dabfd495ca84e828b239e1f3d0ab13ed5084207a78", 0x1000, 0x4}], 0x800000, &(0x7f0000001280)={[{@gid={'gid'}}, {@type={'type', 0x3d, "09822742"}}, {@type={'type', 0x3d, "152c4973"}}, {@umask={'umask', 0x3d, 0x2}}], [{@smackfsdef={'smackfsdef', 0x3d, '/dev/bus/usb/00#/00#\x00'}}, {@obj_user={'obj_user', 0x3d, '(security{*keyring'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]'}}, {@context={'context', 0x3d, 'user_u'}}]}) 13:22:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(0xffffffffffffffff, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:46 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x5800], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_emit_ethernet(0x66, &(0x7f0000000100)={@link_local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x2f, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}, @broadcast}, @gre={{0x0, 0x0, 0x1, 0x0, 0xb, 0x0, 0x0, 0x8}, {}, {}, {0x0, 0x21}}}}}}, 0x0) 13:22:46 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x6000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:46 executing program 1: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000280)="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", 0x1000, 0x4}], 0x800000, &(0x7f0000001280)={[{@gid={'gid'}}, {@type={'type', 0x3d, "09822742"}}, {@type={'type', 0x3d, "152c4973"}}, {@umask={'umask', 0x3d, 0x2}}], [{@smackfsdef={'smackfsdef', 0x3d, '/dev/bus/usb/00#/00#\x00'}}, {@obj_user={'obj_user', 0x3d, '(security{*keyring'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]'}}, {@context={'context', 0x3d, 'user_u'}}]}) 13:22:46 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='veth0_to_team\x00', 0x10) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0xfff6) 13:22:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(0xffffffffffffffff, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:46 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="03000000000000007be070a9d8adc49b018966732467f03447f4de18edf630c9e7136a767526ca89ce5be2bf2a0bd37729f6b965c25a907c149da858296e4162a34dd514e63d5ae3353d0f0862f9ee4489ec3ede704e816b6928c85d9aeca1d0149d1a4cb0fea220") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f0000000040)={0x0, 0x3, 0x4, 0x3, 0x2}) 13:22:46 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x6488], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 574.866423][T23342] hfs: type requires a 4 character value [ 574.891545][T23342] hfs: unable to parse mount options [ 574.991465][T23349] QAT: Invalid ioctl 13:22:49 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101040, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000200)=r1) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r2, 0x0, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r2, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r3, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:49 executing program 1: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x800000, &(0x7f0000001280)={[{@gid={'gid'}}, {@type={'type', 0x3d, "09822742"}}, {@type={'type', 0x3d, "152c4973"}}, {@umask={'umask', 0x3d, 0x2}}], [{@smackfsdef={'smackfsdef', 0x3d, '/dev/bus/usb/00#/00#\x00'}}, {@obj_user={'obj_user', 0x3d, '(security{*keyring'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]'}}, {@context={'context', 0x3d, 'user_u'}}]}) 13:22:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="00002e80c0675a0b02e6f5940000"], 0x1}}, 0x0) 13:22:49 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x800e], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x101002) write$evdev(r0, &(0x7f0000000000)=[{{0x0, 0x7530}}], 0xfe72) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) [ 577.693960][T23362] hfs: type requires a 4 character value 13:22:49 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x8035], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 577.768382][T23362] hfs: unable to parse mount options 13:22:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x8000, 0x0) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000240)=0xfffffffffffffffa) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\x00l'], 0x1}}, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x800, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r3, 0xc0145401, &(0x7f0000000100)={0x1, 0x2, 0x1000, 0x3, 0x80}) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40, 0x0) ioctl$DRM_IOCTL_GET_MAP(r4, 0xc0286404, &(0x7f0000000040)={&(0x7f0000ff9000/0x4000)=nil, 0x36c, 0x5, 0x40, &(0x7f0000ff9000/0x2000)=nil, 0x9}) 13:22:49 executing program 1: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[{@gid={'gid'}}, {@type={'type', 0x3d, "09822742"}}, {@type={'type', 0x3d, "152c4973"}}, {@umask={'umask', 0x3d, 0x2}}], [{@smackfsdef={'smackfsdef', 0x3d, '/dev/bus/usb/00#/00#\x00'}}, {@obj_user={'obj_user', 0x3d, '(security{*keyring'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, ':]'}}, {@context={'context', 0x3d, 'user_u'}}]}) 13:22:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000040)={@dev}, 0x1e3) 13:22:49 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x80fe], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 578.061135][T23389] hfs: type requires a 4 character value [ 578.067079][T23389] hfs: unable to parse mount options 13:22:52 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101040, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000200)=r1) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r2, 0x0, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r2, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r3, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:52 executing program 3: syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x2a2, 0x200400) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0xf, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 13:22:52 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r2 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x0, 0xa0040) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@mcast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) sendmsg$xdp(r2, &(0x7f0000001680)={&(0x7f0000000200)={0x2c, 0x7, r3, 0x21}, 0x10, &(0x7f0000001600)=[{&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000000240)="887abdcf657f9d90772ec6f6279406e3ef528c0f6d85867a39a2157c52", 0x1d}, {&(0x7f0000001440)="0b78b856b5734e8afd0c414a1b0ab6aa86867e6a8c91d161fa44636411e020b1cfe4de6bc2b9d7201d7e6c88ae047983fae29ba5e337c2c4cd4c27707ff8924c24a56983721311528cda25ea0dfb0b9824b70fa4f846a07f9468da38cc4c941dcfef95f23b91ff1ecd5b55adbe3af1825557bac97a80ef473a7f22bd5ca10eda6ef2acd403e4f4b30bbc049ded03e6eb2f15163b08fcdaf0a09982fdeaa58017137d4c57665760da341190ef783f36f8fb9773", 0xb3}, {&(0x7f0000001500)="da8359a645cdf88eb990cc2f2c21a18bdc995a31d9b8b15689f1b0ad719699656a5bd7ff7f02c300092fb3479cc5f0b5ec499d41e8c6b84dd9e11e0de82ac80e64baf97f8776c8d4528da105d79b064d4b4eb2248449ad5267b92ae4297a743abdb3c5ecae54ba59e0fc019d1a4664f1936f21fcf1b92a84610bdc47298b06a7ce63ff542dc3afa9f3837b8aaf8b7042b65344d8ea789f2844b24fbe6b227a5edbd52af9c82a0c98c4541d110527dae069e8627a62736038bc4d5705", 0xbc}, {&(0x7f00000015c0)="a62525791040886dfc5ffff1af43df21a37e890c00bb3e18cd", 0x19}], 0x5, 0x0, 0x0, 0x40000}, 0x20044010) r4 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000040), &(0x7f00000000c0)=0x4) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="0000008006000000080002e6cc94b45a827d6dc7f78c3791954de4eff06bcb88951bf3acd9c5039f91f4516ef6f5374bef4d4da3d14e976482f54da72b6ef7d39e9ca9da9969cb0602855848bd05d2c1436fdf6527144cd1653f22bd8151b4448ac433839036d93b6a7709dad57094dd4a0dba28b827aa3d2bf6966fc5013b1f6a6000"/148], 0x1}, 0x1, 0x0, 0x0, 0x20000000}, 0x2000000000000000) 13:22:52 executing program 1: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:22:52 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x8100], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:52 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x8847], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 580.793652][T23404] hfs: can't find a HFS filesystem on dev loop1 13:22:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, 0x0, 0x0) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:52 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) fchownat(r2, 0x0, 0x0, 0x0, 0x5) bind$unix(r4, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r4, 0x0) connect(r3, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) getpid() getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000000)={0x0, @loopback, @loopback}, &(0x7f0000000040)=0xc) setsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f00000000c0)={@loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, r5}, 0xc) write$UHID_INPUT2(r2, &(0x7f00000001c0)={0xc, 0xd6, "e5e200158d10d884c41f794c220f58cc9f3b5f48ea9b160ebed222c2e7f190bdc0f76dc5df9d705e31c5193c1328aa432ee8aca2a06a5c4570137ba201905b81063554818a5c527daec691c0ff3c15bf45e8f5e2e1824c1b645f1e7f08f8b58cc7d25bc17790cd53c697d2a94898806afae59118c56acd37ab24c1ac0f627b5d681cfede23bd5a9f17c6b78f7a31268f76d8e3a4f3dd5957085c0ba36c270695d3f9b6974033f40f3ea8a443eecf914eb8963e87fb1d0e7f1ef3b3a3c033ee0e69c774bdfa9c708940e8743dc6b60d388986c33b5d88"}, 0xdc) r6 = syz_open_procfs(0x0, &(0x7f0000000140)='net/fib_trie\x00') ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000100)={'vcan0\x00'}) sendfile(r3, r6, 0x0, 0x800000bf) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) 13:22:52 executing program 1: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:22:52 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x8848], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:52 executing program 3: r0 = accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FICLONE(r0, 0x40049409, 0xffffffffffffffff) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x101) ftruncate(0xffffffffffffffff, 0x28007d) write$cgroup_type(0xffffffffffffffff, &(0x7f00000001c0)='threaded\x00', 0x9) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) dup(r1) syz_open_procfs(0x0, &(0x7f0000000280)='net/ip_tables_names\x00') r2 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000740)) socket$inet(0x10, 0x20804, 0x5) sched_setaffinity(0x0, 0x6, &(0x7f00000003c0)=0x9) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDSKBSENT(r2, 0x4b49, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x802, 0x0) connect$inet6(r3, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev, 0x4}, 0x79) sendmmsg(r3, &(0x7f0000007e00), 0x4d2, 0x4008000) [ 581.134976][T23430] hfs: can't find a HFS filesystem on dev loop1 13:22:55 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101040, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000200)=r1) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r2, 0x0, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r2, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r3, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, 0x0, 0x0) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:55 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x8864], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:55 executing program 1: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:22:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r2 = openat(r1, &(0x7f0000000000)='./file0\x00', 0x44000, 0x0) mq_timedreceive(r2, &(0x7f00000000c0)=""/102, 0x66, 0xf0, &(0x7f0000000040)={0x77359400}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x0) 13:22:55 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) 13:22:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, 0x0, 0x0) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) [ 583.851612][T23450] hfs: can't find a HFS filesystem on dev loop1 13:22:55 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="addea5055e0bcfec7be07025a00f9c280982c7e3db0ba5a3dd545f8ec236e39a9f1261e9eacd1bc713e58de22601fe26633f027eae29bc28bd2d0578fea0d73ecc896f32") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x0) 13:22:55 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x8906], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:55 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) 13:22:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240), 0x0) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$evdev(r0, &(0x7f0000000000)=[{{0x0, 0x7530}}], 0xfe72) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) 13:22:58 executing program 3: 13:22:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r2 = socket$unix(0x1, 0x7, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='oom_adj\x00') ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000040)={0x6000, 0x6000, 0x5, 0x5, 0x8}) write$binfmt_aout(r2, &(0x7f0000000200)={{0x10b, 0x5e3, 0x286, 0x1d3, 0x2ff, 0x6c, 0x241, 0x7}, "165c8273fdd2da3ef3181edeaabaf3507da38023ebdd5f04f27dc217bef0e3c69e188945c167f975517990a88b02e0f366b40ea1452aabb544ed520ed431c5305354adc59dceb434e336bd7d9e756526f57b5572f911bfc3fbb825beab72109ab70fc7380d92f14548af6869c844e10fcd7621b362af762176b4c6a15b968026c9883d7af9d8fec9f64fac41554ceca51f19860299d1a9a87a8ffc584401ddf1bc7cc76a55f9134309d7d9fdba5a60f436f7aab9841ca24e4377ac7ad96423cbe12f6485c1cf85ce8a2b513e49d1c25db1d06b16317e16ff7351", [[], [], [], [], [], [], [], [], []]}, 0x9fa) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x0) 13:22:58 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101040, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000200)=r1) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r2, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r2, 0x0, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r2, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r3, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:58 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xc0fe], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240), 0x0) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:58 executing program 1: 13:22:58 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xf000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:22:58 executing program 3: 13:22:58 executing program 1: 13:22:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240), 0x0) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:22:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() chown(&(0x7f0000000000)='./file0\x00', r2, r3) 13:22:58 executing program 1: 13:22:58 executing program 3: 13:22:58 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:23:01 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101040, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000200)=r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r3, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r3, 0x0, 0x0) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r3, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r4, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{0x0}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:01 executing program 3: 13:23:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x2000, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$PPPIOCSMRRU(r2, 0x4004743b, &(0x7f0000000240)=0x7) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="000000800200000000000000f594"], 0x1}}, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000100)={0x6, 0x5, 0xdd2e}) epoll_create1(0x80000) getsockopt$sock_buf(r1, 0x1, 0x1f, &(0x7f0000000000)=""/71, &(0x7f00000000c0)=0x47) r3 = syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0xffffffffe57d4882, 0x100) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r3, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="048478f1", @ANYRES16=r4, @ANYBLOB="00002abd7000fedbdf250e000000300004000c00010073797a31000000000c00010073797a31000000001400010062726f6164636173742d6c696e6b0000"], 0x44}, 0x1, 0x0, 0x0, 0x20000010}, 0x8000) 13:23:01 executing program 1: 13:23:01 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:23:01 executing program 1: 13:23:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{0x0}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:01 executing program 3: 13:23:01 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:23:01 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x400, 0x0) fsetxattr$trusted_overlay_nlink(r2, &(0x7f0000000240)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'L-', 0x9}, 0x28, 0x2) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x44000, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000040), &(0x7f00000000c0)=0x4) sendmsg$nl_route_sched(r3, &(0x7f0000001980)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001940)={&(0x7f0000003200)=ANY=[@ANYBLOB="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"], 0x16d0}, 0x1, 0x0, 0x0, 0x40}, 0x8040) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x0) r4 = getuid() syz_mount_image$msdos(&(0x7f00000002c0)='msdos\x00', &(0x7f0000000300)='./file0\x00', 0x8, 0x9, &(0x7f00000016c0)=[{&(0x7f0000000340)="d3eee2cdc559384a7f8a796d43fbfceb465132d468eda737a60f941b4d52dedc89e0c1b87214172f2ec332a6bfab583d799b7d01d4c23a22d5328c132769d79b4e8b9ea573e19b2d429ed5c212f6739314d619067ed8b34e65e1f1d3fe17a8518453c028c31107057fe24f9de0aefe6f19916731183dbb6cdc3631bd93474ab26d6fc2510396251a6b674773d058dbb68d7f", 0x92, 0x8b}, {&(0x7f0000000400)='u', 0x1}, {&(0x7f0000000440)="2a8ea017e7aee1ef23545e243b8bdf7c8db9568d69b83183ba66c74f6648c20b7d42a502b0d66af675deb6cdba163a1fceaa2fc4acf84852c2a7a1292de21e6a84a00ed5ef6d41f3fa5814bbc86b41d944c842639a99d62aa5a1f0c11365d193febdf026057de1b1f7bd217da6a1ef8373d8d9db6cc22776a9245fbc6fdd5d53", 0x80, 0x10000}, {&(0x7f00000004c0)="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", 0x1000, 0x80000000}, {&(0x7f00000014c0)="c052884f453769e4b60c4fdd814be136f34be0cef035702901614aac3908bf8d82bf7e7470742bd2a531551d46287ad2188861ddd9d76969d51e239d6efaf41ee71d99e5c5183e6ef90d653b4be29d", 0x4f, 0x8000}, {&(0x7f0000001540)="ad93cfb1658ba1978da22b7a1ba168244e4a99174bfbc01e03d8ae2763d9d8bdaa9b43aa4dba1468fe73bf840371c9347296d4d2a6addb771cdc6663372bf49eb3ddacf862613293152003ae7a345bdb32f59553a571e8f92110036f998f50022ebf380db84845ac85db1b17e2166cecc6e802aa4863cbfcba34cb32cf76e8fce11f47dacaae5dee81f6da93fd62377dc46155cde85f9dd23aa82f780a4a184ac7db6ec57b0f02f29e7b7d925309f5b337c67a1f26e987b2a89737396eebcd5143f5e87177", 0xc5, 0x20}, {&(0x7f00000019c0)="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", 0x1000, 0x7}, {&(0x7f0000001640)="a491f33d694cd740cb216aa86faab61727eb27e984035c2d", 0x18, 0x1}, {&(0x7f0000001680)="d8722b6e55c5bb6415f82804dd5146666ffb2e2ad5b518bf0d7dae402a7a5a5612b99e622615c23fe2fdadae5913438fe4f20572381bd39c80c219", 0x3b, 0x9}], 0x0, &(0x7f00000017c0)={[{@dots='dots'}, {@fat=@dos1xfloppy='dos1xfloppy'}], [{@defcontext={'defcontext', 0x3d, 'user_u'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'trusted.overlay.nlink\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'wlan0vmnet0'}}, {@fowner_eq={'fowner', 0x3d, r4}}]}) 13:23:01 executing program 1: [ 590.294134][T23545] FAT-fs (loop4): Unrecognized mount option "defcontext=user_u" or missing value [ 590.417961][T23553] FAT-fs (loop4): Unrecognized mount option "defcontext=user_u" or missing value 13:23:04 executing program 5: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101040, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in, @in6=@empty}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:04 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xff00], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:23:04 executing program 1: 13:23:04 executing program 3: 13:23:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{0x0}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x0) 13:23:04 executing program 1: 13:23:04 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r2 = syz_open_dev$midi(&(0x7f00000008c0)='/dev/midi#\x00', 0xfff, 0x561100) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000900)={0x0}, &(0x7f0000000940)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000980)={r3, 0x1e, "472057148aeedc1f54a3af11ad55ccb6ab5e7135b03d081cb40ae09a0542"}, &(0x7f00000009c0)=0x26) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x0) 13:23:04 executing program 3: 13:23:04 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffff], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:23:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:04 executing program 1: 13:23:07 executing program 5: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101040, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:07 executing program 3: 13:23:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6e594"], 0x1}}, 0x0) 13:23:07 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:23:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:07 executing program 1: 13:23:07 executing program 1: 13:23:07 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x0) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xbacd, 0x2) 13:23:07 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:23:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:07 executing program 3: 13:23:07 executing program 3: 13:23:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:10 executing program 1: 13:23:10 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x0, 0x100) creat(&(0x7f0000000280)='./file0\x00', 0xe7) setsockopt$inet_int(r1, 0x0, 0x3b, &(0x7f00000000c0)=0xff, 0x4) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030008084447f8f5fa"], 0x1}}, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1, 0x40) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000040)={0xf000, 0x6, 0x40, 0x1, 0x8}) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) setfsuid(r3) 13:23:10 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:23:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:10 executing program 3: ftruncate(0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000003c0)='N', 0x1, 0x0, 0x0, 0x0) 13:23:10 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x9, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000080)={0x0, 0x0, [], {0x0, @bt={0x80, 0xc919, 0x1, 0x3, 0xff, 0x0, 0x8, 0x8, 0x2, 0x4, 0xffffffff, 0x8, 0x0, 0x1, 0x0, 0x10}}}) 13:23:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:10 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 599.393656][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:23:10 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x3, 0x0) ioctl$BLKRRPART(r2, 0x125f, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="00f6ff2b527b60c1a2ffbbd4a031"], 0x1}}, 0x0) 13:23:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:11 executing program 4: socket$unix(0x1, 0x2, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup(r1) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r0) pwritev(r0, &(0x7f0000000000)=[{&(0x7f0000000200)="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", 0xfb}, {&(0x7f0000000300)="2a1e176172a38d5afff75112fe0f4fb4978526015b5abc959db030371d532ab44cbb27eaf166571a93f367b3d34a4750f132b36c2a84fba71e8c9ee06040da0c3407e626fba7a088d9edc977525991325e6be151aa471a63f217d2384dc534d72069ecdea657cff3fa42bc60955b3d52a089389f794fd6686f0308a04940fcc481d4159643cb4caa02f6b46c1a32e566331ea09884536474cba160b1aa53f2295a8be0b740f1376d38fd851b9c", 0xad}], 0x2, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000040)={0x3, r2, 0x1}) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e60695"], 0x1}}, 0x0) [ 599.682482][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:23:13 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:13 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x9, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000080)={0x7fffffff, 0x0, [], {0x0, @bt={0x0, 0x0, 0x1, 0x3, 0xff, 0x0, 0x0, 0x8, 0x0, 0x0, 0xffffffff, 0x8, 0x0, 0x0, 0x0, 0x10}}}) 13:23:13 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:23:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x99, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[], 0x1}}, 0x0) 13:23:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:13 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x9, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000080)={0x7fffffff, 0x0, [], {0x0, @bt={0x0, 0xc919, 0x1, 0x3, 0xff, 0x0, 0x0, 0x8, 0x0, 0x0, 0xffffffff, 0x8, 0x0, 0x0, 0x0, 0x10}}}) 13:23:14 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x9, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000080)={0x0, 0x0, [], {0x0, @bt={0x80, 0xc919, 0x1, 0x3, 0xff, 0x0, 0x0, 0x8, 0x0, 0x0, 0xffffffff, 0x8, 0x0, 0x0, 0x0, 0x10}}}) 13:23:14 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:23:14 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x400000, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x5}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000100)={0x0, 0x9}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000240)={r2, 0x154ba715, 0x8, 0x4, 0x4, 0x0, 0x6, 0x101, {r3, @in6={{0xa, 0x4e22, 0xffff, @remote, 0x3}}, 0x40, 0x8e55, 0x9, 0xffffffffffffffff, 0x1}}, &(0x7f0000000300)=0xb0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x0) 13:23:14 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000080)={0x7fffffff, 0x0, [], {0x0, @bt={0x80, 0xc919, 0x1, 0x3, 0xff, 0x0, 0x8, 0x8, 0x2, 0x4, 0xffffffff, 0x8, 0x0, 0x1, 0x0, 0x10}}}) 13:23:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:14 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:23:16 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8000000000a, 0x1) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045505, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x400000000000000}) 13:23:16 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="dea0c91fa907b298080006e6f59445b02207cf67"], 0x1}}, 0x0) 13:23:16 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x9, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000080)={0x0, 0x0, [], {0x0, @bt={0x80, 0xc919, 0x1, 0x3, 0xff, 0x0, 0x0, 0x8, 0x0, 0x0, 0xffffffff, 0x8, 0x0, 0x0, 0x0, 0x10}}}) 13:23:16 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:23:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:17 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x8060000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:23:17 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000080)={0x7fffffff, 0x0, [], {0x0, @bt={0x80, 0xc919, 0x1, 0x3, 0xff, 0x0, 0x0, 0x8, 0x0, 0x0, 0xffffffff, 0x8, 0x0, 0x0, 0x0, 0x10}}}) 13:23:17 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000080)={0x7fffffff, 0x0, [], {0x0, @bt={0x80, 0xc919, 0x1, 0x3, 0xff, 0x0, 0x0, 0x8, 0x0, 0x0, 0xffffffff, 0x8, 0x0, 0x0, 0x0, 0x10}}}) 13:23:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x0, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:17 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000ffff18e9f594000000000000"], 0x1}}, 0x0) 13:23:17 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:23:20 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x270, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="0000008094"], 0x1}}, 0x0) 13:23:20 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x9, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000080)={0x7fffffff, 0x0, [], {0x0, @bt={0x0, 0xc919, 0x1, 0x3, 0xff, 0x100000000, 0x8, 0x8, 0x2, 0x4, 0xffffffff, 0x8, 0x0, 0x1, 0x0, 0x10}}}) 13:23:20 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r0, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:20 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:23:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x0, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:20 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x9, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000080)={0x0, 0x0, [], {0x0, @bt={0x80, 0xc919, 0x1, 0x3, 0xff, 0x100000000, 0x8, 0x8, 0x2, 0x4, 0xffffffff, 0x8, 0x0, 0x1, 0x0, 0x10}}}) 13:23:20 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x9, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000080)={0x7fffffff, 0x0, [], {0x0, @bt={0x80, 0xc919, 0x1, 0x3, 0xff, 0x100000000, 0x8, 0x8, 0x2, 0x4, 0xffffffff, 0x8, 0x0, 0x1, 0x0, 0x10}}}) 13:23:20 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") fsync(r0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00'/14], 0x1}}, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x8001, 0x200000) ioctl$RTC_ALM_READ(r2, 0x80247008, &(0x7f0000000040)) 13:23:20 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x28000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:23:20 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x9, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000080)={0x7fffffff, 0x0, [], {0x0, @bt={0x80, 0xc919, 0x1, 0x3, 0xff, 0x100000000, 0x8, 0x8, 0x2, 0x4, 0xffffffff, 0x8, 0x0, 0x1, 0x0, 0x10}}}) 13:23:20 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x29000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:23:20 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f595"], 0x1}}, 0x0) 13:23:20 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x9, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000080)={0x7fffffff, 0x0, [], {0x0, @bt={0x80, 0xc919, 0x1, 0x3, 0xff, 0x100000000, 0x8, 0x8, 0x2, 0x4, 0xffffffff, 0x8, 0x0, 0x1, 0x0, 0x10}}}) 13:23:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x0, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:23 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x9, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x0, 0x4000) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000080)={0x7fffffff, 0x0, [], {0x0, @bt={0x80, 0xc919, 0x1, 0x3, 0xff, 0x100000000, 0x8, 0x8, 0x2, 0x4, 0xffffffff, 0x8, 0x0, 0x1, 0x0, 0x10}}}) 13:23:23 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x2b000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:23:23 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x9, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x0, 0x4000) getpeername$inet(r1, &(0x7f0000000280)={0x2, 0x0, @loopback}, &(0x7f00000002c0)=0x10) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000080)={0x7fffffff, 0x0, [], {0x0, @bt={0x80, 0xc919, 0x1, 0x3, 0xff, 0x100000000, 0x8, 0x8, 0x2, 0x4, 0xffffffff, 0x8, 0x0, 0x1, 0x0, 0x10}}}) 13:23:23 executing program 4: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x80000, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x90, 0x180) ioctl$UDMABUF_CREATE(r1, 0x40187542, &(0x7f00000000c0)={r2, 0x1, 0x10000, 0xfffffffff0008000}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") prctl$PR_SET_DUMPABLE(0x4, 0x1) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[]}}, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000100)={0x7, 0x19, 0x14, 0xd, 0x8, 0x80, 0x3, 0x32}) 13:23:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, 0x0, 0x0) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:23 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x2c000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:23:23 executing program 3 (fault-call:0 fault-nth:0): syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:23:23 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="0000008000030000080002e6f5b44472ac5ae47172b191e1b9515f8cbb9b4c3f67f0273b479bfbf4181e7a287d21d09ca47ca781d24cf6ee78f1e15144481e502d709655ccbe6f6e6b89780c3daa6f8ca979bed5b8ecb2d10c53242679447ebb2adfb281c3733264ff71dde0041bdf3ec394011ac3211c892848d898cf49fbbc78050183617c362589f1c2a8374b92bc8f3629cf233574825758"], 0x1}}, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x4) 13:23:23 executing program 1 (fault-call:0 fault-nth:0): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:23:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, 0x0, 0x0) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) [ 611.972916][T23802] FAULT_INJECTION: forcing a failure. [ 611.972916][T23802] name failslab, interval 1, probability 0, space 0, times 0 [ 611.990347][T23803] FAULT_INJECTION: forcing a failure. [ 611.990347][T23803] name failslab, interval 1, probability 0, space 0, times 0 [ 612.016318][T23802] CPU: 0 PID: 23802 Comm: syz-executor.3 Not tainted 5.2.0-rc3+ #20 [ 612.024391][T23802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 612.034480][T23802] Call Trace: [ 612.037810][T23802] dump_stack+0x172/0x1f0 [ 612.042206][T23802] should_fail.cold+0xa/0x15 [ 612.046848][T23802] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 612.052697][T23802] ? ___might_sleep+0x163/0x280 [ 612.052725][T23802] __should_failslab+0x121/0x190 [ 612.052747][T23802] should_failslab+0x9/0x14 [ 612.052761][T23802] __kmalloc+0x2d9/0x740 [ 612.052782][T23802] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 612.052798][T23802] ? fput_many+0x12c/0x1a0 [ 612.052817][T23802] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 612.052840][T23802] ? strnlen_user+0x1ed/0x280 [ 612.052860][T23802] ? __x64_sys_memfd_create+0x13c/0x470 [ 612.052885][T23802] __x64_sys_memfd_create+0x13c/0x470 [ 612.062713][T23802] ? memfd_fcntl+0x1820/0x1820 [ 612.062733][T23802] ? do_syscall_64+0x26/0x680 [ 612.062759][T23802] ? lockdep_hardirqs_on+0x418/0x5d0 [ 612.118884][T23802] ? trace_hardirqs_on+0x67/0x220 [ 612.123960][T23802] do_syscall_64+0xfd/0x680 [ 612.128504][T23802] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 612.134438][T23802] RIP: 0033:0x459279 [ 612.138363][T23802] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 612.157999][T23802] RSP: 002b:00007efd2d149a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 13:23:23 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x2f000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 612.166450][T23802] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459279 [ 612.174454][T23802] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be16c [ 612.182454][T23802] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 612.190452][T23802] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efd2d14a6d4 [ 612.198542][T23802] R13: 00000000004c7f8b R14: 00000000004de500 R15: 0000000000000003 [ 612.206914][T23803] CPU: 1 PID: 23803 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 612.214949][T23803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 612.225045][T23803] Call Trace: [ 612.228377][T23803] dump_stack+0x172/0x1f0 [ 612.232755][T23803] should_fail.cold+0xa/0x15 [ 612.237388][T23803] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 612.243246][T23803] ? ___might_sleep+0x163/0x280 [ 612.248137][T23803] __should_failslab+0x121/0x190 [ 612.253121][T23803] should_failslab+0x9/0x14 [ 612.257677][T23803] __kmalloc+0x2d9/0x740 [ 612.261988][T23803] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 612.268271][T23803] ? fput_many+0x12c/0x1a0 [ 612.272719][T23803] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 612.272737][T23803] ? strnlen_user+0x1ed/0x280 [ 612.272753][T23803] ? __x64_sys_memfd_create+0x13c/0x470 [ 612.272769][T23803] __x64_sys_memfd_create+0x13c/0x470 [ 612.272785][T23803] ? memfd_fcntl+0x1820/0x1820 [ 612.272800][T23803] ? do_syscall_64+0x26/0x680 [ 612.272825][T23803] ? lockdep_hardirqs_on+0x418/0x5d0 [ 612.284318][T23803] ? trace_hardirqs_on+0x67/0x220 [ 612.284343][T23803] do_syscall_64+0xfd/0x680 [ 612.284376][T23803] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 612.295337][T23803] RIP: 0033:0x459279 [ 612.295357][T23803] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 612.295364][T23803] RSP: 002b:00007f050b165a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 612.295378][T23803] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459279 [ 612.295386][T23803] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be16c [ 612.295395][T23803] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 612.295403][T23803] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f050b1666d4 [ 612.295411][T23803] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:23:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:26 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) getresuid(&(0x7f00000001c0), &(0x7f0000001480), &(0x7f00000014c0)) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x4, 0x800) ioctl$SG_IO(r1, 0x2285, &(0x7f0000001400)={0x0, 0xfffffffffffffffc, 0x1000, 0xfffffffffffffffc, @buffer={0x0, 0xef, &(0x7f0000000200)=""/239}, &(0x7f0000000300)="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", &(0x7f0000001300)=""/255, 0x6df, 0x10024, 0x0, &(0x7f00000000c0)}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0x8, 0xfffffffffffffef3) r2 = dup3(r0, r0, 0x80000) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) openat$vimc2(0xffffffffffffff9c, &(0x7f0000001500)='/dev/video2\x00', 0x2, 0x0) ioctl(r3, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001540)=ANY=[@ANYBLOB="00b774b3d5be14dc785d802253e284b013008062531200e2ffef0781e71b6e8cb416a202"], 0x1}}, 0x0) 13:23:26 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x3c000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:23:26 executing program 3 (fault-call:0 fault-nth:1): syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:23:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, 0x0, 0x0) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:26 executing program 1 (fault-call:0 fault-nth:1): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 614.795707][T23821] FAULT_INJECTION: forcing a failure. [ 614.795707][T23821] name failslab, interval 1, probability 0, space 0, times 0 [ 614.842781][T23823] FAULT_INJECTION: forcing a failure. [ 614.842781][T23823] name failslab, interval 1, probability 0, space 0, times 0 [ 614.852785][T23821] CPU: 0 PID: 23821 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 614.863464][T23821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 614.873553][T23821] Call Trace: [ 614.876900][T23821] dump_stack+0x172/0x1f0 [ 614.881283][T23821] should_fail.cold+0xa/0x15 [ 614.885917][T23821] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 614.891784][T23821] ? ___might_sleep+0x163/0x280 [ 614.896769][T23821] __should_failslab+0x121/0x190 [ 614.901750][T23821] ? shmem_destroy_inode+0x80/0x80 [ 614.906902][T23821] should_failslab+0x9/0x14 [ 614.911441][T23821] kmem_cache_alloc+0x2af/0x6f0 [ 614.916345][T23821] ? find_held_lock+0x35/0x130 [ 614.921162][T23821] ? __alloc_fd+0x44d/0x560 [ 614.925717][T23821] ? shmem_destroy_inode+0x80/0x80 [ 614.930880][T23821] shmem_alloc_inode+0x1c/0x50 [ 614.935692][T23821] alloc_inode+0x68/0x1e0 13:23:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(0xffffffffffffffff, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) [ 614.940100][T23821] new_inode_pseudo+0x19/0xf0 [ 614.944835][T23821] new_inode+0x1f/0x40 [ 614.948950][T23821] shmem_get_inode+0x84/0x7e0 [ 614.953681][T23821] __shmem_file_setup.part.0+0x7e/0x2b0 [ 614.959293][T23821] shmem_file_setup+0x66/0x90 [ 614.964034][T23821] __x64_sys_memfd_create+0x2a2/0x470 [ 614.969463][T23821] ? memfd_fcntl+0x1820/0x1820 [ 614.974274][T23821] ? do_syscall_64+0x26/0x680 [ 614.979027][T23821] ? lockdep_hardirqs_on+0x418/0x5d0 [ 614.984374][T23821] ? trace_hardirqs_on+0x67/0x220 [ 614.989473][T23821] do_syscall_64+0xfd/0x680 [ 614.994049][T23821] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 615.000012][T23821] RIP: 0033:0x459279 [ 615.003962][T23821] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 615.023682][T23821] RSP: 002b:00007f050b165a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 615.032142][T23821] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459279 13:23:26 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 615.040166][T23821] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be16c [ 615.048180][T23821] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 615.056203][T23821] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f050b1666d4 [ 615.064223][T23821] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 [ 615.090345][T23823] CPU: 1 PID: 23823 Comm: syz-executor.3 Not tainted 5.2.0-rc3+ #20 [ 615.098411][T23823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 615.108801][T23823] Call Trace: [ 615.112131][T23823] dump_stack+0x172/0x1f0 [ 615.116641][T23823] should_fail.cold+0xa/0x15 [ 615.121291][T23823] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 615.127165][T23823] ? ___might_sleep+0x163/0x280 [ 615.132072][T23823] __should_failslab+0x121/0x190 [ 615.137045][T23823] ? shmem_destroy_inode+0x80/0x80 [ 615.142198][T23823] should_failslab+0x9/0x14 [ 615.146764][T23823] kmem_cache_alloc+0x2af/0x6f0 [ 615.151667][T23823] ? find_held_lock+0x35/0x130 [ 615.156472][T23823] ? __alloc_fd+0x44d/0x560 [ 615.161145][T23823] ? shmem_destroy_inode+0x80/0x80 [ 615.166304][T23823] shmem_alloc_inode+0x1c/0x50 [ 615.171114][T23823] alloc_inode+0x68/0x1e0 [ 615.175491][T23823] new_inode_pseudo+0x19/0xf0 [ 615.180220][T23823] new_inode+0x1f/0x40 [ 615.184384][T23823] shmem_get_inode+0x84/0x7e0 [ 615.189121][T23823] __shmem_file_setup.part.0+0x7e/0x2b0 [ 615.194726][T23823] shmem_file_setup+0x66/0x90 [ 615.199576][T23823] __x64_sys_memfd_create+0x2a2/0x470 [ 615.205001][T23823] ? memfd_fcntl+0x1820/0x1820 [ 615.209809][T23823] ? do_syscall_64+0x26/0x680 [ 615.214535][T23823] ? lockdep_hardirqs_on+0x418/0x5d0 [ 615.219888][T23823] ? trace_hardirqs_on+0x67/0x220 [ 615.224970][T23823] do_syscall_64+0xfd/0x680 [ 615.229535][T23823] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 615.235481][T23823] RIP: 0033:0x459279 [ 615.239419][T23823] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 615.259053][T23823] RSP: 002b:00007efd2d149a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 615.267510][T23823] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459279 [ 615.275520][T23823] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be16c [ 615.284977][T23823] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 13:23:26 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x43050000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:23:26 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x50000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:23:26 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x58000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:23:26 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 615.292984][T23823] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efd2d14a6d4 [ 615.301031][T23823] R13: 00000000004c7f8b R14: 00000000004de500 R15: 0000000000000003 13:23:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:29 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x800e0000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:23:29 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)=0x0) waitid(0x1, r1, &(0x7f00000001c0), 0x80000000, &(0x7f0000000240)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="00000026351e7f10a0d430b60300003503bb8020030001080002e6f5b49435e067bc9639742460a6eaa5180c3d1e1ef001b8fb28aa4797f61cf94c7f40e63965761799c5ab5d7d4c078caafec015112ac2d14f3981371421885f5945695c1457204c06284b22e77279df6e9ae6"], 0x1}}, 0x0) 13:23:29 executing program 1 (fault-call:0 fault-nth:2): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:23:29 executing program 3 (fault-call:0 fault-nth:2): syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:23:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(0xffffffffffffffff, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) [ 617.888229][T23853] FAULT_INJECTION: forcing a failure. [ 617.888229][T23853] name failslab, interval 1, probability 0, space 0, times 0 [ 617.912426][T23856] FAULT_INJECTION: forcing a failure. [ 617.912426][T23856] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 617.925746][T23856] CPU: 1 PID: 23856 Comm: syz-executor.3 Not tainted 5.2.0-rc3+ #20 [ 617.933848][T23856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 617.943943][T23856] Call Trace: [ 617.947283][T23856] dump_stack+0x172/0x1f0 [ 617.951669][T23856] should_fail.cold+0xa/0x15 [ 617.956308][T23856] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 617.962155][T23856] ? mark_held_locks+0xf0/0xf0 [ 617.966966][T23856] ? get_mem_cgroup_from_mm+0x10b/0x2b0 [ 617.972565][T23856] should_fail_alloc_page+0x50/0x60 [ 617.977808][T23856] __alloc_pages_nodemask+0x1a1/0x8d0 [ 617.983228][T23856] ? rcu_read_unlock+0x16/0x60 13:23:29 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000002791fd51aa4142223c7afd"], 0x1}}, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x2, 0x420000) ioctl$KDSETMODE(r2, 0x4b3a, 0xffffffff) write$FUSE_GETXATTR(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x7, {0x7}}, 0x18) [ 617.988035][T23856] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 617.993809][T23856] cache_grow_begin+0x9d/0x650 [ 617.998613][T23856] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 618.004901][T23856] kmem_cache_alloc+0x62a/0x6f0 [ 618.009785][T23856] ? find_held_lock+0x35/0x130 [ 618.014593][T23856] ? __alloc_fd+0x44d/0x560 [ 618.019164][T23856] ? shmem_destroy_inode+0x80/0x80 [ 618.024322][T23856] shmem_alloc_inode+0x1c/0x50 [ 618.029124][T23856] alloc_inode+0x68/0x1e0 [ 618.033499][T23856] new_inode_pseudo+0x19/0xf0 [ 618.038224][T23856] new_inode+0x1f/0x40 [ 618.042336][T23856] shmem_get_inode+0x84/0x7e0 [ 618.047074][T23856] __shmem_file_setup.part.0+0x7e/0x2b0 [ 618.052676][T23856] shmem_file_setup+0x66/0x90 [ 618.057399][T23856] __x64_sys_memfd_create+0x2a2/0x470 [ 618.062820][T23856] ? memfd_fcntl+0x1820/0x1820 [ 618.067622][T23856] ? do_syscall_64+0x26/0x680 [ 618.072351][T23856] ? lockdep_hardirqs_on+0x418/0x5d0 [ 618.077711][T23856] ? trace_hardirqs_on+0x67/0x220 [ 618.082796][T23856] do_syscall_64+0xfd/0x680 [ 618.087355][T23856] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 618.093285][T23856] RIP: 0033:0x459279 [ 618.097217][T23856] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 618.116890][T23856] RSP: 002b:00007efd2d149a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 618.125429][T23856] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459279 13:23:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(0xffffffffffffffff, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) [ 618.133437][T23856] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be16c [ 618.141447][T23856] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 618.149457][T23856] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efd2d14a6d4 [ 618.157482][T23856] R13: 00000000004c7f8b R14: 00000000004de500 R15: 0000000000000003 [ 618.179801][T23853] CPU: 1 PID: 23853 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 13:23:29 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x80350000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 618.187853][T23853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 618.197934][T23853] Call Trace: [ 618.201268][T23853] dump_stack+0x172/0x1f0 [ 618.205650][T23853] should_fail.cold+0xa/0x15 [ 618.210446][T23853] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 618.216304][T23853] ? ___might_sleep+0x163/0x280 [ 618.221200][T23853] __should_failslab+0x121/0x190 [ 618.226206][T23853] should_failslab+0x9/0x14 [ 618.230754][T23853] kmem_cache_alloc+0x2af/0x6f0 [ 618.235648][T23853] ? current_time+0x6b/0x140 [ 618.240295][T23853] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 618.246154][T23853] ? lockdep_hardirqs_on+0x418/0x5d0 [ 618.251481][T23853] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 618.251510][T23853] ? timespec64_trunc+0xf0/0x180 [ 618.264140][T23853] __d_alloc+0x2e/0x8c0 [ 618.264165][T23853] d_alloc_pseudo+0x1e/0x70 [ 618.264181][T23853] alloc_file_pseudo+0xe2/0x280 [ 618.264195][T23853] ? alloc_file+0x4d0/0x4d0 [ 618.264210][T23853] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 618.264234][T23853] __shmem_file_setup.part.0+0x108/0x2b0 [ 618.264260][T23853] shmem_file_setup+0x66/0x90 [ 618.264282][T23853] __x64_sys_memfd_create+0x2a2/0x470 [ 618.264298][T23853] ? memfd_fcntl+0x1820/0x1820 [ 618.264325][T23853] ? do_syscall_64+0x26/0x680 [ 618.319786][T23853] ? lockdep_hardirqs_on+0x418/0x5d0 [ 618.325116][T23853] ? trace_hardirqs_on+0x67/0x220 [ 618.330197][T23853] do_syscall_64+0xfd/0x680 [ 618.334749][T23853] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 618.340687][T23853] RIP: 0033:0x459279 [ 618.344626][T23853] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 618.364266][T23853] RSP: 002b:00007f050b165a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 618.372714][T23853] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459279 [ 618.380712][T23853] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be16c 13:23:29 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x81000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:23:29 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0xffffffffffffff6c, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="0100008800130000080002e6f5946b984f2de3c9e1fba0d1d16357209b7d33fb42379820eae7c34b4fe308000000cb00006a6bf0615aaf7cb9d9033822fda40e89270e44"], 0x1}}, 0x0) [ 618.388719][T23853] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 618.396806][T23853] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f050b1666d4 [ 618.404810][T23853] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:23:29 executing program 1 (fault-call:0 fault-nth:3): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 618.470052][T23856] hfs: can't find a HFS filesystem on dev loop3 [ 618.618626][T23880] FAULT_INJECTION: forcing a failure. [ 618.618626][T23880] name failslab, interval 1, probability 0, space 0, times 0 [ 618.665871][T23880] CPU: 1 PID: 23880 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 618.673942][T23880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 618.684033][T23880] Call Trace: [ 618.687368][T23880] dump_stack+0x172/0x1f0 [ 618.691765][T23880] should_fail.cold+0xa/0x15 [ 618.696415][T23880] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 618.702290][T23880] ? ___might_sleep+0x163/0x280 [ 618.702317][T23880] __should_failslab+0x121/0x190 [ 618.702340][T23880] should_failslab+0x9/0x14 [ 618.702358][T23880] kmem_cache_alloc+0x2af/0x6f0 [ 618.702385][T23880] __alloc_file+0x27/0x300 [ 618.702409][T23880] alloc_empty_file+0x72/0x170 [ 618.716791][T23880] alloc_file+0x5e/0x4d0 [ 618.716813][T23880] alloc_file_pseudo+0x189/0x280 [ 618.716836][T23880] ? alloc_file+0x4d0/0x4d0 [ 618.744759][T23880] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 618.751071][T23880] __shmem_file_setup.part.0+0x108/0x2b0 [ 618.756745][T23880] shmem_file_setup+0x66/0x90 [ 618.761460][T23880] __x64_sys_memfd_create+0x2a2/0x470 [ 618.766881][T23880] ? memfd_fcntl+0x1820/0x1820 [ 618.771703][T23880] ? do_syscall_64+0x26/0x680 [ 618.776431][T23880] ? lockdep_hardirqs_on+0x418/0x5d0 [ 618.781758][T23880] ? trace_hardirqs_on+0x67/0x220 [ 618.786816][T23880] do_syscall_64+0xfd/0x680 [ 618.791337][T23880] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 618.797274][T23880] RIP: 0033:0x459279 [ 618.801206][T23880] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 618.821013][T23880] RSP: 002b:00007f050b165a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 618.829572][T23880] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459279 [ 618.837573][T23880] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be16c [ 618.845559][T23880] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 618.853539][T23880] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f050b1666d4 [ 618.861518][T23880] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:23:32 executing program 3 (fault-call:0 fault-nth:3): syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:23:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x0) 13:23:32 executing program 1 (fault-call:0 fault-nth:4): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:23:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:32 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:23:32 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000100), 0xc, &(0x7f00000006c0)={&(0x7f0000000200)={0x49c, 0x4, 0xc7d5dfe5d3ed1057, 0x0, 0x70bd27, 0x25dfdbfb, {0x7, 0x0, 0x6}, [@nested={0x158, 0x3a, [@generic="df055df545a8c71ba30bb594d33a9becdb51410394616c58445c0050c6220298b35c066a6cc96bbfb3b7944d3ea73c572ee6d114", @generic="534ebdd333b29c30be32af0e333975a176f4e9322520de3dd5102bae352b8cb96e1a9c2a8b905bfc7761ca012b35d71b59e3ddb2dbd8103009ba5714117d6b0a162dd4936fc43d99d6b6a093639cf95a9f9f27e005fecf81d86a035c120071d7b8a10d3ffd4a2531402bbea85006d4e8493ad50c0f4c03ab1b53454e55875a7b8a888336065f0201374144ca3c126422307f68e4e71c34204df6b74ae76a840805365d4aa7a5ac52ac42e433d68cc8819eb3b9bb000f2ee01dc5dd2831f6b3414feb001fa04372eca7884dc7", @generic="6e65c0d81942cb803004d1f43eeaebfb1e9461e61d1033f09f47e075b9022957b1c05fafe92f5cdf753f67be2c43e46971aac6f6874a8cd529ffa8053e7b27cd4e3d7be311b5858960faefbd8904ffcf31f929"]}, @generic="fc16026f689d283ee7c2af5bed3ed931f5051b", @generic="69aefcbbb3c94bf0a1994a133d7ca5d570b43937b6e77c30036c3aa8bccde906e780e9d101a49096a66e0fde7d5974c08e4af224623a78f5804d9cb6bd816d0f87894ba7a5baac91f6a78d80feee53ec66393c4aa6cb6d8e7b3a1f2af91da2768dc00dc1e0dc0983a006e5c142aa7405fb1c3e107054", @typed={0xe8, 0x8a, @binary="88b7834609eed508a86e209751852fa245c4a58b11ceff7bb7d59a2435a6403a3019d8ae9f615d57471f2a680fd2255d7cd998b634aa0e7d5b5288852c7d814a6fa6820b231a55bbfa228406617069bd9dc2e7915bcc546aa2044aa88a34d3dc5ccd79152dfbdd556b77bd40ff4cb3cfadc7ead505debd534e9803ddc0a9a0bd9f541af4b8ee8f9f53f89dcf4c5fe1d677687b6780df3ddf40876a6b6276e95c49068a04a55064b6086a66ee7cf83a20f68b47f58dc2bcc74d4db48d8422f6bad6ac927dd7a38010a9992d1e4b6f3abd60670089975f6ccfb8bd89b94567fde3a446"}, @typed={0xc, 0x56, @u64=0x8}, @nested={0xdc, 0x2e, [@generic="6699acaed117fb8e16c912614c7e78729b79d72dbe0ad9b67000bd1c16fe210c548973dda0dab6fdc04e2d0e47d55e7db80ddb6800e3529e524957168349798c676c211f5aba8fe285decf137e51b429aeffca695f540d13f04536c5df1b65e9da4049e389a16070de11d3917a6d97dc8eacd2f651437530cb323aee463da8d69b7b8e343e369ecacb5c4bbb22eef143ede0e35379abc91550157aa3a21deb7fc937058d78a3c53fe913415d082acab56a861371a0f11129984305e8b705e93f696556ac05fd3aef2884701f0dd5b8de4fbc1c2aad61"]}, @nested={0xd4, 0x2a, [@generic="898695b41d377914314b7a38f8b7e3f5392e8eb51c361a5b2edd04a36d38e73486eab7a5b6c3fabb0cf016aa58987d53c00e6d3d1b0a20f0514108e19a1a2f2f1ce7e7b54756805c2aad4e13bd8ba20b43dd5f43d91701a38cbcbb8a82f48977d5b052f6c0f0147f2e53dab68a2e3acf12e1261a76f8a053d9eb4f42cbbbedd51d15843d41dcc496374f249ae8c4d30a7291cf132be725156923a191f5256d77b2e179378c738e0879d19b4b9e84c701048a615a9bb377628290f6ca9f4a43cc720c61d4c4", @typed={0x8, 0x28, @ipv4=@local}]}]}, 0x49c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000800) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0xb935ac711e8ecffc, 0x0) write$smack_current(r2, &(0x7f0000000040)='mime_typesystem\\cgroup#)[\x00', 0x1a) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x0) [ 621.082770][T23895] FAULT_INJECTION: forcing a failure. [ 621.082770][T23895] name failslab, interval 1, probability 0, space 0, times 0 [ 621.103278][T23896] FAULT_INJECTION: forcing a failure. [ 621.103278][T23896] name failslab, interval 1, probability 0, space 0, times 0 [ 621.145655][T23896] CPU: 1 PID: 23896 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 621.153737][T23896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 621.164131][T23896] Call Trace: [ 621.167478][T23896] dump_stack+0x172/0x1f0 [ 621.171855][T23896] should_fail.cold+0xa/0x15 [ 621.176488][T23896] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 621.182367][T23896] ? ___might_sleep+0x163/0x280 [ 621.187270][T23896] __should_failslab+0x121/0x190 [ 621.192252][T23896] should_failslab+0x9/0x14 [ 621.196798][T23896] kmem_cache_alloc+0x2af/0x6f0 [ 621.201731][T23896] ? rcu_read_lock_sched_held+0x110/0x130 [ 621.207523][T23896] ? kmem_cache_alloc+0x32b/0x6f0 [ 621.212599][T23896] security_file_alloc+0x39/0x170 [ 621.217690][T23896] __alloc_file+0xac/0x300 [ 621.222180][T23896] alloc_empty_file+0x72/0x170 [ 621.227004][T23896] alloc_file+0x5e/0x4d0 [ 621.231302][T23896] alloc_file_pseudo+0x189/0x280 [ 621.236278][T23896] ? alloc_file+0x4d0/0x4d0 [ 621.240817][T23896] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 621.240843][T23896] __shmem_file_setup.part.0+0x108/0x2b0 [ 621.240862][T23896] shmem_file_setup+0x66/0x90 [ 621.240881][T23896] __x64_sys_memfd_create+0x2a2/0x470 [ 621.240895][T23896] ? memfd_fcntl+0x1820/0x1820 [ 621.240911][T23896] ? do_syscall_64+0x26/0x680 [ 621.240926][T23896] ? lockdep_hardirqs_on+0x418/0x5d0 [ 621.240943][T23896] ? trace_hardirqs_on+0x67/0x220 [ 621.240969][T23896] do_syscall_64+0xfd/0x680 [ 621.289384][T23896] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 621.295315][T23896] RIP: 0033:0x459279 [ 621.299336][T23896] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 621.318993][T23896] RSP: 002b:00007f050b165a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 621.327527][T23896] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459279 [ 621.335530][T23896] RDX: 0000000020000228 RSI: 0000000000000000 RDI: 00000000004be16c [ 621.343533][T23896] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 621.351532][T23896] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f050b1666d4 [ 621.359533][T23896] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 [ 621.367588][T23895] CPU: 0 PID: 23895 Comm: syz-executor.3 Not tainted 5.2.0-rc3+ #20 [ 621.375611][T23895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 621.385700][T23895] Call Trace: [ 621.389818][T23895] dump_stack+0x172/0x1f0 [ 621.394211][T23895] should_fail.cold+0xa/0x15 [ 621.398879][T23895] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 621.404730][T23895] ? ___might_sleep+0x163/0x280 [ 621.409641][T23895] __should_failslab+0x121/0x190 [ 621.414622][T23895] should_failslab+0x9/0x14 [ 621.419167][T23895] kmem_cache_alloc+0x2af/0x6f0 [ 621.424070][T23895] __alloc_file+0x27/0x300 [ 621.428529][T23895] alloc_empty_file+0x72/0x170 [ 621.433336][T23895] alloc_file+0x5e/0x4d0 [ 621.437634][T23895] alloc_file_pseudo+0x189/0x280 [ 621.442608][T23895] ? alloc_file+0x4d0/0x4d0 [ 621.442629][T23895] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 621.442665][T23895] __shmem_file_setup.part.0+0x108/0x2b0 [ 621.453487][T23895] shmem_file_setup+0x66/0x90 [ 621.453510][T23895] __x64_sys_memfd_create+0x2a2/0x470 [ 621.453524][T23895] ? memfd_fcntl+0x1820/0x1820 [ 621.453539][T23895] ? do_syscall_64+0x26/0x680 [ 621.453554][T23895] ? lockdep_hardirqs_on+0x418/0x5d0 [ 621.453572][T23895] ? trace_hardirqs_on+0x67/0x220 [ 621.453595][T23895] do_syscall_64+0xfd/0x680 [ 621.493615][T23895] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 621.499533][T23895] RIP: 0033:0x459279 [ 621.503455][T23895] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 621.523089][T23895] RSP: 002b:00007efd2d149a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 621.531538][T23895] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459279 [ 621.539580][T23895] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be16c 13:23:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:32 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x88470000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:23:33 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x88480000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:23:33 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x683, 0x80000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYPTR=&(0x7f0000000040)=ANY=[@ANYRES64=r1, @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRES64=r0]]], 0x1}}, 0x0) [ 621.547676][T23895] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 621.555679][T23895] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efd2d14a6d4 [ 621.563677][T23895] R13: 00000000004c7f8b R14: 00000000004de500 R15: 0000000000000003 13:23:33 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x4400) io_uring_enter(r2, 0x1, 0x5d, 0x1, &(0x7f0000000080)={0xd3}, 0x8) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) 13:23:33 executing program 3 (fault-call:0 fault-nth:4): syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:23:33 executing program 1 (fault-call:0 fault-nth:5): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:23:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) [ 621.880812][T23927] FAULT_INJECTION: forcing a failure. [ 621.880812][T23927] name failslab, interval 1, probability 0, space 0, times 0 [ 621.885983][T23928] FAULT_INJECTION: forcing a failure. [ 621.885983][T23928] name failslab, interval 1, probability 0, space 0, times 0 [ 621.907192][T23927] CPU: 0 PID: 23927 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 621.915304][T23927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 621.925411][T23927] Call Trace: [ 621.928758][T23927] dump_stack+0x172/0x1f0 [ 621.933148][T23927] should_fail.cold+0xa/0x15 [ 621.937895][T23927] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 621.943780][T23927] ? ___might_sleep+0x163/0x280 [ 621.948682][T23927] __should_failslab+0x121/0x190 [ 621.953703][T23927] should_failslab+0x9/0x14 [ 621.958247][T23927] __kmalloc+0x2d9/0x740 [ 621.962518][T23927] ? tomoyo_realpath_from_path+0xc0/0x7a0 [ 621.968276][T23927] ? rcu_read_lock_sched_held+0x110/0x130 [ 621.974021][T23927] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 621.979762][T23927] tomoyo_realpath_from_path+0xcd/0x7a0 [ 621.985327][T23927] ? tomoyo_path_perm+0x1cb/0x430 [ 621.990372][T23927] tomoyo_path_perm+0x230/0x430 [ 621.995242][T23927] ? tomoyo_path_perm+0x1cb/0x430 [ 622.000285][T23927] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 622.006378][T23927] ? find_held_lock+0x35/0x130 [ 622.011184][T23927] ? lock_downgrade+0x880/0x880 [ 622.016070][T23927] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 622.022366][T23927] tomoyo_path_truncate+0x1d/0x30 [ 622.027406][T23927] security_path_truncate+0xf2/0x150 [ 622.032719][T23927] do_sys_ftruncate+0x3d9/0x550 [ 622.037604][T23927] __x64_sys_ftruncate+0x59/0x80 [ 622.042570][T23927] do_syscall_64+0xfd/0x680 [ 622.047092][T23927] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 622.052999][T23927] RIP: 0033:0x459247 [ 622.056906][T23927] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 622.076524][T23927] RSP: 002b:00007f050b165a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 622.084964][T23927] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459247 [ 622.092952][T23927] RDX: 0000000020000228 RSI: 0000000000020000 RDI: 0000000000000004 [ 622.100937][T23927] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 622.108919][T23927] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 622.116905][T23927] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 [ 622.124962][T23928] CPU: 1 PID: 23928 Comm: syz-executor.3 Not tainted 5.2.0-rc3+ #20 [ 622.125607][T23927] ERROR: Out of memory at tomoyo_realpath_from_path. [ 622.132977][T23928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 622.132986][T23928] Call Trace: [ 622.133017][T23928] dump_stack+0x172/0x1f0 [ 622.133040][T23928] should_fail.cold+0xa/0x15 [ 622.133058][T23928] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 622.133077][T23928] ? ___might_sleep+0x163/0x280 [ 622.133098][T23928] __should_failslab+0x121/0x190 [ 622.133123][T23928] should_failslab+0x9/0x14 [ 622.149897][T23928] kmem_cache_alloc+0x2af/0x6f0 [ 622.149925][T23928] __alloc_file+0x27/0x300 [ 622.149940][T23928] alloc_empty_file+0x72/0x170 [ 622.149956][T23928] alloc_file+0x5e/0x4d0 [ 622.149973][T23928] alloc_file_pseudo+0x189/0x280 [ 622.149988][T23928] ? alloc_file+0x4d0/0x4d0 [ 622.150005][T23928] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 622.150031][T23928] __shmem_file_setup.part.0+0x108/0x2b0 [ 622.150052][T23928] shmem_file_setup+0x66/0x90 [ 622.150078][T23928] __x64_sys_memfd_create+0x2a2/0x470 [ 622.150092][T23928] ? memfd_fcntl+0x1820/0x1820 [ 622.150113][T23928] ? do_syscall_64+0x26/0x680 [ 622.150128][T23928] ? lockdep_hardirqs_on+0x418/0x5d0 [ 622.150145][T23928] ? trace_hardirqs_on+0x67/0x220 [ 622.157990][T23928] do_syscall_64+0xfd/0x680 [ 622.158033][T23928] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 622.158054][T23928] RIP: 0033:0x459279 [ 622.277009][T23928] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 622.296644][T23928] RSP: 002b:00007efd2d149a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 622.305088][T23928] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459279 [ 622.313081][T23928] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 00000000004be16c [ 622.321084][T23928] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 622.329103][T23928] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efd2d14a6d4 [ 622.337101][T23928] R13: 00000000004c7f8b R14: 00000000004de500 R15: 0000000000000003 13:23:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:35 executing program 4: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000000)=0x401) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") 13:23:35 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x88640000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:23:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000), 0x0) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:35 executing program 3 (fault-call:0 fault-nth:5): syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:23:35 executing program 1 (fault-call:0 fault-nth:6): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 624.158439][T23939] FAULT_INJECTION: forcing a failure. [ 624.158439][T23939] name failslab, interval 1, probability 0, space 0, times 0 [ 624.172920][T23941] FAULT_INJECTION: forcing a failure. [ 624.172920][T23941] name failslab, interval 1, probability 0, space 0, times 0 [ 624.187159][T23939] CPU: 1 PID: 23939 Comm: syz-executor.3 Not tainted 5.2.0-rc3+ #20 [ 624.195184][T23939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 624.205267][T23939] Call Trace: [ 624.208594][T23939] dump_stack+0x172/0x1f0 [ 624.212962][T23939] should_fail.cold+0xa/0x15 [ 624.212999][T23939] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 624.223425][T23939] ? ___might_sleep+0x163/0x280 [ 624.228304][T23939] __should_failslab+0x121/0x190 [ 624.233281][T23939] should_failslab+0x9/0x14 [ 624.237811][T23939] __kmalloc+0x2d9/0x740 [ 624.242085][T23939] ? tomoyo_realpath_from_path+0xc0/0x7a0 [ 624.247827][T23939] ? rcu_read_lock_sched_held+0x110/0x130 [ 624.253569][T23939] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 624.259319][T23939] tomoyo_realpath_from_path+0xcd/0x7a0 [ 624.272989][T23939] ? tomoyo_path_perm+0x1cb/0x430 [ 624.273008][T23939] tomoyo_path_perm+0x230/0x430 [ 624.273020][T23939] ? tomoyo_path_perm+0x1cb/0x430 [ 624.273036][T23939] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 624.273051][T23939] ? find_held_lock+0x35/0x130 [ 624.273075][T23939] ? lock_downgrade+0x880/0x880 [ 624.273092][T23939] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 624.273131][T23939] tomoyo_path_truncate+0x1d/0x30 [ 624.283022][T23939] security_path_truncate+0xf2/0x150 [ 624.320465][T23939] do_sys_ftruncate+0x3d9/0x550 [ 624.325366][T23939] __x64_sys_ftruncate+0x59/0x80 [ 624.330365][T23939] do_syscall_64+0xfd/0x680 [ 624.334915][T23939] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 624.340845][T23939] RIP: 0033:0x459247 [ 624.344774][T23939] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 624.364399][T23939] RSP: 002b:00007efd2d149a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 624.372839][T23939] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000459247 [ 624.380837][T23939] RDX: 0000000000000010 RSI: 0000000000000000 RDI: 0000000000000004 [ 624.389015][T23939] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 624.397008][T23939] R10: 0000000000000000 R11: 0000000000000217 R12: 0000000000000004 13:23:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x0) set_robust_list(&(0x7f0000000200)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x6, &(0x7f0000000100)={&(0x7f00000000c0)}}, 0x18) 13:23:35 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:23:35 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="f594"], 0x1}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 624.405005][T23939] R13: 00000000004c7f8b R14: 00000000004de500 R15: 0000000000000003 [ 624.448441][T23941] CPU: 1 PID: 23941 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 624.456493][T23941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 624.466584][T23941] Call Trace: [ 624.466618][T23941] dump_stack+0x172/0x1f0 [ 624.474252][T23941] should_fail.cold+0xa/0x15 [ 624.478881][T23941] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 624.484728][T23941] ? ___might_sleep+0x163/0x280 [ 624.489606][T23941] __should_failslab+0x121/0x190 [ 624.489626][T23941] should_failslab+0x9/0x14 [ 624.489639][T23941] __kmalloc+0x2d9/0x740 [ 624.489665][T23941] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 624.489681][T23941] ? simple_dname+0xd1/0x1f0 [ 624.489699][T23941] ? tomoyo_encode2.part.0+0xf5/0x400 [ 624.489715][T23941] tomoyo_encode2.part.0+0xf5/0x400 [ 624.489734][T23941] tomoyo_encode+0x2b/0x50 [ 624.489749][T23941] tomoyo_realpath_from_path+0x1d3/0x7a0 [ 624.489769][T23941] ? tomoyo_path_perm+0x1cb/0x430 [ 624.539892][T23941] tomoyo_path_perm+0x230/0x430 [ 624.544763][T23941] ? tomoyo_path_perm+0x1cb/0x430 [ 624.549813][T23941] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 624.555907][T23941] ? find_held_lock+0x35/0x130 [ 624.560701][T23941] ? lock_downgrade+0x880/0x880 [ 624.565568][T23941] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 624.571863][T23941] tomoyo_path_truncate+0x1d/0x30 [ 624.576908][T23941] security_path_truncate+0xf2/0x150 [ 624.582213][T23941] do_sys_ftruncate+0x3d9/0x550 [ 624.587106][T23941] __x64_sys_ftruncate+0x59/0x80 [ 624.592070][T23941] do_syscall_64+0xfd/0x680 13:23:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000), 0x0) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) [ 624.596595][T23941] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 624.602499][T23941] RIP: 0033:0x459247 [ 624.606409][T23941] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 624.609699][T23939] ERROR: Out of memory at tomoyo_realpath_from_path. [ 624.626029][T23941] RSP: 002b:00007f050b165a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 624.626046][T23941] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459247 13:23:36 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000200)) socket$inet_udplite(0x2, 0x2, 0x88) r1 = getpid() ptrace$poke(0x5, r1, &(0x7f0000000000), 0x7) fcntl$setown(r0, 0x8, r1) ioctl(r0, 0x100000890e, &(0x7f0000000040)="c0dca5055e0bcfa2000483") r2 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x0, 0x2) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000240)={[], 0x1, 0x20, 0x1, 0x8, 0x8000, r1}) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0x4) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2100068000030000080002e67594"], 0x1}}, 0x0) 13:23:36 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 624.626053][T23941] RDX: 0000000020000228 RSI: 0000000000020000 RDI: 0000000000000004 [ 624.626061][T23941] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 624.626067][T23941] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 624.626074][T23941] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 [ 624.798022][T23941] ERROR: Out of memory at tomoyo_realpath_from_path. [ 624.879309][T23939] hfs: can't find a HFS filesystem on dev loop3 13:23:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000), 0x0) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:38 executing program 4: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") 13:23:38 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x89060000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:23:38 executing program 1 (fault-call:0 fault-nth:7): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:23:38 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:23:38 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x89ffffff], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 627.325088][T23982] FAULT_INJECTION: forcing a failure. [ 627.325088][T23982] name failslab, interval 1, probability 0, space 0, times 0 [ 627.359760][T23982] CPU: 1 PID: 23982 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 627.367916][T23982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 627.378532][T23982] Call Trace: [ 627.381882][T23982] dump_stack+0x172/0x1f0 [ 627.387787][T23982] should_fail.cold+0xa/0x15 [ 627.392445][T23982] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 627.398479][T23982] ? ___might_sleep+0x163/0x280 [ 627.403378][T23982] __should_failslab+0x121/0x190 [ 627.408342][T23982] should_failslab+0x9/0x14 [ 627.412891][T23982] __kmalloc+0x2d9/0x740 [ 627.417165][T23982] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 627.423434][T23982] ? simple_dname+0xd1/0x1f0 [ 627.428046][T23982] ? tomoyo_encode2.part.0+0xf5/0x400 [ 627.433446][T23982] tomoyo_encode2.part.0+0xf5/0x400 [ 627.433464][T23982] tomoyo_encode+0x2b/0x50 [ 627.433477][T23982] tomoyo_realpath_from_path+0x1d3/0x7a0 [ 627.433489][T23982] ? tomoyo_path_perm+0x1cb/0x430 [ 627.433506][T23982] tomoyo_path_perm+0x230/0x430 [ 627.433517][T23982] ? tomoyo_path_perm+0x1cb/0x430 [ 627.433533][T23982] ? tomoyo_check_open_permission+0x3f0/0x3f0 [ 627.433548][T23982] ? find_held_lock+0x35/0x130 13:23:38 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f00000000c0)=@get={0x1, &(0x7f0000000040)=""/44, 0x7fffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7dd, 0x8000) accept4$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000240)=0x14, 0x80800) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000000280)={r3, 0x1, 0x6, @remote}, 0x10) [ 627.433570][T23982] ? lock_downgrade+0x880/0x880 [ 627.433594][T23982] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 627.485799][T23982] tomoyo_path_truncate+0x1d/0x30 [ 627.490856][T23982] security_path_truncate+0xf2/0x150 [ 627.496173][T23982] do_sys_ftruncate+0x3d9/0x550 [ 627.501053][T23982] __x64_sys_ftruncate+0x59/0x80 [ 627.506019][T23982] do_syscall_64+0xfd/0x680 [ 627.510552][T23982] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 627.516472][T23982] RIP: 0033:0x459247 [ 627.520382][T23982] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 627.540008][T23982] RSP: 002b:00007f050b165a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 627.540024][T23982] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000459247 [ 627.540031][T23982] RDX: 0000000020000228 RSI: 0000000000020000 RDI: 0000000000000004 [ 627.540038][T23982] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 13:23:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{0x0}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) [ 627.540045][T23982] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000004 [ 627.540051][T23982] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 [ 627.543630][T23982] ERROR: Out of memory at tomoyo_realpath_from_path. [ 627.595948][T23986] hfs: can't find a HFS filesystem on dev loop3 13:23:39 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:23:39 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) ioctl$IOC_PR_PREEMPT_ABORT(r2, 0x401870cc, &(0x7f0000000040)={0x2, 0x78, 0x679c, 0x7}) 13:23:39 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='\nfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:23:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:41 executing program 1 (fault-call:0 fault-nth:8): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:23:41 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:23:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030006080002e6f594"], 0x1}}, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$TIPC_NODE_RECVQ_DEPTH(r2, 0x10f, 0x83, &(0x7f0000000040), &(0x7f00000000c0)=0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x1ff) 13:23:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{0x0}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:41 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='%fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 630.371392][T24030] FAULT_INJECTION: forcing a failure. [ 630.371392][T24030] name fail_page_alloc, interval 1, probability 0, space 0, times 0 13:23:41 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xfc000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 630.496498][T24030] CPU: 0 PID: 24030 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 630.504540][T24030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 630.514600][T24030] Call Trace: [ 630.514657][T24030] dump_stack+0x172/0x1f0 [ 630.514687][T24030] should_fail.cold+0xa/0x15 [ 630.514713][T24030] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 630.526903][T24030] ? ___might_sleep+0x163/0x280 [ 630.526933][T24030] should_fail_alloc_page+0x50/0x60 [ 630.526953][T24030] __alloc_pages_nodemask+0x1a1/0x8d0 [ 630.548154][T24030] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 630.553923][T24030] ? mark_held_locks+0xf0/0xf0 [ 630.558693][T24030] ? mark_held_locks+0xf0/0xf0 [ 630.563467][T24030] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 630.563481][T24030] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 630.563503][T24030] alloc_pages_vma+0xdd/0x540 [ 630.563542][T24030] shmem_alloc_page+0xc0/0x180 [ 630.585421][T24030] ? shmem_swapin+0x1a0/0x1a0 [ 630.590132][T24030] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 630.595868][T24030] ? __vm_enough_memory+0x17e/0x3a0 [ 630.601088][T24030] shmem_alloc_and_acct_page+0x165/0x970 [ 630.606758][T24030] shmem_getpage_gfp+0x43b/0x2500 [ 630.606811][T24030] ? shmem_unuse_inode+0x1010/0x1010 [ 630.617121][T24030] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 630.622940][T24030] ? current_time+0x6b/0x140 [ 630.627540][T24030] ? ktime_get_coarse_real_ts64+0xf0/0x2b0 [ 630.633358][T24030] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 630.633377][T24030] ? iov_iter_fault_in_readable+0x22c/0x450 [ 630.633403][T24030] shmem_write_begin+0x105/0x1e0 [ 630.633425][T24030] generic_perform_write+0x22a/0x520 [ 630.633448][T24030] ? page_endio+0x780/0x780 [ 630.660287][T24030] ? current_time+0x140/0x140 [ 630.664976][T24030] ? lock_acquire+0x16f/0x3f0 [ 630.669673][T24030] __generic_file_write_iter+0x25e/0x630 [ 630.675333][T24030] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 630.681071][T24030] generic_file_write_iter+0x360/0x610 [ 630.686545][T24030] ? __generic_file_write_iter+0x630/0x630 [ 630.692370][T24030] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 630.698626][T24030] ? iov_iter_init+0xee/0x220 [ 630.703317][T24030] new_sync_write+0x4d3/0x770 [ 630.708008][T24030] ? new_sync_read+0x800/0x800 [ 630.712781][T24030] ? lock_downgrade+0x880/0x880 [ 630.717709][T24030] __vfs_write+0xe1/0x110 [ 630.722053][T24030] vfs_write+0x20c/0x580 [ 630.726326][T24030] ksys_pwrite64+0x183/0x1c0 [ 630.730918][T24030] ? __ia32_sys_pread64+0xf0/0xf0 [ 630.735955][T24030] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 630.741423][T24030] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 630.746894][T24030] ? do_syscall_64+0x26/0x680 [ 630.751577][T24030] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 630.757646][T24030] ? do_syscall_64+0x26/0x680 [ 630.762335][T24030] __x64_sys_pwrite64+0x97/0xf0 [ 630.767207][T24030] do_syscall_64+0xfd/0x680 [ 630.771733][T24030] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 630.777635][T24030] RIP: 0033:0x4131c7 [ 630.781539][T24030] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 630.801149][T24030] RSP: 002b:00007f050b165a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 630.809579][T24030] RAX: ffffffffffffffda RBX: 0000000020000210 RCX: 00000000004131c7 [ 630.817563][T24030] RDX: 0000000000000048 RSI: 0000000020000240 RDI: 0000000000000004 [ 630.825538][T24030] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 630.833691][T24030] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000004 13:23:41 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") utimes(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={{}, {0x0, 0x7530}}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x0) getsockopt$bt_hci(r1, 0x0, 0x3, &(0x7f0000000000)=""/26, &(0x7f0000000040)=0x1a) 13:23:42 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xfe800000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:23:42 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYRESDEC=r0], 0x1}, 0x1, 0x0, 0x0, 0x50}, 0x0) 13:23:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{0x0}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) [ 630.841689][T24030] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:23:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:44 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='\\fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:23:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:44 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xfec00000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:23:44 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000, &(0x7f0000000380)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYPTR], 0x1}, 0x1, 0x0, 0x0, 0x20040000}, 0x0) select(0x40, &(0x7f0000000100)={0x7fffffff, 0x36e, 0x20, 0x9, 0x4, 0xbf, 0x0, 0x2}, &(0x7f0000000140)={0x0, 0x4, 0x2, 0x6, 0x40, 0x1f1, 0x3f, 0x1f}, &(0x7f0000000180)={0x8001, 0x9, 0x1, 0x3ff, 0x529, 0x200, 0x8, 0xff}, &(0x7f00000001c0)) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x280480, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r2, 0xc028564e, &(0x7f0000000340)={0x3, 0x1, [0x8000, 0x442891ba, 0x9, 0x7fff, 0x1, 0x1e8f, 0x1, 0x2]}) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x80000, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000001580)=0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000015c0)={{{@in, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f00000016c0)=0xe8) r6 = getgid() sendmmsg$unix(r2, &(0x7f0000001740)=[{&(0x7f00000003c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001540)=[{&(0x7f0000000440)="f963ac70be3017ab7d164c7af180afc14d540a77be03ff976ff600b761bc96cf8a55839fa4684d397d84d021de604790c8fc57de66fe8cc3d8f3eccaad461c885c43da21fe04157e083c335dbe3be1f569c3b84e4e6a1872ad7dae804f72a61bae8dd70eb567d8686fb398ad247a566ede03dbbbd78c96cea959ff733c3db044f0e7721a89a4e8638c438c29ec0026311b1a935a333101aeb25ec2f50ca04faea37ff97bd20e54c98e1f414a1ef9d1126cf4933bc42aa3d6f0cf9753a2dbe51b5b6582cd5f9b8770ecae974e1eb813", 0xcf}, {&(0x7f0000000540)="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", 0x1000}], 0x2, &(0x7f0000001700)=[@cred={{0x1c, 0x1, 0x2, {r4, r5, r6}}}], 0x20, 0x20000000}], 0x1, 0x20000000) syz_open_dev$video4linux(&(0x7f0000001780)='/dev/v4l-subdev#\x00', 0x3f, 0x2000) ioctl$LOOP_GET_STATUS64(r3, 0x4c05, &(0x7f0000000240)) fsetxattr(r0, &(0x7f00000017c0)=@known='system.advise\x00', &(0x7f0000001800)='/dev/v4l-subdev#\x00', 0x11, 0x3) 13:23:44 executing program 1 (fault-call:0 fault-nth:9): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 633.462633][T24075] FAULT_INJECTION: forcing a failure. [ 633.462633][T24075] name failslab, interval 1, probability 0, space 0, times 0 [ 633.549833][T24075] CPU: 1 PID: 24075 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 633.557879][T24075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 633.567949][T24075] Call Trace: [ 633.571271][T24075] dump_stack+0x172/0x1f0 [ 633.575630][T24075] should_fail.cold+0xa/0x15 [ 633.580242][T24075] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 633.586073][T24075] ? ___might_sleep+0x163/0x280 [ 633.590941][T24075] __should_failslab+0x121/0x190 13:23:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x200001, 0x0) close(r1) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) r3 = fanotify_init(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r3}}) r4 = dup3(r2, r2, 0x80000) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f00000003c0)={{&(0x7f0000ff9000/0x4000)=nil, 0x4000}, 0x2}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r6 = accept4(r1, &(0x7f00000000c0)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast2}}, &(0x7f0000000200)=0x80, 0x80800) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r6, 0x800443d2, &(0x7f0000000240)={0x6, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}]}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="0000008000030000080002e6f594feaa3bf4b95c089c19727a23892e7c45a7205ee6d912097fa566b4f7c9a8a6e2a36a02a1bc67e7ff9674ea561464079880b6da83d9d10a657fee44c9a1bfb16d62e707eadad1ed0fcb1d846a5b094b9a700efb9ed78ed4f7b46a7090f358f7d936dcde785e354beae953f492dd318c3fea0340c8b8010b13e0a16b68a3a531af5efb6620c70ea07149dcd8953425c81026e54e749483252f88b86991c39c0cffafe948e7"], 0x1}}, 0x20000044) 13:23:45 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 633.595900][T24075] should_failslab+0x9/0x14 [ 633.600411][T24075] kmem_cache_alloc+0x2af/0x6f0 [ 633.605269][T24075] ? lock_downgrade+0x880/0x880 [ 633.610133][T24075] getname_flags+0xd6/0x5b0 [ 633.614652][T24075] getname+0x1a/0x20 [ 633.618566][T24075] do_sys_open+0x2c9/0x5d0 [ 633.622998][T24075] ? filp_open+0x80/0x80 [ 633.627254][T24075] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 633.632712][T24075] ? do_syscall_64+0x26/0x680 [ 633.637376][T24075] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 633.643425][T24075] ? do_syscall_64+0x26/0x680 [ 633.648089][T24075] __x64_sys_open+0x7e/0xc0 [ 633.652581][T24075] do_syscall_64+0xfd/0x680 [ 633.657074][T24075] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 633.662959][T24075] RIP: 0033:0x413161 [ 633.666849][T24075] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 633.686442][T24075] RSP: 002b:00007f050b165a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 13:23:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) [ 633.694837][T24075] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413161 [ 633.702793][T24075] RDX: 00007f050b165b0a RSI: 0000000000000002 RDI: 00007f050b165b00 [ 633.710745][T24075] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 633.718699][T24075] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 633.726653][T24075] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:23:45 executing program 1 (fault-call:0 fault-nth:10): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:23:45 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='h\ns\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:23:45 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="00000080000300000800020500000063df064496583404ac712a1d4639a460dbe63c40fc93576cf481a555a5bb7ad8b8273b1baffac7177227c0c99a7772fec08aa308cb0cc969b9d4b66f"], 0x1}}, 0x0) [ 633.933642][T24099] FAULT_INJECTION: forcing a failure. [ 633.933642][T24099] name failslab, interval 1, probability 0, space 0, times 0 [ 633.948532][T24099] CPU: 1 PID: 24099 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 633.956531][T24099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 633.966588][T24099] Call Trace: [ 633.969912][T24099] dump_stack+0x172/0x1f0 [ 633.974270][T24099] should_fail.cold+0xa/0x15 [ 633.978877][T24099] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 633.984710][T24099] ? ___might_sleep+0x163/0x280 [ 633.989556][T24099] __should_failslab+0x121/0x190 [ 633.994485][T24099] should_failslab+0x9/0x14 [ 633.998974][T24099] kmem_cache_alloc+0x2af/0x6f0 [ 634.003855][T24099] ? lock_downgrade+0x880/0x880 [ 634.008698][T24099] getname_flags+0xd6/0x5b0 [ 634.013199][T24099] getname+0x1a/0x20 [ 634.017082][T24099] do_sys_open+0x2c9/0x5d0 [ 634.021507][T24099] ? filp_open+0x80/0x80 [ 634.025741][T24099] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 634.031189][T24099] ? do_syscall_64+0x26/0x680 [ 634.035851][T24099] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 634.041902][T24099] ? do_syscall_64+0x26/0x680 [ 634.046569][T24099] __x64_sys_open+0x7e/0xc0 [ 634.051058][T24099] do_syscall_64+0xfd/0x680 [ 634.055552][T24099] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 634.061433][T24099] RIP: 0033:0x413161 [ 634.065330][T24099] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 634.084919][T24099] RSP: 002b:00007f050b165a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 634.093313][T24099] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413161 [ 634.101367][T24099] RDX: 00007f050b165b0a RSI: 0000000000000002 RDI: 00007f050b165b00 [ 634.109341][T24099] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 634.117304][T24099] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 634.125259][T24099] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:23:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:47 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xffffa888], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:23:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:47 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000200)={'nat\x00', 0x0, 0x0, 0x0, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}], 0x0, [{}, {}, {}, {}, {}]}, 0xc8) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x0) 13:23:47 executing program 1 (fault-call:0 fault-nth:11): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:23:47 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='h%s\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 636.529083][T24125] FAULT_INJECTION: forcing a failure. [ 636.529083][T24125] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 636.542392][T24125] CPU: 0 PID: 24125 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 636.550426][T24125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 636.550437][T24125] Call Trace: [ 636.550474][T24125] dump_stack+0x172/0x1f0 [ 636.550504][T24125] should_fail.cold+0xa/0x15 [ 636.550529][T24125] ? fault_create_debugfs_attr+0x1e0/0x1e0 13:23:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:48 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000000200)=""/4096) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4082, 0x0) ioctl$KDSKBMODE(r3, 0x4b45, &(0x7f0000000040)=0x2) [ 636.550552][T24125] ? mark_held_locks+0xf0/0xf0 [ 636.550586][T24125] should_fail_alloc_page+0x50/0x60 [ 636.578960][T24125] __alloc_pages_nodemask+0x1a1/0x8d0 [ 636.594349][T24125] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 636.600024][T24125] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 636.605773][T24125] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 636.611444][T24125] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 636.617729][T24125] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 636.623573][T24125] cache_grow_begin+0x9d/0x650 [ 636.628368][T24125] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 636.628389][T24125] kmem_cache_alloc+0x62a/0x6f0 [ 636.628414][T24125] ? lock_downgrade+0x880/0x880 [ 636.644421][T24125] getname_flags+0xd6/0x5b0 [ 636.648970][T24125] getname+0x1a/0x20 [ 636.652903][T24125] do_sys_open+0x2c9/0x5d0 [ 636.657373][T24125] ? filp_open+0x80/0x80 [ 636.661744][T24125] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 636.667252][T24125] ? do_syscall_64+0x26/0x680 [ 636.672061][T24125] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 636.678182][T24125] ? do_syscall_64+0x26/0x680 [ 636.682904][T24125] __x64_sys_open+0x7e/0xc0 [ 636.687432][T24125] do_syscall_64+0xfd/0x680 [ 636.691970][T24125] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 636.697883][T24125] RIP: 0033:0x413161 [ 636.697902][T24125] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 636.697911][T24125] RSP: 002b:00007f050b165a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 636.697926][T24125] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413161 [ 636.697934][T24125] RDX: 00007f050b165b0a RSI: 0000000000000002 RDI: 00007f050b165b00 [ 636.697942][T24125] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 636.697949][T24125] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 636.697969][T24125] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:23:48 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xffffca88], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:23:48 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='h.s\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:23:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000880)={@empty, @empty, 0x0}, &(0x7f00000008c0)=0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x1f, 0x6, &(0x7f0000000000)=@raw=[@ldst={0x0, 0x1, 0x7, 0x6, 0xd, 0x30}, @generic={0x1, 0x7, 0x507, 0x0, 0x7fffffff}, @ldst={0x2, 0x1, 0x2, 0xe, 0x0, 0xfffffffffffffff8, 0xfffffffffffffffc}, @generic={0x1, 0xde5d, 0xe5cc, 0x9, 0xfd}, @jmp={0x5, 0x3, 0x9, 0x7, 0xf, 0x1, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x9}], &(0x7f0000000140)='GPL\x00', 0x100000001, 0x0, 0x0, 0x41000, 0x3, [], r2, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000900)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000940)={0x1, 0xc, 0x6, 0x100}, 0x10}, 0x70) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0xffffffffffffff0f, &(0x7f0000000440)={&(0x7f00000000c0)=ANY=[@ANYPTR=&(0x7f0000000340)=ANY=[@ANYPTR=&(0x7f0000000200)=ANY=[@ANYPTR64, @ANYBLOB="4d966e30c3169a26dfd36630d50d0bbb8de61b552b4b54e98531b1e9509d17ef1ccb1f930ea5adb0d3e4697cbb49158437885de2c854ab0ca2db565896db245c1bce09671972ca653673ac13b4716bb5c5471abbd88ee11d42d9601165ddcf3fb26c7f30a6e56e2a1f40695683ab1d5d2790efc58c7aa69ab0b10110c887ce83a8951911ecf9cc7fae45110e630032bbd712dac66d74ce55fa8380905777328fc4b188ef7259abec1309173500c055a616dd8110118679dc221f4a44a176506cfd1069bdc32c57d1cd8b4a6801b998c395e5d406bf30c248f09107f9e96d89bef313d2", @ANYRES32=r1, @ANYRESHEX=r0, @ANYRESDEC=r1, @ANYRES64=r0, @ANYRES64, @ANYRES32=0x0], @ANYBLOB="1b6f54d1f963df15452087f85b1a8664049697e5ab05977944a4b7058f837997df340872db55f4bcc675272c7fb95679f977826663b04e45c2975d17429680767c6a325d6b2547e9b196af7e945a574ac495d01a137a0da0af014edb5ea7e2a3013626866ef9a41a4770382cb67251afdbb1701a2213f5567a9a7f5b5d6d307371534ab866032509a4d703c815e32e8a386270371a5ca941cb1f85dd5de0f2851df6b319e77f5664ec3f68a4b8da8ac426b0ac373c35dba535ab", @ANYRES64, @ANYRES64=r0, @ANYRES64=r0, @ANYRESHEX=0x0, @ANYRESHEX=r1], @ANYRES64=r1, @ANYRESDEC=r0, @ANYRESOCT=r0, @ANYBLOB, @ANYRES16=r0, @ANYPTR=&(0x7f0000000480)=ANY=[@ANYRES64=r1, @ANYRES16=r1], @ANYRES64=r1], 0x1}}, 0x0) 13:23:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0b") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:51 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xffffdd86], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:23:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, 0x0, 0x0, 0xf0ff7f) 13:23:51 executing program 1 (fault-call:0 fault-nth:12): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:23:51 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='h/s\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:23:51 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="0000000000000000000000000000a3dd4a2110f7eaac0928728a3526f2bf25cc335e908a64104ba8b9c59acca0d309ce175f120effe5cc1fbff429433fe59ce74cc59fa4adbc0759cf2399754d242348fbee756e50b7b2285cb7ecb97fcd0a614f05000000000000e15418d05a043d3487699a593f8ceac03d6656efe442a788ad97840dce79fffbb600593678d20612c573c30271e36332adf5dd1c0f1b73051d81a02afb141ccfc8c7a1121012729912e0"], 0x1}}, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000040)) lsetxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x0) 13:23:51 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 639.701188][T24175] FAULT_INJECTION: forcing a failure. [ 639.701188][T24175] name failslab, interval 1, probability 0, space 0, times 0 [ 639.755777][T24175] CPU: 0 PID: 24175 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 639.763821][T24175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 639.773922][T24175] Call Trace: [ 639.777249][T24175] dump_stack+0x172/0x1f0 [ 639.781602][T24175] should_fail.cold+0xa/0x15 [ 639.786223][T24175] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 639.792060][T24175] ? ___might_sleep+0x163/0x280 [ 639.796928][T24175] __should_failslab+0x121/0x190 13:23:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, 0x0, 0x0, 0xf0ff7f) 13:23:51 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) ioctl$KDGKBLED(r2, 0x4b64, &(0x7f0000000040)) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x0) [ 639.801882][T24175] should_failslab+0x9/0x14 [ 639.806396][T24175] kmem_cache_alloc+0x2af/0x6f0 [ 639.811256][T24175] ? stack_trace_save+0xac/0xe0 [ 639.816111][T24175] ? stack_trace_consume_entry+0x190/0x190 [ 639.821933][T24175] __alloc_file+0x27/0x300 [ 639.826379][T24175] alloc_empty_file+0x72/0x170 [ 639.831198][T24175] path_openat+0xef/0x46d0 [ 639.835647][T24175] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 639.841471][T24175] ? __lock_acquire+0x54f/0x5490 [ 639.846428][T24175] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 13:23:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, 0x0, 0x0, 0xf0ff7f) [ 639.852520][T24175] ? mark_held_locks+0xf0/0xf0 [ 639.857302][T24175] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 639.862695][T24175] ? cache_grow_end+0xa4/0x190 [ 639.867471][T24175] ? __alloc_fd+0x44d/0x560 [ 639.871988][T24175] do_filp_open+0x1a1/0x280 [ 639.876595][T24175] ? may_open_dev+0x100/0x100 [ 639.881280][T24175] ? lock_downgrade+0x880/0x880 [ 639.886150][T24175] ? kasan_check_read+0x11/0x20 [ 639.891022][T24175] ? do_raw_spin_unlock+0x57/0x270 [ 639.896151][T24175] ? _raw_spin_unlock+0x2d/0x50 [ 639.901026][T24175] ? __alloc_fd+0x44d/0x560 13:23:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8), 0x0, 0xf0ff7f) [ 639.905556][T24175] do_sys_open+0x3fe/0x5d0 [ 639.909985][T24175] ? filp_open+0x80/0x80 [ 639.914241][T24175] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 639.919722][T24175] ? do_syscall_64+0x26/0x680 [ 639.924412][T24175] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 639.930574][T24175] ? do_syscall_64+0x26/0x680 [ 639.935274][T24175] __x64_sys_open+0x7e/0xc0 [ 639.939797][T24175] do_syscall_64+0xfd/0x680 [ 639.944324][T24175] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 639.950224][T24175] RIP: 0033:0x413161 13:23:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8), 0x0, 0xf0ff7f) [ 639.954133][T24175] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 639.973763][T24175] RSP: 002b:00007f050b165a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 639.982200][T24175] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413161 [ 639.990190][T24175] RDX: 00007f050b165b0a RSI: 0000000000000002 RDI: 00007f050b165b00 [ 639.998177][T24175] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 640.006169][T24175] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 640.014155][T24175] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:23:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0b") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8), 0x0, 0xf0ff7f) 13:23:54 executing program 1 (fault-call:0 fault-nth:13): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:23:54 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x58142, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x0) 13:23:54 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='h\\s\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:23:54 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff89], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 642.750366][T24208] FAULT_INJECTION: forcing a failure. [ 642.750366][T24208] name failslab, interval 1, probability 0, space 0, times 0 [ 642.769355][T24208] CPU: 0 PID: 24208 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 642.777368][T24208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 642.787439][T24208] Call Trace: [ 642.790757][T24208] dump_stack+0x172/0x1f0 [ 642.795111][T24208] should_fail.cold+0xa/0x15 [ 642.799730][T24208] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 642.805565][T24208] ? ___might_sleep+0x163/0x280 [ 642.810440][T24208] __should_failslab+0x121/0x190 [ 642.815395][T24208] should_failslab+0x9/0x14 [ 642.819903][T24208] __kmalloc+0x2d9/0x740 [ 642.824169][T24208] ? tomoyo_realpath_from_path+0xc0/0x7a0 [ 642.829903][T24208] ? rcu_read_lock_sched_held+0x110/0x130 [ 642.835810][T24208] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 642.841544][T24208] tomoyo_realpath_from_path+0xcd/0x7a0 [ 642.847096][T24208] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 642.853348][T24208] tomoyo_check_open_permission+0x2a8/0x3f0 [ 642.853366][T24208] ? tomoyo_path_number_perm+0x520/0x520 [ 642.853413][T24208] ? lock_downgrade+0x880/0x880 [ 642.864935][T24208] tomoyo_file_open+0xa9/0xd0 [ 642.864952][T24208] security_file_open+0x71/0x300 [ 642.864973][T24208] do_dentry_open+0x373/0x1250 [ 642.864988][T24208] ? kasan_check_read+0x11/0x20 [ 642.865011][T24208] ? chown_common+0x5c0/0x5c0 [ 642.865028][T24208] ? inode_permission+0xb4/0x560 [ 642.865049][T24208] vfs_open+0xa0/0xd0 [ 642.902720][T24208] path_openat+0x10e9/0x46d0 [ 642.907328][T24208] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 642.913183][T24208] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 642.918585][T24208] ? __alloc_fd+0x44d/0x560 [ 642.923106][T24208] do_filp_open+0x1a1/0x280 [ 642.927629][T24208] ? may_open_dev+0x100/0x100 [ 642.932337][T24208] ? kasan_check_read+0x11/0x20 [ 642.937207][T24208] ? do_raw_spin_unlock+0x57/0x270 [ 642.942337][T24208] ? _raw_spin_unlock+0x2d/0x50 [ 642.947209][T24208] ? __alloc_fd+0x44d/0x560 [ 642.951740][T24208] do_sys_open+0x3fe/0x5d0 [ 642.956187][T24208] ? filp_open+0x80/0x80 [ 642.960460][T24208] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 642.965927][T24208] ? do_syscall_64+0x26/0x680 [ 642.970609][T24208] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 642.976664][T24208] ? do_syscall_64+0x26/0x680 [ 642.981338][T24208] __x64_sys_open+0x7e/0xc0 [ 642.986196][T24208] do_syscall_64+0xfd/0x680 [ 642.990711][T24208] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 642.996599][T24208] RIP: 0033:0x413161 [ 643.000496][T24208] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 643.020566][T24208] RSP: 002b:00007f050b165a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 643.028970][T24208] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413161 [ 643.036951][T24208] RDX: 00007f050b165b0a RSI: 0000000000000002 RDI: 00007f050b165b00 13:23:54 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8d], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:23:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7, 0x105000) ioctl$TCSBRKP(r1, 0x5425, 0x80) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x0) 13:23:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, 0x0, 0x0, &(0x7f00001e1e78)}], 0x1, 0xf0ff7f) [ 643.044914][T24208] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 643.052873][T24208] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 643.060848][T24208] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 [ 643.075739][T24208] ERROR: Out of memory at tomoyo_realpath_from_path. 13:23:54 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:23:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, 0x0, 0x0, &(0x7f00001e1e78)}], 0x1, 0xf0ff7f) 13:23:54 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hf\n\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:23:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0b") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:23:57 executing program 1 (fault-call:0 fault-nth:14): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:23:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x2000, 0x0) ioctl$TIOCMBIS(r2, 0x5416, &(0x7f0000000100)=0xb76) ioctl(r1, 0x1000008910, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x0) 13:23:57 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffffffffff], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:23:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, 0x0, 0x0, &(0x7f00001e1e78)}], 0x1, 0xf0ff7f) 13:23:57 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hf#\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 645.829272][T24262] FAULT_INJECTION: forcing a failure. [ 645.829272][T24262] name failslab, interval 1, probability 0, space 0, times 0 13:23:57 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:23:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80)}], 0x1, 0xf0ff7f) 13:23:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x7ff}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000100)={r2, 0x8}, &(0x7f0000000200)=0x8) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x0) [ 645.987335][T24262] CPU: 1 PID: 24262 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 645.995870][T24262] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 645.995882][T24262] Call Trace: [ 645.995924][T24262] dump_stack+0x172/0x1f0 [ 645.995952][T24262] should_fail.cold+0xa/0x15 [ 645.995976][T24262] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 645.996007][T24262] ? ___might_sleep+0x163/0x280 [ 646.029597][T24262] __should_failslab+0x121/0x190 [ 646.034762][T24262] should_failslab+0x9/0x14 [ 646.034779][T24262] __kmalloc+0x2d9/0x740 [ 646.034799][T24262] ? tomoyo_realpath_from_path+0xc0/0x7a0 [ 646.034824][T24262] ? rcu_read_lock_sched_held+0x110/0x130 [ 646.055553][T24262] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 646.061403][T24262] tomoyo_realpath_from_path+0xcd/0x7a0 [ 646.066991][T24262] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 646.067018][T24262] tomoyo_check_open_permission+0x2a8/0x3f0 [ 646.079532][T24262] ? tomoyo_path_number_perm+0x520/0x520 [ 646.085254][T24262] ? lock_downgrade+0x880/0x880 [ 646.090158][T24262] tomoyo_file_open+0xa9/0xd0 [ 646.094889][T24262] security_file_open+0x71/0x300 [ 646.100059][T24262] do_dentry_open+0x373/0x1250 [ 646.105199][T24262] ? kasan_check_read+0x11/0x20 [ 646.110109][T24262] ? chown_common+0x5c0/0x5c0 [ 646.114920][T24262] ? inode_permission+0xb4/0x560 [ 646.119915][T24262] vfs_open+0xa0/0xd0 [ 646.123945][T24262] path_openat+0x10e9/0x46d0 [ 646.128784][T24262] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 646.134669][T24262] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 646.140093][T24262] ? __alloc_fd+0x44d/0x560 [ 646.144640][T24262] do_filp_open+0x1a1/0x280 [ 646.149403][T24262] ? may_open_dev+0x100/0x100 [ 646.154126][T24262] ? kasan_check_read+0x11/0x20 [ 646.159022][T24262] ? do_raw_spin_unlock+0x57/0x270 [ 646.164725][T24262] ? _raw_spin_unlock+0x2d/0x50 [ 646.169790][T24262] ? __alloc_fd+0x44d/0x560 [ 646.174440][T24262] do_sys_open+0x3fe/0x5d0 [ 646.179102][T24262] ? filp_open+0x80/0x80 [ 646.183490][T24262] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 646.189090][T24262] ? do_syscall_64+0x26/0x680 [ 646.193831][T24262] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 646.200220][T24262] ? do_syscall_64+0x26/0x680 [ 646.204951][T24262] __x64_sys_open+0x7e/0xc0 [ 646.209895][T24262] do_syscall_64+0xfd/0x680 [ 646.214458][T24262] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 646.220391][T24262] RIP: 0033:0x413161 [ 646.224415][T24262] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 646.244573][T24262] RSP: 002b:00007f050b165a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 646.261484][T24262] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413161 [ 646.269767][T24262] RDX: 00007f050b165b0a RSI: 0000000000000002 RDI: 00007f050b165b00 [ 646.277874][T24262] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 13:23:57 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:23:57 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:23:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80)}], 0x1, 0xf0ff7f) [ 646.286146][T24262] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 646.294419][T24262] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 [ 646.314221][T24262] ERROR: Out of memory at tomoyo_realpath_from_path. 13:24:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7b") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:24:00 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="00000080000300000800e6f59421a83cea5d03cfd17da5c2d6821cfbe8597c777016bb419ef654199c0e08665f3ffb75696149f4d0491b2965f151ccfb"], 0x1}}, 0x0) 13:24:00 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hf%\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80)}], 0x1, 0xf0ff7f) 13:24:00 executing program 1 (fault-call:0 fault-nth:15): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:00 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 649.024858][T24315] FAULT_INJECTION: forcing a failure. [ 649.024858][T24315] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 649.038159][T24315] CPU: 0 PID: 24315 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 649.046505][T24315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 649.056598][T24315] Call Trace: [ 649.059934][T24315] dump_stack+0x172/0x1f0 [ 649.064404][T24315] should_fail.cold+0xa/0x15 [ 649.069048][T24315] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 649.075071][T24315] ? lock_downgrade+0x880/0x880 [ 649.079958][T24315] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 649.079981][T24315] should_fail_alloc_page+0x50/0x60 [ 649.079994][T24315] __alloc_pages_nodemask+0x1a1/0x8d0 [ 649.080010][T24315] ? __lock_acquire+0x54f/0x5490 [ 649.080024][T24315] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 649.080057][T24315] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 649.113773][T24315] cache_grow_begin+0x9d/0x650 [ 649.118578][T24315] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 649.125012][T24315] __kmalloc+0x67c/0x740 [ 649.129304][T24315] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 649.135240][T24315] tomoyo_realpath_from_path+0xcd/0x7a0 [ 649.140814][T24315] ? tomoyo_path_number_perm+0x193/0x520 [ 649.146645][T24315] tomoyo_path_number_perm+0x1dd/0x520 [ 649.152138][T24315] ? tomoyo_path_number_perm+0x193/0x520 [ 649.157815][T24315] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 649.163833][T24315] ? debug_check_no_obj_freed+0x200/0x464 [ 649.169696][T24315] ? __fget+0x35a/0x550 [ 649.173904][T24315] ? __fget+0x381/0x550 [ 649.178092][T24315] ? ksys_dup3+0x3e0/0x3e0 [ 649.182764][T24315] tomoyo_file_ioctl+0x23/0x30 [ 649.187654][T24315] security_file_ioctl+0x77/0xc0 [ 649.192725][T24315] ksys_ioctl+0x57/0xd0 [ 649.196917][T24315] __x64_sys_ioctl+0x73/0xb0 [ 649.201630][T24315] do_syscall_64+0xfd/0x680 [ 649.206350][T24315] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 649.212270][T24315] RIP: 0033:0x4590e7 [ 649.216203][T24315] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 649.236022][T24315] RSP: 002b:00007f050b165a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 649.244714][T24315] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004590e7 [ 649.252911][T24315] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 649.261125][T24315] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 13:24:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000240d00080002e6f594"], 0x1}}, 0x0) 13:24:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) [ 649.269341][T24315] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 649.277444][T24315] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:00 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hf*\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:00 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="a2dca505060bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x0) 13:24:00 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7b") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:24:03 executing program 1 (fault-call:0 fault-nth:16): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:03 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="00e69abd9419d0e3431f00000000"], 0x1}}, 0x0) r2 = msgget$private(0x0, 0x80) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000200)={{{@in=@multicast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@empty}}, &(0x7f0000000000)=0xe8) r4 = getegid() r5 = getuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000100)=0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000300)=0x0) r9 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x40, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r9, 0x2405, r9) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r9, 0xc08c5336, &(0x7f0000000400)={0x57, 0xb8a, 0x8000, 'queue0\x00', 0x2}) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000340)={{0xffffffffffffff7f, r3, r4, r5, r6, 0x96, 0xfffffffffffffffe}, 0x20, 0x0, 0xc99, 0x7f, 0x2, 0x80000000, r7, r8}) 13:24:03 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:03 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hf+\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x10000000800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() listen(r2, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x42004) [ 652.032204][T24359] FAULT_INJECTION: forcing a failure. [ 652.032204][T24359] name failslab, interval 1, probability 0, space 0, times 0 [ 652.109810][T24359] CPU: 0 PID: 24359 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 652.118160][T24359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 652.128343][T24359] Call Trace: [ 652.131717][T24359] dump_stack+0x172/0x1f0 [ 652.136090][T24359] should_fail.cold+0xa/0x15 [ 652.140721][T24359] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 652.146569][T24359] ? ___might_sleep+0x163/0x280 [ 652.151545][T24359] __should_failslab+0x121/0x190 [ 652.151566][T24359] should_failslab+0x9/0x14 [ 652.151585][T24359] __kmalloc+0x2d9/0x740 [ 652.161082][T24359] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 652.161100][T24359] ? d_absolute_path+0x11b/0x170 [ 652.161114][T24359] ? __d_path+0x140/0x140 [ 652.161130][T24359] ? tomoyo_encode2.part.0+0xf5/0x400 [ 652.161151][T24359] tomoyo_encode2.part.0+0xf5/0x400 [ 652.191707][T24359] tomoyo_encode+0x2b/0x50 [ 652.196160][T24359] tomoyo_realpath_from_path+0x1d3/0x7a0 [ 652.201829][T24359] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 652.208112][T24359] tomoyo_check_open_permission+0x2a8/0x3f0 [ 652.214027][T24359] ? tomoyo_path_number_perm+0x520/0x520 [ 652.214076][T24359] ? lock_downgrade+0x880/0x880 [ 652.224729][T24359] tomoyo_file_open+0xa9/0xd0 [ 652.224748][T24359] security_file_open+0x71/0x300 [ 652.224771][T24359] do_dentry_open+0x373/0x1250 [ 652.224793][T24359] ? kasan_check_read+0x11/0x20 [ 652.244239][T24359] ? chown_common+0x5c0/0x5c0 [ 652.248948][T24359] ? inode_permission+0xb4/0x560 [ 652.253944][T24359] vfs_open+0xa0/0xd0 [ 652.257958][T24359] path_openat+0x10e9/0x46d0 [ 652.262669][T24359] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 652.269061][T24359] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 652.283352][T24359] ? __alloc_fd+0x44d/0x560 [ 652.287897][T24359] do_filp_open+0x1a1/0x280 [ 652.292437][T24359] ? may_open_dev+0x100/0x100 [ 652.297176][T24359] ? kasan_check_read+0x11/0x20 [ 652.302072][T24359] ? do_raw_spin_unlock+0x57/0x270 [ 652.307220][T24359] ? _raw_spin_unlock+0x2d/0x50 [ 652.312102][T24359] ? __alloc_fd+0x44d/0x560 [ 652.316871][T24359] do_sys_open+0x3fe/0x5d0 [ 652.321344][T24359] ? filp_open+0x80/0x80 [ 652.325626][T24359] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 652.331127][T24359] ? do_syscall_64+0x26/0x680 [ 652.335846][T24359] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 652.341955][T24359] ? do_syscall_64+0x26/0x680 [ 652.346679][T24359] __x64_sys_open+0x7e/0xc0 [ 652.351416][T24359] do_syscall_64+0xfd/0x680 [ 652.355964][T24359] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 652.361887][T24359] RIP: 0033:0x413161 [ 652.366020][T24359] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 652.385657][T24359] RSP: 002b:00007f050b165a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 652.394305][T24359] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000413161 [ 652.402500][T24359] RDX: 00007f050b165b0a RSI: 0000000000000002 RDI: 00007f050b165b00 13:24:03 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:03 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") fcntl$setsig(r0, 0xa, 0x3c) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x0) 13:24:03 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x806000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 652.410750][T24359] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 652.418766][T24359] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 652.427036][T24359] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:03 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@initdev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000040)=0xe8) r4 = accept$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000300)={{{@in=@loopback, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@local}}, &(0x7f0000000400)=0xe8) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000000), 0xc, &(0x7f00000004c0)={&(0x7f0000000440)=@mpls_getnetconf={0x64, 0x52, 0x2, 0x70bd2a, 0x25dfdbfd, {}, [@NETCONFA_IFINDEX={0x8, 0x1, r2}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}, @NETCONFA_IFINDEX={0x8, 0x1, r5}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x40}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x7}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x7}, @NETCONFA_IFINDEX={0x8, 0x1, r6}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x5}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x7}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}]}, 0x64}, 0x1, 0x0, 0x0, 0x40000}, 0x1) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000740)=ANY=[@ANYRESHEX=r0, @ANYRES32=r0, @ANYBLOB="6bca91c8a032de25b3882b0810a4465a54e0bba6a63c62bc3e0d60fd997f308ad07ed2373afedf8ee2fc2587fbd8b43a11ac4f3c86365924ffe0d5e1fa9c14c75c77860c7a64b002781ab09fd9940ecef9c2291ac3353a2111936ba0f6a0391821c3f6de4c27a7a3d6b35a7afe115285da20f0b9c825b5ca57992f1af4fff09deea40282afae7a073cfa1187005d7f2b418fdd19f5832bf61f293219e69fb002631f86efa40997dfbfc7d054ac66461c2fde2b652c9636a37be1c7f2a08c102126b1ed506d0f26c76275b1f69e35c900023400", @ANYRES32=0x0, @ANYPTR64=&(0x7f0000000580)=ANY=[@ANYRESDEC=r4, @ANYRESOCT=0x0, @ANYBLOB="69b2039c088403288841e1a0a8551174cc88ce854f3fa9bc485f21f8112926552c8727ffc737baa1d52e5679c2b48825ae9b83a3fd089a0ab7cf6d05f205489ee95b1644ff144214a4d1a6ac66c1177515621dbc06d443e191a850f4695c1c82df99db8792217a7b47de6ca63e1dc5d8c41dd3c52b3cee758c7f03086ffbbdde5c5c40f1188804ba404f8a47ba050dfbd2223f2a40b29147521b21365a3a2f4e85510bca1034c30b9d2b67399138a43b5e6fffa83eb4ccdb49e95c9f703c53", @ANYRESHEX=r2, @ANYRESHEX=r4], @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYRESDEC=0x0, @ANYRES32=r2, @ANYRES32=r3, @ANYRESDEC=r7, @ANYRESDEC=r2, @ANYRES32=r1, @ANYRES32=r4]]], 0x1}}, 0x0) [ 652.457091][T24359] ERROR: Out of memory at tomoyo_realpath_from_path. 13:24:04 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hf-\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:04 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7b") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:24:06 executing program 1 (fault-call:0 fault-nth:17): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) 13:24:06 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:06 executing program 0: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="40000000000025000400000005007c00000000000000200000000000"], 0x1c) sendfile(r0, r0, &(0x7f0000001000), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x20e, &(0x7f0000000000)=[{}]}, 0x10) 13:24:06 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hf.\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 655.157322][T24423] FAULT_INJECTION: forcing a failure. [ 655.157322][T24423] name failslab, interval 1, probability 0, space 0, times 0 13:24:06 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x1, 0x0) ioctl$KDENABIO(r2, 0x4b36) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x0) [ 655.231174][T24423] CPU: 1 PID: 24423 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 655.239297][T24423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 655.249486][T24423] Call Trace: [ 655.252841][T24423] dump_stack+0x172/0x1f0 [ 655.257869][T24423] should_fail.cold+0xa/0x15 [ 655.262518][T24423] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 655.268382][T24423] ? ___might_sleep+0x163/0x280 [ 655.273280][T24423] __should_failslab+0x121/0x190 13:24:06 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hf/\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 655.278262][T24423] should_failslab+0x9/0x14 [ 655.283716][T24423] __kmalloc+0x2d9/0x740 [ 655.288081][T24423] ? tomoyo_realpath_from_path+0xc0/0x7a0 [ 655.293838][T24423] ? rcu_read_lock_sched_held+0x110/0x130 [ 655.299595][T24423] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 655.305359][T24423] tomoyo_realpath_from_path+0xcd/0x7a0 [ 655.310937][T24423] ? tomoyo_path_number_perm+0x193/0x520 [ 655.316610][T24423] tomoyo_path_number_perm+0x1dd/0x520 [ 655.322105][T24423] ? tomoyo_path_number_perm+0x193/0x520 13:24:06 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x2800000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 655.328075][T24423] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 655.335074][T24423] ? debug_check_no_obj_freed+0x200/0x464 [ 655.341463][T24423] ? __fget+0x35a/0x550 [ 655.346656][T24423] ? __fget+0x381/0x550 [ 655.351401][T24423] ? ksys_dup3+0x3e0/0x3e0 [ 655.355873][T24423] ? do_sys_open+0x31d/0x5d0 [ 655.360646][T24423] tomoyo_file_ioctl+0x23/0x30 [ 655.365519][T24423] security_file_ioctl+0x77/0xc0 [ 655.370491][T24423] ksys_ioctl+0x57/0xd0 [ 655.374693][T24423] __x64_sys_ioctl+0x73/0xb0 [ 655.379474][T24423] do_syscall_64+0xfd/0x680 [ 655.384275][T24423] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 655.391244][T24423] RIP: 0033:0x4590e7 [ 655.395171][T24423] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 655.415323][T24423] RSP: 002b:00007f050b165a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 655.423781][T24423] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004590e7 [ 655.431907][T24423] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 655.440105][T24423] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 655.448129][T24423] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 655.456139][T24423] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 [ 655.465123][T24423] ERROR: Out of memory at tomoyo_realpath_from_path. [ 655.545326][T24444] QAT: Invalid ioctl 13:24:07 executing program 0: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000280)=0x4) shmget(0xffffffffffffffff, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000004c0)) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpriority(0x0, 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000900)) ioctl$sock_SIOCGPGRP(r0, 0x8904, 0x0) gettid() r2 = fcntl$getown(r1, 0x9) getpgrp(r2) fcntl$getown(r1, 0x9) openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x0, 0x0) r3 = getpgid(r2) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x1, {0xccca, 0x107, 0x4, 0x8, 0x7, 0x7e}, 0x2, 0x9}, 0xe) r4 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000000) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, 0x0, 0xfffffd28) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[], 0x8000, 0x400, 0x3ff, 0x10000, 0x26, r3}) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x5, 0x2003, 0xd, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6f, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0x51000, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x0, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$keyring(&(0x7f0000000680)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff9) r6 = add_key$keyring(&(0x7f0000000840)='keyring\x00', &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, r5) r7 = request_key(0x0, &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000240)='keyring&-\x00', r6) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000740)={'syz'}, 0x0, 0x0, r6) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440), 0x0, r7) 13:24:07 executing program 1 (fault-call:0 fault-nth:18): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 655.612470][T24444] QAT: Invalid ioctl 13:24:07 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x2900000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 655.797507][T24461] FAULT_INJECTION: forcing a failure. [ 655.797507][T24461] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 655.810783][T24461] CPU: 0 PID: 24461 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 655.818778][T24461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 655.828850][T24461] Call Trace: [ 655.832168][T24461] dump_stack+0x172/0x1f0 [ 655.836518][T24461] should_fail.cold+0xa/0x15 [ 655.841124][T24461] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 655.847043][T24461] ? lock_downgrade+0x880/0x880 [ 655.852285][T24461] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 655.858545][T24461] should_fail_alloc_page+0x50/0x60 [ 655.863760][T24461] __alloc_pages_nodemask+0x1a1/0x8d0 [ 655.869143][T24461] ? __lock_acquire+0x54f/0x5490 [ 655.874098][T24461] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 655.879865][T24461] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 655.885688][T24461] cache_grow_begin+0x9d/0x650 [ 655.890471][T24461] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 655.896729][T24461] __kmalloc+0x67c/0x740 [ 655.900986][T24461] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 655.906714][T24461] tomoyo_realpath_from_path+0xcd/0x7a0 [ 655.912277][T24461] ? tomoyo_path_number_perm+0x193/0x520 [ 655.917924][T24461] tomoyo_path_number_perm+0x1dd/0x520 [ 655.923387][T24461] ? tomoyo_path_number_perm+0x193/0x520 [ 655.929030][T24461] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 655.934842][T24461] ? debug_check_no_obj_freed+0x200/0x464 [ 655.940773][T24461] ? __fget+0x35a/0x550 [ 655.944946][T24461] ? __fget+0x381/0x550 [ 655.949106][T24461] ? ksys_dup3+0x3e0/0x3e0 [ 655.953535][T24461] ? do_sys_open+0x31d/0x5d0 [ 655.958135][T24461] tomoyo_file_ioctl+0x23/0x30 [ 655.962913][T24461] security_file_ioctl+0x77/0xc0 [ 655.967856][T24461] ksys_ioctl+0x57/0xd0 [ 655.972019][T24461] __x64_sys_ioctl+0x73/0xb0 [ 655.976618][T24461] do_syscall_64+0xfd/0x680 [ 655.981135][T24461] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 655.987033][T24461] RIP: 0033:0x4590e7 [ 655.990929][T24461] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 656.010564][T24461] RSP: 002b:00007f050b165a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 656.019170][T24461] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004590e7 [ 656.027184][T24461] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 656.035172][T24461] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 656.043151][T24461] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 656.051140][T24461] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be0") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:24:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f00000000c0)=0x240000000000, &(0x7f0000000100)=0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r3 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0xa0080) ioctl$RTC_UIE_OFF(r3, 0x7004) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x0) 13:24:09 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hf0\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:09 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x2b00000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:09 executing program 1 (fault-call:0 fault-nth:19): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:09 executing program 0: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c65, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x400, 0x0) read$FUSE(r0, &(0x7f0000000600), 0x1000) 13:24:09 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x2c00000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 658.309212][T24479] FAULT_INJECTION: forcing a failure. [ 658.309212][T24479] name failslab, interval 1, probability 0, space 0, times 0 [ 658.393491][T24479] CPU: 0 PID: 24479 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 658.401555][T24479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 658.411643][T24479] Call Trace: [ 658.414981][T24479] dump_stack+0x172/0x1f0 [ 658.419368][T24479] should_fail.cold+0xa/0x15 [ 658.424018][T24479] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 658.429867][T24479] ? ___might_sleep+0x163/0x280 [ 658.434758][T24479] __should_failslab+0x121/0x190 [ 658.439732][T24479] should_failslab+0x9/0x14 [ 658.444269][T24479] __kmalloc+0x2d9/0x740 [ 658.448545][T24479] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 658.454847][T24479] ? d_absolute_path+0x11b/0x170 [ 658.459811][T24479] ? __d_path+0x140/0x140 [ 658.459828][T24479] ? tomoyo_encode2.part.0+0xf5/0x400 [ 658.459845][T24479] tomoyo_encode2.part.0+0xf5/0x400 [ 658.459869][T24479] tomoyo_encode+0x2b/0x50 [ 658.474807][T24479] tomoyo_realpath_from_path+0x1d3/0x7a0 [ 658.474833][T24479] tomoyo_path_number_perm+0x1dd/0x520 [ 658.474846][T24479] ? tomoyo_path_number_perm+0x193/0x520 [ 658.474864][T24479] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 658.474889][T24479] ? debug_check_no_obj_freed+0x200/0x464 [ 658.507600][T24479] ? __fget+0x35a/0x550 [ 658.511807][T24479] ? __fget+0x381/0x550 [ 658.516003][T24479] ? ksys_dup3+0x3e0/0x3e0 [ 658.520462][T24479] ? do_sys_open+0x31d/0x5d0 [ 658.525089][T24479] tomoyo_file_ioctl+0x23/0x30 [ 658.529897][T24479] security_file_ioctl+0x77/0xc0 [ 658.534873][T24479] ksys_ioctl+0x57/0xd0 [ 658.539060][T24479] __x64_sys_ioctl+0x73/0xb0 [ 658.543681][T24479] do_syscall_64+0xfd/0x680 [ 658.548224][T24479] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 658.554145][T24479] RIP: 0033:0x4590e7 [ 658.558063][T24479] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 658.577692][T24479] RSP: 002b:00007f050b165a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 658.586137][T24479] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004590e7 13:24:09 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xff, 0x40) ioctl$UI_BEGIN_FF_ERASE(r2, 0xc00c55ca, &(0x7f0000000040)={0x4, 0x100, 0x3}) openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video35\x00', 0x2, 0x0) 13:24:10 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5050000cfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x0) 13:24:10 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x2f00000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:10 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/pid\x00') [ 658.594136][T24479] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 658.602130][T24479] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 658.610238][T24479] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 658.618247][T24479] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:10 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e23, 0xfe2, @loopback, 0xc5}}, [0x1, 0x4, 0xfffffffffffffffb, 0x4, 0x0, 0x0, 0x2, 0x6, 0xdc36, 0x6, 0x8, 0x1, 0x5, 0x2, 0x3f]}, &(0x7f00000000c0)=0x100) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f00000001c0)={0x6}, 0x4) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000100)={r1, 0x2}, &(0x7f0000000300)=0x8) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000340)=""/73) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) memfd_create(&(0x7f0000000000)='eth1,self,eth0trustedtrustedvmnet0\x00', 0x4) [ 658.662877][T24479] ERROR: Out of memory at tomoyo_realpath_from_path. 13:24:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be0") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:24:12 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x3c00000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:12 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfX\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:12 executing program 0: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x800) socket$nl_generic(0x10, 0x3, 0x10) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) flistxattr(r0, 0x0, 0x0) 13:24:12 executing program 1 (fault-call:0 fault-nth:20): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:12 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000200)=@v2={0x2000000, [{0x34, 0x8001}, {0x3}]}, 0x14, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x4001, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r2, 0x40206417, &(0x7f00000000c0)={0xa5, 0xff, 0xac, 0x2, 0x4, 0xfffffffffffffffe}) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x141000, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="42be641415e80034f0030000080002e6e594000000005c7cd7e10000000000"], 0x1}}, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x8) [ 661.382725][T24525] FAULT_INJECTION: forcing a failure. [ 661.382725][T24525] name failslab, interval 1, probability 0, space 0, times 0 [ 661.415363][T24525] CPU: 0 PID: 24525 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 661.423426][T24525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 661.433509][T24525] Call Trace: [ 661.436853][T24525] dump_stack+0x172/0x1f0 [ 661.441246][T24525] should_fail.cold+0xa/0x15 [ 661.445893][T24525] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 661.451755][T24525] ? ___might_sleep+0x163/0x280 [ 661.456657][T24525] __should_failslab+0x121/0x190 [ 661.461635][T24525] ? loop_info64_to_compat+0x6d0/0x6d0 [ 661.467121][T24525] should_failslab+0x9/0x14 [ 661.471658][T24525] kmem_cache_alloc_trace+0x2ce/0x750 [ 661.477071][T24525] ? lockdep_init_map+0x1be/0x6d0 13:24:12 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 661.482138][T24525] ? loop_info64_to_compat+0x6d0/0x6d0 [ 661.487633][T24525] __kthread_create_on_node+0xf2/0x460 [ 661.493097][T24525] ? lock_acquire+0x16f/0x3f0 [ 661.497868][T24525] ? kthread_parkme+0xb0/0xb0 [ 661.502577][T24525] ? mutex_trylock+0x1e0/0x1e0 [ 661.507385][T24525] ? loop_info64_to_compat+0x6d0/0x6d0 [ 661.512852][T24525] kthread_create_on_node+0xbb/0xf0 [ 661.518149][T24525] ? __kthread_create_on_node+0x460/0x460 [ 661.523916][T24525] ? lockdep_init_map+0x1be/0x6d0 [ 661.528980][T24525] ? lockdep_init_map+0x1be/0x6d0 [ 661.534019][T24525] loop_set_fd+0x342/0x10b0 [ 661.538527][T24525] ? find_held_lock+0x35/0x130 [ 661.543302][T24525] lo_ioctl+0x1a3/0x1460 [ 661.547553][T24525] ? lock_downgrade+0x880/0x880 [ 661.552410][T24525] ? loop_set_fd+0x10b0/0x10b0 [ 661.557188][T24525] blkdev_ioctl+0xece/0x1c10 [ 661.561793][T24525] ? blkpg_ioctl+0xa90/0xa90 [ 661.566430][T24525] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 661.572292][T24525] ? __fget+0x35a/0x550 [ 661.576469][T24525] block_ioctl+0xee/0x130 [ 661.580803][T24525] ? blkdev_fallocate+0x410/0x410 [ 661.585854][T24525] do_vfs_ioctl+0xd5f/0x1380 [ 661.590474][T24525] ? ioctl_preallocate+0x210/0x210 [ 661.595629][T24525] ? __fget+0x381/0x550 [ 661.599812][T24525] ? ksys_dup3+0x3e0/0x3e0 [ 661.604236][T24525] ? do_sys_open+0x31d/0x5d0 [ 661.608841][T24525] ? tomoyo_file_ioctl+0x23/0x30 [ 661.613786][T24525] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 661.620055][T24525] ? security_file_ioctl+0x8d/0xc0 [ 661.625231][T24525] ksys_ioctl+0xab/0xd0 [ 661.629421][T24525] __x64_sys_ioctl+0x73/0xb0 [ 661.634036][T24525] do_syscall_64+0xfd/0x680 [ 661.638575][T24525] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 661.644474][T24525] RIP: 0033:0x4590e7 [ 661.648391][T24525] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 661.668011][T24525] RSP: 002b:00007f050b165a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 661.676438][T24525] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004590e7 13:24:13 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7fffffff, 0x20000) recvmsg$kcm(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000000c0)=""/96, 0x60}, {&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000200)=""/241, 0xf1}], 0x3, &(0x7f0000000340)=""/161, 0xa1}, 0x10040) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000440)={0x0, 0x82, "c2908fc92cc2ec53bcb2084df77192291ba0803d2c2bd9365b0309be5daa757c8720fbc482c4763638b7fa8ff015a9c23e271185c591c0cddf852b9e42579c3656acb9b6ff5aa8839c3b4febca01c8ddfbac7ffa21f3f8b17db4fecb4853f38493728c7116f660ca6e625cdedc74f36c3d69a0d98bc3d19f564b5fc5f4c1e514538f"}, &(0x7f0000000500)=0x8a) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000540)={0xffffffffffffffe1, 0x8, 0x200, 0x53fe, 0x7, 0x7fffffff, 0xf74c, 0x8, r3}, 0x20) ioctl(r2, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0xffffff65, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x0) [ 661.684411][T24525] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 661.692386][T24525] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 661.700360][T24525] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 661.708337][T24525] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:13 executing program 0: recvmmsg(0xffffffffffffff9c, &(0x7f0000008740)=[{{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000006ec0)=""/134, 0x86}, {0x0}, {0x0}, {0x0}, {&(0x7f0000007040)=""/155, 0x9b}], 0x5}}], 0x1, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) sched_setscheduler(0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x4cc, 0xfff6) 13:24:13 executing program 1 (fault-call:0 fault-nth:21): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:13 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x4305000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="c0dca5055e0bcfec7be070") flistxattr(r1, &(0x7f0000000080)=""/59, 0x3b) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x0) getsockopt$inet_buf(r1, 0x0, 0x20, &(0x7f0000000000)=""/2, &(0x7f0000000040)=0x2) [ 662.051596][T24551] FAULT_INJECTION: forcing a failure. [ 662.051596][T24551] name failslab, interval 1, probability 0, space 0, times 0 [ 662.119755][T24551] CPU: 0 PID: 24551 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 662.127813][T24551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 662.138013][T24551] Call Trace: [ 662.141351][T24551] dump_stack+0x172/0x1f0 [ 662.145732][T24551] should_fail.cold+0xa/0x15 [ 662.150375][T24551] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 662.156239][T24551] ? ___might_sleep+0x163/0x280 [ 662.161149][T24551] __should_failslab+0x121/0x190 [ 662.166154][T24551] should_failslab+0x9/0x14 [ 662.170712][T24551] kmem_cache_alloc+0x2af/0x6f0 [ 662.175608][T24551] ? lock_downgrade+0x880/0x880 [ 662.180506][T24551] ? kasan_check_read+0x11/0x20 [ 662.185402][T24551] __kernfs_new_node+0xf0/0x6c0 [ 662.190399][T24551] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 662.195956][T24551] ? wait_for_completion+0x440/0x440 [ 662.201321][T24551] ? mutex_unlock+0xd/0x10 [ 662.205811][T24551] ? kernfs_activate+0x192/0x1f0 [ 662.210798][T24551] kernfs_new_node+0x96/0x120 [ 662.215609][T24551] __kernfs_create_file+0x51/0x340 [ 662.220771][T24551] sysfs_add_file_mode_ns+0x222/0x560 [ 662.226197][T24551] internal_create_group+0x359/0xc40 [ 662.231535][T24551] ? remove_files.isra.0+0x190/0x190 [ 662.236866][T24551] ? bd_set_size+0x3f/0xb0 [ 662.241326][T24551] ? kasan_check_write+0x14/0x20 [ 662.246299][T24551] ? up_write+0xbe/0x1e0 [ 662.250584][T24551] sysfs_create_group+0x20/0x30 [ 662.255473][T24551] loop_set_fd+0xb11/0x10b0 [ 662.260023][T24551] lo_ioctl+0x1a3/0x1460 [ 662.264307][T24551] ? lock_downgrade+0x880/0x880 [ 662.269308][T24551] ? loop_set_fd+0x10b0/0x10b0 [ 662.283449][T24551] blkdev_ioctl+0xece/0x1c10 [ 662.288086][T24551] ? blkpg_ioctl+0xa90/0xa90 [ 662.292722][T24551] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 662.298585][T24551] ? __fget+0x35a/0x550 [ 662.302786][T24551] block_ioctl+0xee/0x130 [ 662.307146][T24551] ? blkdev_fallocate+0x410/0x410 [ 662.312228][T24551] do_vfs_ioctl+0xd5f/0x1380 [ 662.316851][T24551] ? ioctl_preallocate+0x210/0x210 [ 662.322001][T24551] ? __fget+0x381/0x550 [ 662.326235][T24551] ? ksys_dup3+0x3e0/0x3e0 [ 662.330691][T24551] ? tomoyo_file_ioctl+0x23/0x30 [ 662.335691][T24551] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 662.341972][T24551] ? security_file_ioctl+0x8d/0xc0 [ 662.347122][T24551] ksys_ioctl+0xab/0xd0 [ 662.351324][T24551] __x64_sys_ioctl+0x73/0xb0 [ 662.355951][T24551] do_syscall_64+0xfd/0x680 [ 662.360487][T24551] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 662.366410][T24551] RIP: 0033:0x4590e7 [ 662.370405][T24551] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 662.390022][T24551] RSP: 002b:00007f050b165a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 662.398520][T24551] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004590e7 [ 662.406492][T24551] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 662.414463][T24551] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 662.422424][T24551] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 662.430471][T24551] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be0") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:24:15 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hf\\\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:15 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:15 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="0000008000030000080002e6f59413594fc0165ba4ab3b0f2451246f41272e4d1c38d5383bc9ce98140c50f6fc5786b7d994bd16dafbed512ec833c628d38f9839325f12fcdb6352677cb14bd1cf001edbee7463ef7d1d3e08a8beaec1030049e9894e12873c974c14d974a3b0efcbe714d956b238208f48f641db04"], 0x1}}, 0x200) 13:24:15 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x100000000000082, 0x0) read(r0, &(0x7f0000000200)=""/182, 0xb6) write$FUSE_ATTR(r0, &(0x7f0000000100)={0x78, 0x0, 0x1, {0x8000000000000007, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}}, 0x78) 13:24:15 executing program 1 (fault-call:0 fault-nth:22): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:15 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x5800000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 664.496845][T24575] FAULT_INJECTION: forcing a failure. [ 664.496845][T24575] name failslab, interval 1, probability 0, space 0, times 0 [ 664.518090][T24575] CPU: 0 PID: 24575 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 664.526119][T24575] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 664.536201][T24575] Call Trace: [ 664.539523][T24575] dump_stack+0x172/0x1f0 13:24:16 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40000, 0x0) ioctl$CAPI_INSTALLED(r2, 0x80024322) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0000008000030000080002e6f594"], 0x1}}, 0x0) [ 664.543884][T24575] should_fail.cold+0xa/0x15 [ 664.548498][T24575] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 664.554310][T24575] ? ___might_sleep+0x163/0x280 [ 664.559152][T24575] __should_failslab+0x121/0x190 [ 664.564087][T24575] should_failslab+0x9/0x14 [ 664.568576][T24575] kmem_cache_alloc+0x2af/0x6f0 [ 664.573424][T24575] ? find_held_lock+0x35/0x130 [ 664.578197][T24575] ? kernfs_activate+0x192/0x1f0 [ 664.583126][T24575] __kernfs_new_node+0xf0/0x6c0 [ 664.587979][T24575] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 664.593437][T24575] ? lock_downgrade+0x880/0x880 [ 664.598289][T24575] ? kasan_check_write+0x14/0x20 [ 664.603213][T24575] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 664.608748][T24575] ? wait_for_completion+0x440/0x440 [ 664.614022][T24575] kernfs_new_node+0x96/0x120 [ 664.618687][T24575] __kernfs_create_file+0x51/0x340 [ 664.623789][T24575] sysfs_add_file_mode_ns+0x222/0x560 [ 664.629278][T24575] internal_create_group+0x359/0xc40 [ 664.634575][T24575] ? remove_files.isra.0+0x190/0x190 [ 664.639843][T24575] ? bd_set_size+0x3f/0xb0 [ 664.644245][T24575] ? kasan_check_write+0x14/0x20 [ 664.649171][T24575] ? up_write+0xbe/0x1e0 [ 664.653402][T24575] sysfs_create_group+0x20/0x30 [ 664.658258][T24575] loop_set_fd+0xb11/0x10b0 [ 664.662788][T24575] lo_ioctl+0x1a3/0x1460 [ 664.667027][T24575] ? lock_downgrade+0x880/0x880 [ 664.671870][T24575] ? loop_set_fd+0x10b0/0x10b0 [ 664.676629][T24575] blkdev_ioctl+0xece/0x1c10 [ 664.681209][T24575] ? blkpg_ioctl+0xa90/0xa90 [ 664.685786][T24575] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 664.691583][T24575] ? __fget+0x35a/0x550 [ 664.695728][T24575] block_ioctl+0xee/0x130 [ 664.700043][T24575] ? blkdev_fallocate+0x410/0x410 [ 664.705059][T24575] do_vfs_ioctl+0xd5f/0x1380 [ 664.709652][T24575] ? ioctl_preallocate+0x210/0x210 [ 664.714746][T24575] ? __fget+0x381/0x550 [ 664.718886][T24575] ? ksys_dup3+0x3e0/0x3e0 [ 664.723299][T24575] ? tomoyo_file_ioctl+0x23/0x30 [ 664.728223][T24575] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 664.734452][T24575] ? security_file_ioctl+0x8d/0xc0 [ 664.739550][T24575] ksys_ioctl+0xab/0xd0 [ 664.743740][T24575] __x64_sys_ioctl+0x73/0xb0 [ 664.748322][T24575] do_syscall_64+0xfd/0x680 [ 664.752832][T24575] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 664.758712][T24575] RIP: 0033:0x4590e7 [ 664.762696][T24575] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 664.782296][T24575] RSP: 002b:00007f050b165a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 13:24:16 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x100000000000082, 0x0) read(r0, &(0x7f0000000200)=""/182, 0xb6) write$FUSE_ATTR(r0, &(0x7f0000000100)={0x78, 0x0, 0x1, {0x8000000000000007, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x302}}}, 0x78) [ 664.790705][T24575] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004590e7 [ 664.798678][T24575] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 664.806652][T24575] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 664.814621][T24575] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 664.822596][T24575] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:16 executing program 1 (fault-call:0 fault-nth:23): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:16 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfc\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:16 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000700)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c000000030000000c0000000000000b0200000004000000000000090500000010000000000000020000000000000000000000030000000005000000010000009800000000610073efcf80ff47"], 0x0, 0x5d}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={0xffffffffffffff9c, 0x0, 0x0}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={r0, 0x10, &(0x7f0000000680)={&(0x7f0000000240)=""/148, 0x94}}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000940)={0xffffffffffffff9c}) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x40001, 0x0) r2 = socket$kcm(0x29, 0x0, 0x0) r3 = socket$kcm(0x10, 0x3, 0x0) setsockopt$sock_attach_bpf(r3, 0x10e, 0xc, 0x0, 0x0) socketpair(0x0, 0x2, 0x101, 0x0) r4 = socket$kcm(0x2, 0x2, 0x0) r5 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) openat$cgroup_ro(r2, &(0x7f0000000080)='pids.events\x00', 0x0, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, 0x0, 0x0) r6 = socket$kcm(0x2, 0x4, 0x2) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x80000000000, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x2, 0x300) socketpair(0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r6, 0x2401, 0x0) write$cgroup_int(r7, &(0x7f0000000000), 0xa7) [ 665.107031][T24599] FAULT_INJECTION: forcing a failure. [ 665.107031][T24599] name failslab, interval 1, probability 0, space 0, times 0 [ 665.125073][T24599] CPU: 1 PID: 24599 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 665.133086][T24599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 665.143157][T24599] Call Trace: [ 665.146606][T24599] dump_stack+0x172/0x1f0 [ 665.151219][T24599] should_fail.cold+0xa/0x15 [ 665.155826][T24599] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 665.161629][T24599] ? ___might_sleep+0x163/0x280 [ 665.166491][T24599] __should_failslab+0x121/0x190 [ 665.171458][T24599] should_failslab+0x9/0x14 [ 665.175986][T24599] kmem_cache_alloc+0x2af/0x6f0 [ 665.180840][T24599] ? find_held_lock+0x35/0x130 [ 665.185597][T24599] ? kernfs_activate+0x192/0x1f0 [ 665.190543][T24599] __kernfs_new_node+0xf0/0x6c0 [ 665.195468][T24599] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 665.200938][T24599] ? lock_downgrade+0x880/0x880 [ 665.205817][T24599] ? kasan_check_write+0x14/0x20 [ 665.210773][T24599] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 665.216346][T24599] ? wait_for_completion+0x440/0x440 [ 665.221658][T24599] kernfs_new_node+0x96/0x120 [ 665.226365][T24599] __kernfs_create_file+0x51/0x340 [ 665.231500][T24599] sysfs_add_file_mode_ns+0x222/0x560 [ 665.236903][T24599] internal_create_group+0x359/0xc40 [ 665.242217][T24599] ? remove_files.isra.0+0x190/0x190 [ 665.247523][T24599] ? bd_set_size+0x3f/0xb0 [ 665.251956][T24599] ? kasan_check_write+0x14/0x20 [ 665.256899][T24599] ? up_write+0xbe/0x1e0 [ 665.256923][T24599] sysfs_create_group+0x20/0x30 [ 665.256943][T24599] loop_set_fd+0xb11/0x10b0 [ 665.256965][T24599] lo_ioctl+0x1a3/0x1460 [ 665.266207][T24599] ? lock_downgrade+0x880/0x880 [ 665.266230][T24599] ? loop_set_fd+0x10b0/0x10b0 [ 665.266251][T24599] blkdev_ioctl+0xece/0x1c10 [ 665.266273][T24599] ? blkpg_ioctl+0xa90/0xa90 [ 665.275023][T24599] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 665.275051][T24599] ? __fget+0x35a/0x550 [ 665.275080][T24599] block_ioctl+0xee/0x130 [ 665.275104][T24599] ? blkdev_fallocate+0x410/0x410 [ 665.285540][T24599] do_vfs_ioctl+0xd5f/0x1380 [ 665.285562][T24599] ? ioctl_preallocate+0x210/0x210 [ 665.285576][T24599] ? __fget+0x381/0x550 [ 665.285595][T24599] ? ksys_dup3+0x3e0/0x3e0 [ 665.285618][T24599] ? tomoyo_file_ioctl+0x23/0x30 [ 665.294786][T24599] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 665.294814][T24599] ? security_file_ioctl+0x8d/0xc0 [ 665.294832][T24599] ksys_ioctl+0xab/0xd0 [ 665.294851][T24599] __x64_sys_ioctl+0x73/0xb0 [ 665.304804][T24599] do_syscall_64+0xfd/0x680 [ 665.304828][T24599] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 665.304841][T24599] RIP: 0033:0x4590e7 [ 665.304857][T24599] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 665.304872][T24599] RSP: 002b:00007f050b165a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 665.314214][T24599] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004590e7 [ 665.314222][T24599] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 665.314229][T24599] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 665.314237][T24599] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 665.314244][T24599] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 [ 665.479654][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 665.485569][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:24:19 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:19 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r2 = accept(r0, &(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, &(0x7f0000000040)=0x80) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000140)=0x63, 0x2) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[]}}, 0x0) 13:24:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x0, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:24:19 executing program 1 (fault-call:0 fault-nth:24): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:19 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) write$FUSE_ENTRY(r0, &(0x7f0000000280)={0x90, 0x0, 0x2}, 0x90) 13:24:19 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfd\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 667.930308][T24639] FAULT_INJECTION: forcing a failure. [ 667.930308][T24639] name failslab, interval 1, probability 0, space 0, times 0 [ 667.972760][T24639] CPU: 1 PID: 24639 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 667.980821][T24639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 667.990904][T24639] Call Trace: [ 667.994239][T24639] dump_stack+0x172/0x1f0 [ 667.998613][T24639] should_fail.cold+0xa/0x15 [ 668.003239][T24639] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 668.009129][T24639] ? ___might_sleep+0x163/0x280 [ 668.014035][T24639] __should_failslab+0x121/0x190 [ 668.019004][T24639] should_failslab+0x9/0x14 [ 668.023598][T24639] kmem_cache_alloc+0x2af/0x6f0 [ 668.028484][T24639] ? lock_downgrade+0x880/0x880 [ 668.033369][T24639] ? kasan_check_read+0x11/0x20 [ 668.038273][T24639] __kernfs_new_node+0xf0/0x6c0 [ 668.043170][T24639] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 668.048679][T24639] ? wait_for_completion+0x440/0x440 [ 668.054009][T24639] ? mutex_unlock+0xd/0x10 [ 668.058455][T24639] ? kernfs_activate+0x192/0x1f0 [ 668.063431][T24639] kernfs_new_node+0x96/0x120 [ 668.068139][T24639] __kernfs_create_file+0x51/0x340 [ 668.073283][T24639] sysfs_add_file_mode_ns+0x222/0x560 [ 668.078693][T24639] internal_create_group+0x359/0xc40 [ 668.084016][T24639] ? remove_files.isra.0+0x190/0x190 [ 668.089372][T24639] ? bd_set_size+0x3f/0xb0 [ 668.093837][T24639] ? kasan_check_write+0x14/0x20 [ 668.098796][T24639] ? up_write+0xbe/0x1e0 [ 668.103072][T24639] sysfs_create_group+0x20/0x30 [ 668.107952][T24639] loop_set_fd+0xb11/0x10b0 [ 668.112483][T24639] lo_ioctl+0x1a3/0x1460 [ 668.116772][T24639] ? lock_downgrade+0x880/0x880 [ 668.121643][T24639] ? loop_set_fd+0x10b0/0x10b0 [ 668.126450][T24639] blkdev_ioctl+0xece/0x1c10 [ 668.131063][T24639] ? blkpg_ioctl+0xa90/0xa90 [ 668.135678][T24639] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 668.141524][T24639] ? __fget+0x35a/0x550 [ 668.145715][T24639] block_ioctl+0xee/0x130 [ 668.150065][T24639] ? blkdev_fallocate+0x410/0x410 [ 668.155123][T24639] do_vfs_ioctl+0xd5f/0x1380 [ 668.159740][T24639] ? ioctl_preallocate+0x210/0x210 [ 668.164879][T24639] ? __fget+0x381/0x550 [ 668.169059][T24639] ? ksys_dup3+0x3e0/0x3e0 [ 668.173508][T24639] ? do_sys_open+0x31d/0x5d0 [ 668.178126][T24639] ? tomoyo_file_ioctl+0x23/0x30 [ 668.183094][T24639] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 668.189401][T24639] ? security_file_ioctl+0x8d/0xc0 [ 668.194579][T24639] ksys_ioctl+0xab/0xd0 [ 668.198778][T24639] __x64_sys_ioctl+0x73/0xb0 [ 668.203404][T24639] do_syscall_64+0xfd/0x680 [ 668.207973][T24639] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 668.213911][T24639] RIP: 0033:0x4590e7 [ 668.217830][T24639] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 668.237566][T24639] RSP: 002b:00007f050b165a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 668.246014][T24639] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004590e7 [ 668.254053][T24639] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 668.262049][T24639] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 13:24:19 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x800e000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:19 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="00000000b5777ebbc5120805001d5704e8284ff4e463db143edcee26"], 0x1}}, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='\x00', 0x0, 0x4) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f00000000c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000100)={'vcan0\x00', r3}) [ 668.270186][T24639] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 668.278861][T24639] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x0, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:24:19 executing program 1 (fault-call:0 fault-nth:25): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:20 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x8035000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:20 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000280)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000100)={0x0, 0x0, 0x69c4}) ioctl$CAPI_REGISTER(r0, 0x400c4301, 0x0) 13:24:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x0, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:24:20 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfi\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 668.699325][T24674] FAULT_INJECTION: forcing a failure. [ 668.699325][T24674] name failslab, interval 1, probability 0, space 0, times 0 [ 668.712550][T24674] CPU: 1 PID: 24674 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 668.720572][T24674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 668.730655][T24674] Call Trace: [ 668.733993][T24674] dump_stack+0x172/0x1f0 [ 668.738371][T24674] should_fail.cold+0xa/0x15 [ 668.743007][T24674] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 668.748860][T24674] ? ___might_sleep+0x163/0x280 [ 668.753760][T24674] __should_failslab+0x121/0x190 [ 668.758725][T24674] should_failslab+0x9/0x14 [ 668.763266][T24674] kmem_cache_alloc+0x2af/0x6f0 [ 668.768352][T24674] ? lock_downgrade+0x880/0x880 [ 668.773242][T24674] ? kasan_check_read+0x11/0x20 [ 668.778139][T24674] __kernfs_new_node+0xf0/0x6c0 [ 668.783014][T24674] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 668.788490][T24674] ? wait_for_completion+0x440/0x440 [ 668.793907][T24674] ? mutex_unlock+0xd/0x10 [ 668.798345][T24674] ? kernfs_activate+0x192/0x1f0 [ 668.803313][T24674] kernfs_new_node+0x96/0x120 [ 668.808007][T24674] __kernfs_create_file+0x51/0x340 [ 668.813151][T24674] sysfs_add_file_mode_ns+0x222/0x560 [ 668.818551][T24674] internal_create_group+0x359/0xc40 [ 668.823857][T24674] ? remove_files.isra.0+0x190/0x190 [ 668.829151][T24674] ? bd_set_size+0x3f/0xb0 [ 668.833601][T24674] ? kasan_check_write+0x14/0x20 [ 668.838570][T24674] ? up_write+0xbe/0x1e0 [ 668.842834][T24674] sysfs_create_group+0x20/0x30 [ 668.847708][T24674] loop_set_fd+0xb11/0x10b0 [ 668.852246][T24674] lo_ioctl+0x1a3/0x1460 [ 668.856546][T24674] ? lock_downgrade+0x880/0x880 [ 668.861411][T24674] ? loop_set_fd+0x10b0/0x10b0 [ 668.866224][T24674] blkdev_ioctl+0xece/0x1c10 [ 668.871025][T24674] ? blkpg_ioctl+0xa90/0xa90 [ 668.876530][T24674] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 668.882366][T24674] ? __fget+0x35a/0x550 [ 668.886562][T24674] block_ioctl+0xee/0x130 [ 668.890909][T24674] ? blkdev_fallocate+0x410/0x410 [ 668.896100][T24674] do_vfs_ioctl+0xd5f/0x1380 [ 668.900752][T24674] ? ioctl_preallocate+0x210/0x210 [ 668.905965][T24674] ? __fget+0x381/0x550 [ 668.910151][T24674] ? ksys_dup3+0x3e0/0x3e0 [ 668.914613][T24674] ? tomoyo_file_ioctl+0x23/0x30 [ 668.919594][T24674] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 668.925881][T24674] ? security_file_ioctl+0x8d/0xc0 [ 668.931019][T24674] ksys_ioctl+0xab/0xd0 [ 668.935198][T24674] __x64_sys_ioctl+0x73/0xb0 [ 668.939802][T24674] do_syscall_64+0xfd/0x680 [ 668.944342][T24674] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 668.950253][T24674] RIP: 0033:0x4590e7 [ 668.954213][T24674] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 668.973844][T24674] RSP: 002b:00007f050b165a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 668.982276][T24674] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004590e7 [ 668.990260][T24674] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 13:24:20 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x8100000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 668.998276][T24674] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 669.006281][T24674] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 669.014270][T24674] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:20 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001540), 0x1000) stat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e, 0x0, 0xfffffffffffffffe}}, 0x50) read$FUSE(r0, &(0x7f0000000540), 0x1000) write$FUSE_ENTRY(r0, &(0x7f0000000280)={0x90, 0x0, 0x2, {0x1, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c0f}}}, 0x90) 13:24:20 executing program 1 (fault-call:0 fault-nth:26): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:20 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:20 executing program 4: 13:24:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x0, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:24:20 executing program 4: 13:24:20 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x8847000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 669.430015][T24706] FAULT_INJECTION: forcing a failure. [ 669.430015][T24706] name failslab, interval 1, probability 0, space 0, times 0 [ 669.449633][T24706] CPU: 0 PID: 24706 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 669.457687][T24706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 669.467780][T24706] Call Trace: [ 669.471128][T24706] dump_stack+0x172/0x1f0 [ 669.475568][T24706] should_fail.cold+0xa/0x15 [ 669.480214][T24706] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 669.486077][T24706] ? ___might_sleep+0x163/0x280 [ 669.490957][T24706] __should_failslab+0x121/0x190 [ 669.495954][T24706] should_failslab+0x9/0x14 [ 669.500467][T24706] __kmalloc+0x2d9/0x740 [ 669.504721][T24706] ? kobject_uevent_env+0x387/0x101d [ 669.510013][T24706] ? rcu_read_lock_sched_held+0x110/0x130 [ 669.515763][T24706] ? kobject_get_path+0xc4/0x1b0 [ 669.520755][T24706] kobject_get_path+0xc4/0x1b0 [ 669.525567][T24706] kobject_uevent_env+0x3ab/0x101d [ 669.530705][T24706] ? kasan_check_write+0x14/0x20 [ 669.535649][T24706] ? up_write+0xbe/0x1e0 [ 669.539900][T24706] kobject_uevent+0x20/0x26 [ 669.544412][T24706] loop_set_fd+0xba2/0x10b0 [ 669.548927][T24706] lo_ioctl+0x1a3/0x1460 [ 669.553186][T24706] ? lock_downgrade+0x880/0x880 [ 669.558043][T24706] ? loop_set_fd+0x10b0/0x10b0 [ 669.562816][T24706] blkdev_ioctl+0xece/0x1c10 [ 669.567411][T24706] ? blkpg_ioctl+0xa90/0xa90 [ 669.572106][T24706] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 669.577936][T24706] ? __fget+0x35a/0x550 [ 669.582110][T24706] block_ioctl+0xee/0x130 [ 669.586463][T24706] ? blkdev_fallocate+0x410/0x410 [ 669.591583][T24706] do_vfs_ioctl+0xd5f/0x1380 [ 669.596244][T24706] ? ioctl_preallocate+0x210/0x210 [ 669.601755][T24706] ? __fget+0x381/0x550 [ 669.605936][T24706] ? ksys_dup3+0x3e0/0x3e0 [ 669.610369][T24706] ? do_sys_open+0x31d/0x5d0 [ 669.614964][T24706] ? tomoyo_file_ioctl+0x23/0x30 [ 669.619923][T24706] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 669.626200][T24706] ? security_file_ioctl+0x8d/0xc0 [ 669.631320][T24706] ksys_ioctl+0xab/0xd0 [ 669.635487][T24706] __x64_sys_ioctl+0x73/0xb0 [ 669.640094][T24706] do_syscall_64+0xfd/0x680 [ 669.644610][T24706] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 669.650519][T24706] RIP: 0033:0x4590e7 [ 669.654441][T24706] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 669.674046][T24706] RSP: 002b:00007f050b165a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 669.682462][T24706] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004590e7 [ 669.690491][T24706] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 669.698485][T24706] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 669.706488][T24706] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 669.714481][T24706] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:21 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfl\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x0, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:24:21 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x8848000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:21 executing program 4: 13:24:21 executing program 4: 13:24:21 executing program 0: 13:24:21 executing program 1 (fault-call:0 fault-nth:27): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:21 executing program 4: 13:24:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x0, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:24:21 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x8864000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:21 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfo\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:21 executing program 4: 13:24:21 executing program 0: 13:24:21 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff00000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(0xffffffffffffffff, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) [ 670.442509][T24749] FAULT_INJECTION: forcing a failure. [ 670.442509][T24749] name failslab, interval 1, probability 0, space 0, times 0 [ 670.469658][T24749] CPU: 0 PID: 24749 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 670.477716][T24749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 670.487800][T24749] Call Trace: 13:24:21 executing program 0: [ 670.491135][T24749] dump_stack+0x172/0x1f0 [ 670.495534][T24749] should_fail.cold+0xa/0x15 [ 670.500252][T24749] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 670.506106][T24749] ? ___might_sleep+0x163/0x280 [ 670.511004][T24749] __should_failslab+0x121/0x190 [ 670.515981][T24749] should_failslab+0x9/0x14 [ 670.520515][T24749] kmem_cache_alloc+0x2af/0x6f0 [ 670.525410][T24749] ? lock_downgrade+0x880/0x880 [ 670.530292][T24749] ? kasan_check_read+0x11/0x20 [ 670.535187][T24749] __kernfs_new_node+0xf0/0x6c0 13:24:22 executing program 0: [ 670.540070][T24749] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 670.545580][T24749] ? wait_for_completion+0x440/0x440 [ 670.550996][T24749] ? mutex_unlock+0xd/0x10 [ 670.555435][T24749] ? kernfs_activate+0x192/0x1f0 [ 670.560401][T24749] kernfs_new_node+0x96/0x120 [ 670.565113][T24749] __kernfs_create_file+0x51/0x340 [ 670.570265][T24749] sysfs_add_file_mode_ns+0x222/0x560 [ 670.575676][T24749] internal_create_group+0x359/0xc40 [ 670.581012][T24749] ? remove_files.isra.0+0x190/0x190 [ 670.586324][T24749] ? bd_set_size+0x3f/0xb0 13:24:22 executing program 0: [ 670.590777][T24749] ? kasan_check_write+0x14/0x20 [ 670.595737][T24749] ? up_write+0xbe/0x1e0 [ 670.600010][T24749] sysfs_create_group+0x20/0x30 [ 670.604900][T24749] loop_set_fd+0xb11/0x10b0 [ 670.609445][T24749] lo_ioctl+0x1a3/0x1460 [ 670.614009][T24749] ? lock_downgrade+0x880/0x880 [ 670.618898][T24749] ? loop_set_fd+0x10b0/0x10b0 [ 670.623699][T24749] blkdev_ioctl+0xece/0x1c10 [ 670.628325][T24749] ? blkpg_ioctl+0xa90/0xa90 [ 670.633007][T24749] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 670.638853][T24749] ? __fget+0x35a/0x550 [ 670.643031][T24749] block_ioctl+0xee/0x130 [ 670.647367][T24749] ? blkdev_fallocate+0x410/0x410 [ 670.652405][T24749] do_vfs_ioctl+0xd5f/0x1380 [ 670.657022][T24749] ? ioctl_preallocate+0x210/0x210 [ 670.662139][T24749] ? __fget+0x381/0x550 [ 670.666332][T24749] ? ksys_dup3+0x3e0/0x3e0 [ 670.670756][T24749] ? tomoyo_file_ioctl+0x23/0x30 [ 670.675702][T24749] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 670.681947][T24749] ? security_file_ioctl+0x8d/0xc0 [ 670.687087][T24749] ksys_ioctl+0xab/0xd0 [ 670.691274][T24749] __x64_sys_ioctl+0x73/0xb0 [ 670.695899][T24749] do_syscall_64+0xfd/0x680 [ 670.700413][T24749] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 670.706342][T24749] RIP: 0033:0x4590e7 [ 670.710263][T24749] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 670.730039][T24749] RSP: 002b:00007f050b165a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 670.738452][T24749] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004590e7 [ 670.746446][T24749] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 670.754425][T24749] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 670.762399][T24749] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 670.770375][T24749] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:22 executing program 1 (fault-call:0 fault-nth:28): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:22 executing program 0: 13:24:22 executing program 4: 13:24:22 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff00000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:22 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfp\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(0xffffffffffffffff, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:24:22 executing program 0: 13:24:22 executing program 4: 13:24:22 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x8906000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 671.216601][T24781] FAULT_INJECTION: forcing a failure. [ 671.216601][T24781] name failslab, interval 1, probability 0, space 0, times 0 [ 671.235573][T24781] CPU: 0 PID: 24781 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 671.243600][T24781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 671.253667][T24781] Call Trace: [ 671.256985][T24781] dump_stack+0x172/0x1f0 [ 671.261351][T24781] should_fail.cold+0xa/0x15 13:24:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(0xffffffffffffffff, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) [ 671.265969][T24781] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 671.271810][T24781] ? ___might_sleep+0x163/0x280 [ 671.276700][T24781] __should_failslab+0x121/0x190 [ 671.283077][T24781] should_failslab+0x9/0x14 [ 671.287602][T24781] kmem_cache_alloc_trace+0x2ce/0x750 [ 671.292996][T24781] kobject_uevent_env+0x387/0x101d [ 671.298129][T24781] ? kasan_check_write+0x14/0x20 [ 671.303087][T24781] ? up_write+0xbe/0x1e0 [ 671.307349][T24781] kobject_uevent+0x20/0x26 [ 671.311877][T24781] loop_set_fd+0xba2/0x10b0 13:24:22 executing program 0: 13:24:22 executing program 0: [ 671.316494][T24781] lo_ioctl+0x1a3/0x1460 [ 671.320746][T24781] ? lock_downgrade+0x880/0x880 [ 671.325610][T24781] ? loop_set_fd+0x10b0/0x10b0 [ 671.330399][T24781] blkdev_ioctl+0xece/0x1c10 [ 671.335010][T24781] ? blkpg_ioctl+0xa90/0xa90 [ 671.339613][T24781] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 671.345443][T24781] ? __fget+0x35a/0x550 [ 671.349621][T24781] block_ioctl+0xee/0x130 [ 671.353986][T24781] ? blkdev_fallocate+0x410/0x410 [ 671.359602][T24781] do_vfs_ioctl+0xd5f/0x1380 [ 671.364214][T24781] ? ioctl_preallocate+0x210/0x210 [ 671.370637][T24781] ? __fget+0x381/0x550 [ 671.374812][T24781] ? ksys_dup3+0x3e0/0x3e0 [ 671.379257][T24781] ? tomoyo_file_ioctl+0x23/0x30 [ 671.384217][T24781] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 671.391137][T24781] ? security_file_ioctl+0x8d/0xc0 [ 671.396272][T24781] ksys_ioctl+0xab/0xd0 [ 671.400442][T24781] __x64_sys_ioctl+0x73/0xb0 [ 671.405046][T24781] do_syscall_64+0xfd/0x680 [ 671.409564][T24781] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 671.415455][T24781] RIP: 0033:0x4590e7 [ 671.419362][T24781] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 671.439038][T24781] RSP: 002b:00007f050b165a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 671.447459][T24781] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004590e7 [ 671.455414][T24781] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 671.463381][T24781] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 671.471350][T24781] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 671.479304][T24781] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:23 executing program 1 (fault-call:0 fault-nth:29): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:23 executing program 0: 13:24:23 executing program 4: 13:24:23 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x89ffffff00000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 671.883991][T24817] FAULT_INJECTION: forcing a failure. [ 671.883991][T24817] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 671.897261][T24817] CPU: 0 PID: 24817 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 671.905255][T24817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 671.915324][T24817] Call Trace: [ 671.918647][T24817] dump_stack+0x172/0x1f0 [ 671.923010][T24817] should_fail.cold+0xa/0x15 [ 671.927631][T24817] ? console_unlock+0x781/0xec0 [ 671.932494][T24817] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 671.938402][T24817] should_fail_alloc_page+0x50/0x60 [ 671.943606][T24817] __alloc_pages_nodemask+0x1a1/0x8d0 [ 671.948964][T24817] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 671.954588][T24817] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 671.960298][T24817] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 671.965920][T24817] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 671.971716][T24817] cache_grow_begin+0x9d/0x650 [ 671.976555][T24817] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 671.982798][T24817] kmem_cache_alloc_trace+0x67c/0x750 [ 671.988162][T24817] kobject_uevent_env+0x387/0x101d [ 671.993270][T24817] ? kasan_check_write+0x14/0x20 [ 671.998197][T24817] ? up_write+0xbe/0x1e0 [ 672.002427][T24817] kobject_uevent+0x20/0x26 [ 672.006916][T24817] loop_set_fd+0xba2/0x10b0 [ 672.011416][T24817] lo_ioctl+0x1a3/0x1460 [ 672.015645][T24817] ? lock_downgrade+0x880/0x880 [ 672.020497][T24817] ? loop_set_fd+0x10b0/0x10b0 [ 672.025252][T24817] blkdev_ioctl+0xece/0x1c10 [ 672.029831][T24817] ? blkpg_ioctl+0xa90/0xa90 [ 672.034410][T24817] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 672.040247][T24817] ? __fget+0x35a/0x550 [ 672.044403][T24817] block_ioctl+0xee/0x130 [ 672.048714][T24817] ? blkdev_fallocate+0x410/0x410 [ 672.053725][T24817] do_vfs_ioctl+0xd5f/0x1380 [ 672.058300][T24817] ? ioctl_preallocate+0x210/0x210 [ 672.063393][T24817] ? __fget+0x381/0x550 [ 672.067551][T24817] ? ksys_dup3+0x3e0/0x3e0 [ 672.071967][T24817] ? tomoyo_file_ioctl+0x23/0x30 [ 672.076980][T24817] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 672.083204][T24817] ? security_file_ioctl+0x8d/0xc0 [ 672.088300][T24817] ksys_ioctl+0xab/0xd0 [ 672.092443][T24817] __x64_sys_ioctl+0x73/0xb0 [ 672.097033][T24817] do_syscall_64+0xfd/0x680 [ 672.101525][T24817] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 672.107405][T24817] RIP: 0033:0x4590e7 [ 672.111286][T24817] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:24:23 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfu\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:24:23 executing program 4: 13:24:23 executing program 0: 13:24:23 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff00000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 672.130872][T24817] RSP: 002b:00007f050b165a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 672.139266][T24817] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004590e7 [ 672.147224][T24817] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 672.155188][T24817] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 672.163160][T24817] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 672.171121][T24817] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:23 executing program 0: 13:24:23 executing program 4: 13:24:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:24:23 executing program 1 (fault-call:0 fault-nth:30): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:23 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:23 executing program 4: 13:24:24 executing program 0: 13:24:24 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfx\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:24 executing program 4: 13:24:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:24:24 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 672.685142][T24849] FAULT_INJECTION: forcing a failure. [ 672.685142][T24849] name failslab, interval 1, probability 0, space 0, times 0 [ 672.704596][T24849] CPU: 0 PID: 24849 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 672.712626][T24849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 672.722708][T24849] Call Trace: [ 672.726029][T24849] dump_stack+0x172/0x1f0 [ 672.730399][T24849] should_fail.cold+0xa/0x15 13:24:24 executing program 0: 13:24:24 executing program 0: [ 672.735022][T24849] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 672.740851][T24849] ? ___might_sleep+0x163/0x280 [ 672.745724][T24849] __should_failslab+0x121/0x190 [ 672.750692][T24849] should_failslab+0x9/0x14 [ 672.755207][T24849] __kmalloc+0x2d9/0x740 [ 672.759477][T24849] ? kobject_uevent_env+0x387/0x101d [ 672.764783][T24849] ? rcu_read_lock_sched_held+0x110/0x130 [ 672.770521][T24849] ? kobject_get_path+0xc4/0x1b0 [ 672.775480][T24849] kobject_get_path+0xc4/0x1b0 [ 672.780266][T24849] kobject_uevent_env+0x3ab/0x101d [ 672.785392][T24849] ? kasan_check_write+0x14/0x20 [ 672.790354][T24849] ? up_write+0xbe/0x1e0 [ 672.794603][T24849] kobject_uevent+0x20/0x26 [ 672.799096][T24849] loop_set_fd+0xba2/0x10b0 [ 672.803600][T24849] lo_ioctl+0x1a3/0x1460 [ 672.807831][T24849] ? lock_downgrade+0x880/0x880 [ 672.812691][T24849] ? loop_set_fd+0x10b0/0x10b0 [ 672.817448][T24849] blkdev_ioctl+0xece/0x1c10 [ 672.822053][T24849] ? blkpg_ioctl+0xa90/0xa90 [ 672.826631][T24849] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 672.832431][T24849] ? __fget+0x35a/0x550 [ 672.836584][T24849] block_ioctl+0xee/0x130 [ 672.840897][T24849] ? blkdev_fallocate+0x410/0x410 [ 672.845907][T24849] do_vfs_ioctl+0xd5f/0x1380 [ 672.850487][T24849] ? ioctl_preallocate+0x210/0x210 [ 672.855581][T24849] ? __fget+0x381/0x550 [ 672.859729][T24849] ? ksys_dup3+0x3e0/0x3e0 [ 672.864141][T24849] ? tomoyo_file_ioctl+0x23/0x30 [ 672.869072][T24849] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 672.875313][T24849] ? security_file_ioctl+0x8d/0xc0 [ 672.880426][T24849] ksys_ioctl+0xab/0xd0 [ 672.884572][T24849] __x64_sys_ioctl+0x73/0xb0 [ 672.889158][T24849] do_syscall_64+0xfd/0x680 [ 672.893665][T24849] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 672.899550][T24849] RIP: 0033:0x4590e7 [ 672.903440][T24849] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 672.923060][T24849] RSP: 002b:00007f050b165a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 672.931479][T24849] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004590e7 [ 672.939463][T24849] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 672.947439][T24849] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 672.955403][T24849] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 672.963371][T24849] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:24 executing program 0: 13:24:24 executing program 4: 13:24:24 executing program 1 (fault-call:0 fault-nth:31): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, 0x0, 0x0) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:24:24 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:24 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x02', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:24 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:24 executing program 0: 13:24:24 executing program 4: 13:24:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, 0x0, 0x0) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) [ 673.458047][T24881] FAULT_INJECTION: forcing a failure. [ 673.458047][T24881] name failslab, interval 1, probability 0, space 0, times 0 [ 673.502045][T24881] CPU: 1 PID: 24881 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 673.510114][T24881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 673.520783][T24881] Call Trace: [ 673.524123][T24881] dump_stack+0x172/0x1f0 [ 673.528505][T24881] should_fail.cold+0xa/0x15 [ 673.533151][T24881] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 673.539367][T24881] ? ___might_sleep+0x163/0x280 [ 673.544258][T24881] __should_failslab+0x121/0x190 13:24:25 executing program 0: 13:24:25 executing program 0: [ 673.549222][T24881] should_failslab+0x9/0x14 [ 673.553755][T24881] kmem_cache_alloc_node_trace+0x26d/0x720 [ 673.559605][T24881] __kmalloc_node_track_caller+0x3d/0x70 [ 673.565390][T24881] __kmalloc_reserve.isra.0+0x40/0xf0 [ 673.570802][T24881] __alloc_skb+0x10b/0x5e0 [ 673.575252][T24881] ? skb_trim+0x190/0x190 [ 673.579614][T24881] ? kasan_check_read+0x11/0x20 [ 673.584501][T24881] alloc_uevent_skb+0x83/0x1e2 [ 673.589440][T24881] kobject_uevent_env+0xaa3/0x101d [ 673.594595][T24881] kobject_uevent+0x20/0x26 [ 673.599135][T24881] loop_set_fd+0xba2/0x10b0 [ 673.603683][T24881] lo_ioctl+0x1a3/0x1460 [ 673.607981][T24881] ? lock_downgrade+0x880/0x880 [ 673.612975][T24881] ? loop_set_fd+0x10b0/0x10b0 [ 673.617786][T24881] blkdev_ioctl+0xece/0x1c10 [ 673.622551][T24881] ? blkpg_ioctl+0xa90/0xa90 [ 673.627176][T24881] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 673.633029][T24881] ? __fget+0x35a/0x550 [ 673.637224][T24881] block_ioctl+0xee/0x130 [ 673.641589][T24881] ? blkdev_fallocate+0x410/0x410 [ 673.646852][T24881] do_vfs_ioctl+0xd5f/0x1380 13:24:25 executing program 0: [ 673.651481][T24881] ? ioctl_preallocate+0x210/0x210 [ 673.656624][T24881] ? __fget+0x381/0x550 [ 673.660845][T24881] ? ksys_dup3+0x3e0/0x3e0 [ 673.665587][T24881] ? tomoyo_file_ioctl+0x23/0x30 [ 673.670568][T24881] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 673.676859][T24881] ? security_file_ioctl+0x8d/0xc0 [ 673.682024][T24881] ksys_ioctl+0xab/0xd0 [ 673.686459][T24881] __x64_sys_ioctl+0x73/0xb0 [ 673.691369][T24881] do_syscall_64+0xfd/0x680 [ 673.695926][T24881] entry_SYSCALL_64_after_hwframe+0x49/0xbe 13:24:25 executing program 0: [ 673.701846][T24881] RIP: 0033:0x4590e7 [ 673.705765][T24881] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 673.725386][T24881] RSP: 002b:00007f050b165a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 673.733847][T24881] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004590e7 [ 673.741852][T24881] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 673.749946][T24881] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 673.757947][T24881] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 673.766138][T24881] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:25 executing program 1 (fault-call:0 fault-nth:32): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:25 executing program 0: 13:24:25 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:25 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x03', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:25 executing program 4: 13:24:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, 0x0, 0x0) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:24:25 executing program 0: 13:24:25 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:25 executing program 0: [ 674.248303][T24915] FAULT_INJECTION: forcing a failure. [ 674.248303][T24915] name failslab, interval 1, probability 0, space 0, times 0 13:24:25 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000], [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 674.336310][T24915] CPU: 1 PID: 24915 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 674.344374][T24915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 674.354652][T24915] Call Trace: [ 674.357996][T24915] dump_stack+0x172/0x1f0 [ 674.362367][T24915] should_fail.cold+0xa/0x15 [ 674.367001][T24915] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 674.372937][T24915] ? ___might_sleep+0x163/0x280 [ 674.377831][T24915] __should_failslab+0x121/0x190 [ 674.383001][T24915] should_failslab+0x9/0x14 [ 674.387538][T24915] kmem_cache_alloc+0x2af/0x6f0 [ 674.392422][T24915] ? __d_lookup+0x433/0x760 [ 674.396953][T24915] ? lookup_dcache+0x23/0x140 [ 674.401697][T24915] ? d_lookup+0xf9/0x260 [ 674.406119][T24915] ? lockdep_hardirqs_on+0x418/0x5d0 [ 674.411441][T24915] __d_alloc+0x2e/0x8c0 [ 674.415617][T24915] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 674.415649][T24915] d_alloc+0x4d/0x280 [ 674.425402][T24915] __lookup_hash+0xcd/0x190 [ 674.429930][T24915] ? kasan_check_write+0x14/0x20 [ 674.434898][T24915] filename_create+0x1a7/0x4f0 [ 674.439701][T24915] ? kern_path_mountpoint+0x40/0x40 [ 674.446862][T24915] ? strncpy_from_user+0x2ac/0x380 [ 674.452015][T24915] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 674.458508][T24915] ? getname_flags+0x277/0x5b0 [ 674.463714][T24915] do_mkdirat+0xb5/0x2a0 [ 674.467990][T24915] ? __ia32_sys_mknod+0xb0/0xb0 [ 674.472869][T24915] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 674.478360][T24915] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 13:24:25 executing program 4: 13:24:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240), 0x0) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) [ 674.484726][T24915] ? do_syscall_64+0x26/0x680 [ 674.489436][T24915] ? lockdep_hardirqs_on+0x418/0x5d0 [ 674.494771][T24915] __x64_sys_mkdir+0x5c/0x80 [ 674.494793][T24915] do_syscall_64+0xfd/0x680 [ 674.494812][T24915] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 674.494823][T24915] RIP: 0033:0x458697 [ 674.494839][T24915] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 674.494846][T24915] RSP: 002b:00007f050b165a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 674.494860][T24915] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458697 [ 674.494868][T24915] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 674.494886][T24915] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 674.566576][T24915] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 674.574577][T24915] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:26 executing program 1 (fault-call:0 fault-nth:33): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:26 executing program 0: 13:24:26 executing program 4: 13:24:26 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x2, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240), 0x0) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:24:26 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x04', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:26 executing program 0: 13:24:26 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x15, 0x0, &(0x7f0000000040)) [ 675.042147][T24957] FAULT_INJECTION: forcing a failure. [ 675.042147][T24957] name failslab, interval 1, probability 0, space 0, times 0 [ 675.079788][T24957] CPU: 1 PID: 24957 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 675.087846][T24957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 675.098339][T24957] Call Trace: [ 675.101682][T24957] dump_stack+0x172/0x1f0 [ 675.106046][T24957] should_fail.cold+0xa/0x15 [ 675.110685][T24957] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 675.116532][T24957] ? ___might_sleep+0x163/0x280 [ 675.121409][T24957] __should_failslab+0x121/0x190 [ 675.126386][T24957] should_failslab+0x9/0x14 [ 675.130916][T24957] kmem_cache_alloc+0x2af/0x6f0 [ 675.135789][T24957] ? refcount_dec_and_mutex_lock+0x90/0x90 13:24:26 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000180)=ANY=[@ANYBLOB="06696c74657200000000000000000000000000000000000000000000007e800003000000000000179a0a694600000000000000000000aea02da34a8befe5fb00000000ecffffff00000000008100000000000000000000000000000000000000000000000002e919449aa42f2170ed7243b356"], 0x1) 13:24:26 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x3, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240), 0x0) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) [ 675.141624][T24957] ? lock_downgrade+0x880/0x880 [ 675.146516][T24957] skb_clone+0x154/0x3d0 [ 675.150797][T24957] netlink_broadcast_filtered+0x86e/0xb20 [ 675.156559][T24957] netlink_broadcast+0x3a/0x50 [ 675.161368][T24957] kobject_uevent_env+0xad4/0x101d [ 675.166656][T24957] kobject_uevent+0x20/0x26 [ 675.171200][T24957] loop_set_fd+0xba2/0x10b0 [ 675.175753][T24957] lo_ioctl+0x1a3/0x1460 [ 675.180029][T24957] ? lock_downgrade+0x880/0x880 [ 675.184918][T24957] ? loop_set_fd+0x10b0/0x10b0 [ 675.189726][T24957] blkdev_ioctl+0xece/0x1c10 [ 675.194356][T24957] ? blkpg_ioctl+0xa90/0xa90 [ 675.198981][T24957] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 675.204823][T24957] ? __fget+0x35a/0x550 [ 675.209019][T24957] block_ioctl+0xee/0x130 [ 675.213377][T24957] ? blkdev_fallocate+0x410/0x410 [ 675.218431][T24957] do_vfs_ioctl+0xd5f/0x1380 [ 675.223057][T24957] ? ioctl_preallocate+0x210/0x210 [ 675.228198][T24957] ? __fget+0x381/0x550 [ 675.232388][T24957] ? ksys_dup3+0x3e0/0x3e0 [ 675.236836][T24957] ? do_sys_open+0x31d/0x5d0 13:24:26 executing program 0: prlimit64(0x0, 0x7, &(0x7f0000000180), 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) socket$unix(0x1, 0x0, 0x0) r0 = gettid() chmod(0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) inotify_init() timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) tkill(r0, 0x1000000000016) [ 675.241460][T24957] ? tomoyo_file_ioctl+0x23/0x30 [ 675.246430][T24957] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 675.252735][T24957] ? security_file_ioctl+0x8d/0xc0 [ 675.257884][T24957] ksys_ioctl+0xab/0xd0 [ 675.262090][T24957] __x64_sys_ioctl+0x73/0xb0 [ 675.266720][T24957] do_syscall_64+0xfd/0x680 [ 675.271246][T24957] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 675.277321][T24957] RIP: 0033:0x4590e7 [ 675.282173][T24957] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 675.301890][T24957] RSP: 002b:00007f050b165a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 675.310297][T24957] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 00000000004590e7 [ 675.318270][T24957] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 675.326242][T24957] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 675.334633][T24957] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 675.342616][T24957] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:27 executing program 1 (fault-call:0 fault-nth:34): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:27 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @broadcast=0xe0000001}, @icmp}}}}, 0x0) msgget$private(0x0, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e004b6) 13:24:27 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x4, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{0x0}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:24:27 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x05', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:27 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f00000003c0)='N', 0x1, 0x0, 0x0, 0x0) [ 675.620102][T24979] FAULT_INJECTION: forcing a failure. [ 675.620102][T24979] name failslab, interval 1, probability 0, space 0, times 0 [ 675.653467][T24979] CPU: 1 PID: 24979 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 675.661510][T24979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 675.661520][T24979] Call Trace: [ 675.661552][T24979] dump_stack+0x172/0x1f0 [ 675.661581][T24979] should_fail.cold+0xa/0x15 [ 675.683879][T24979] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 675.689881][T24979] ? ___might_sleep+0x163/0x280 [ 675.694773][T24979] __should_failslab+0x121/0x190 [ 675.699734][T24979] should_failslab+0x9/0x14 [ 675.699752][T24979] kmem_cache_alloc+0x2af/0x6f0 [ 675.699769][T24979] ? __d_lookup+0x433/0x760 [ 675.699784][T24979] ? lookup_dcache+0x23/0x140 [ 675.699795][T24979] ? d_lookup+0xf9/0x260 [ 675.699811][T24979] ? lockdep_hardirqs_on+0x418/0x5d0 [ 675.699829][T24979] __d_alloc+0x2e/0x8c0 [ 675.699844][T24979] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 675.699863][T24979] d_alloc+0x4d/0x280 [ 675.713726][T24979] __lookup_hash+0xcd/0x190 [ 675.713743][T24979] ? kasan_check_write+0x14/0x20 [ 675.713763][T24979] filename_create+0x1a7/0x4f0 [ 675.713783][T24979] ? kern_path_mountpoint+0x40/0x40 [ 675.713809][T24979] ? strncpy_from_user+0x2ac/0x380 13:24:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{0x0}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) [ 675.728010][T24979] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 675.728029][T24979] ? getname_flags+0x277/0x5b0 [ 675.728050][T24979] do_mkdirat+0xb5/0x2a0 [ 675.728071][T24979] ? __ia32_sys_mknod+0xb0/0xb0 [ 675.786417][T24979] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 675.791900][T24979] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 675.797975][T24979] ? do_syscall_64+0x26/0x680 [ 675.802672][T24979] ? lockdep_hardirqs_on+0x418/0x5d0 [ 675.807982][T24979] __x64_sys_mkdir+0x5c/0x80 [ 675.812592][T24979] do_syscall_64+0xfd/0x680 13:24:27 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x5, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 675.817112][T24979] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 675.823010][T24979] RIP: 0033:0x458697 [ 675.826917][T24979] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 675.846526][T24979] RSP: 002b:00007f050b165a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 675.854948][T24979] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458697 [ 675.854957][T24979] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 675.854966][T24979] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 675.854975][T24979] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 675.854985][T24979] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 [ 675.900041][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 675.918006][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 13:24:27 executing program 1 (fault-call:0 fault-nth:35): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{0x0}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:24:27 executing program 4: syz_mount_image$hfs(&(0x7f0000000040)='hf\\\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:27 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x6, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:27 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x06', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 676.187479][T25007] FAULT_INJECTION: forcing a failure. [ 676.187479][T25007] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 676.201808][T25007] CPU: 1 PID: 25007 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 676.209809][T25007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 676.219900][T25007] Call Trace: [ 676.223236][T25007] dump_stack+0x172/0x1f0 [ 676.227603][T25007] should_fail.cold+0xa/0x15 [ 676.232222][T25007] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 676.238065][T25007] should_fail_alloc_page+0x50/0x60 [ 676.243276][T25007] __alloc_pages_nodemask+0x1a1/0x8d0 [ 676.248662][T25007] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 676.260198][T25007] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 676.265940][T25007] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 676.271587][T25007] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 676.277865][T25007] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 676.283704][T25007] cache_grow_begin+0x9d/0x650 [ 676.288484][T25007] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 676.294745][T25007] kmem_cache_alloc+0x62a/0x6f0 [ 676.299609][T25007] ? finish_task_switch+0x146/0x730 [ 676.304823][T25007] ? finish_task_switch+0x118/0x730 [ 676.310169][T25007] getname_flags+0xd6/0x5b0 [ 676.314700][T25007] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 676.320966][T25007] do_mkdirat+0xa0/0x2a0 [ 676.325236][T25007] ? __ia32_sys_mknod+0xb0/0xb0 [ 676.330110][T25007] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 676.335605][T25007] ? do_syscall_64+0x26/0x680 [ 676.340313][T25007] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 676.346417][T25007] ? do_syscall_64+0x26/0x680 [ 676.351130][T25007] ? lockdep_hardirqs_on+0x418/0x5d0 [ 676.356835][T25007] __x64_sys_mkdir+0x5c/0x80 [ 676.361510][T25007] do_syscall_64+0xfd/0x680 [ 676.366073][T25007] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 676.371988][T25007] RIP: 0033:0x458697 [ 676.375898][T25007] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 676.395531][T25007] RSP: 002b:00007f050b165a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 676.403992][T25007] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458697 [ 676.411995][T25007] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 676.419999][T25007] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 676.428003][T25007] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 13:24:27 executing program 0 (fault-call:7 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) 13:24:27 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x7, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 676.436098][T25007] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:28 executing program 4 (fault-call:9 fault-nth:0): openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 13:24:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:24:28 executing program 1 (fault-call:0 fault-nth:36): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:28 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x8, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 676.657880][T25024] FAULT_INJECTION: forcing a failure. [ 676.657880][T25024] name failslab, interval 1, probability 0, space 0, times 0 13:24:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) [ 676.743094][T25024] CPU: 1 PID: 25024 Comm: syz-executor.0 Not tainted 5.2.0-rc3+ #20 [ 676.751718][T25024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 676.762040][T25024] Call Trace: [ 676.765378][T25024] dump_stack+0x172/0x1f0 [ 676.769756][T25024] should_fail.cold+0xa/0x15 [ 676.774387][T25024] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 676.780249][T25024] ? ___might_sleep+0x163/0x280 [ 676.785159][T25024] __should_failslab+0x121/0x190 [ 676.790169][T25024] should_failslab+0x9/0x14 [ 676.794740][T25024] __kmalloc+0x2d9/0x740 [ 676.799030][T25024] ? __might_fault+0x12b/0x1e0 [ 676.803836][T25024] ? rw_copy_check_uvector+0x28c/0x330 [ 676.809352][T25024] rw_copy_check_uvector+0x28c/0x330 [ 676.814705][T25024] import_iovec+0xbf/0x200 [ 676.819172][T25024] ? dup_iter+0x260/0x260 [ 676.823548][T25024] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 676.829826][T25024] ? _copy_from_user+0xdd/0x150 [ 676.834721][T25024] copy_msghdr_from_user+0x2c8/0x430 [ 676.840049][T25024] ? move_addr_to_kernel.part.0+0x110/0x110 [ 676.845996][T25024] ___sys_sendmsg+0x10b/0x920 [ 676.850720][T25024] ? copy_msghdr_from_user+0x430/0x430 [ 676.856239][T25024] ? lock_downgrade+0x880/0x880 [ 676.861141][T25024] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 676.867548][T25024] ? kasan_check_read+0x11/0x20 [ 676.872453][T25024] ? __fget+0x381/0x550 [ 676.876657][T25024] ? ksys_dup3+0x3e0/0x3e0 [ 676.881127][T25024] ? find_held_lock+0x35/0x130 [ 676.886163][T25024] ? __fget_light+0x1a9/0x230 [ 676.890892][T25024] ? __fdget+0x1b/0x20 [ 676.895012][T25024] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 676.901304][T25024] ? sockfd_lookup_light+0xcb/0x180 [ 676.906547][T25024] __sys_sendmmsg+0x1bf/0x4d0 [ 676.911322][T25024] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 676.916645][T25024] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 676.922254][T25024] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 676.928547][T25024] ? fput_many+0x12c/0x1a0 [ 676.933010][T25024] ? fput+0x1b/0x20 [ 676.936868][T25024] ? ksys_write+0x1cf/0x290 [ 676.941426][T25024] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 676.946942][T25024] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 676.952448][T25024] ? do_syscall_64+0x26/0x680 [ 676.957164][T25024] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 676.963281][T25024] ? do_syscall_64+0x26/0x680 [ 676.968012][T25024] __x64_sys_sendmmsg+0x9d/0x100 [ 676.972993][T25024] do_syscall_64+0xfd/0x680 [ 676.977542][T25024] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 676.983461][T25024] RIP: 0033:0x459279 [ 676.987399][T25024] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 677.007215][T25024] RSP: 002b:00007f58d3070c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 677.015682][T25024] RAX: ffffffffffffffda RBX: 00007f58d3070c90 RCX: 0000000000459279 [ 677.023702][T25024] RDX: 04924924924926c8 RSI: 0000000020236fc8 RDI: 0000000000000005 [ 677.031716][T25024] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 13:24:28 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 677.039725][T25024] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f58d30716d4 [ 677.047836][T25024] R13: 00000000004c6605 R14: 00000000004db2d8 R15: 0000000000000006 [ 677.089006][T25029] FAULT_INJECTION: forcing a failure. [ 677.089006][T25029] name failslab, interval 1, probability 0, space 0, times 0 [ 677.144496][T25029] CPU: 1 PID: 25029 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 677.152596][T25029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 677.162694][T25029] Call Trace: [ 677.166149][T25029] dump_stack+0x172/0x1f0 [ 677.170534][T25029] should_fail.cold+0xa/0x15 [ 677.175184][T25029] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 677.181049][T25029] ? ___might_sleep+0x163/0x280 [ 677.185961][T25029] __should_failslab+0x121/0x190 13:24:28 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0xb, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 677.191239][T25029] should_failslab+0x9/0x14 [ 677.195921][T25029] kmem_cache_alloc+0x2af/0x6f0 [ 677.200803][T25029] ? __fget+0x381/0x550 [ 677.205115][T25029] getname_flags+0xd6/0x5b0 [ 677.209676][T25029] do_mkdirat+0xa0/0x2a0 [ 677.213970][T25029] ? __ia32_sys_mknod+0xb0/0xb0 [ 677.218885][T25029] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 677.224381][T25029] ? do_syscall_64+0x26/0x680 [ 677.229090][T25029] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 677.235205][T25029] ? do_syscall_64+0x26/0x680 [ 677.240115][T25029] ? lockdep_hardirqs_on+0x418/0x5d0 [ 677.245686][T25029] __x64_sys_mkdir+0x5c/0x80 [ 677.250323][T25029] do_syscall_64+0xfd/0x680 [ 677.254865][T25029] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 677.260788][T25029] RIP: 0033:0x458697 [ 677.264714][T25029] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 677.285271][T25029] RSP: 002b:00007f050b165a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 13:24:28 executing program 0 (fault-call:7 fault-nth:1): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) [ 677.285293][T25029] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458697 [ 677.285301][T25029] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 677.285307][T25029] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 677.285315][T25029] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 677.285322][T25029] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:24:28 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\a', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:28 executing program 1 (fault-call:0 fault-nth:37): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:28 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0xd, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 677.440741][T25043] FAULT_INJECTION: forcing a failure. [ 677.440741][T25043] name failslab, interval 1, probability 0, space 0, times 0 [ 677.525427][T25043] CPU: 1 PID: 25043 Comm: syz-executor.0 Not tainted 5.2.0-rc3+ #20 [ 677.533500][T25043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 677.543601][T25043] Call Trace: [ 677.546925][T25043] dump_stack+0x172/0x1f0 [ 677.551276][T25043] should_fail.cold+0xa/0x15 [ 677.555878][T25043] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 677.561702][T25043] ? ___might_sleep+0x163/0x280 [ 677.566574][T25043] __should_failslab+0x121/0x190 [ 677.571525][T25043] should_failslab+0x9/0x14 [ 677.576034][T25043] kmem_cache_alloc_node+0x261/0x710 [ 677.581331][T25043] ? __lock_acquire+0x54f/0x5490 [ 677.581350][T25043] ? do_syscall_64+0xfd/0x680 [ 677.581365][T25043] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 677.581384][T25043] __alloc_skb+0xd5/0x5e0 [ 677.581400][T25043] ? skb_trim+0x190/0x190 [ 677.581416][T25043] ? mark_held_locks+0xf0/0xf0 [ 677.581440][T25043] tipc_buf_acquire+0x2f/0x100 [ 677.581456][T25043] tipc_msg_build+0x113/0x1240 [ 677.581468][T25043] ? find_held_lock+0x35/0x130 [ 677.581487][T25043] ? __might_fault+0x12b/0x1e0 [ 677.581507][T25043] ? tipc_msg_assemble+0x540/0x540 [ 677.635930][T25043] ? __lock_acquire+0x54f/0x5490 [ 677.640887][T25043] ? aa_label_sk_perm+0x101/0x560 [ 677.645924][T25043] ? lockdep_init_map+0x1be/0x6d0 [ 677.651088][T25043] __tipc_sendstream+0x631/0xe10 [ 677.656046][T25043] ? tipc_connect+0x750/0x750 [ 677.660739][T25043] ? lock_sock_nested+0xac/0x120 [ 677.665701][T25043] ? do_wait_intr_irq+0x2b0/0x2b0 [ 677.670743][T25043] ? __local_bh_enable_ip+0x15a/0x270 [ 677.676131][T25043] ? lock_sock_nested+0xe2/0x120 [ 677.681089][T25043] ? __local_bh_enable_ip+0x15a/0x270 [ 677.686486][T25043] ? __local_bh_enable_ip+0x15a/0x270 [ 677.691878][T25043] tipc_sendstream+0x53/0x80 [ 677.696481][T25043] tipc_send_packet+0x41/0x60 [ 677.701171][T25043] ? tipc_sendstream+0x80/0x80 [ 677.701190][T25043] sock_sendmsg+0xd7/0x130 [ 677.701207][T25043] ___sys_sendmsg+0x3e2/0x920 [ 677.701230][T25043] ? copy_msghdr_from_user+0x430/0x430 [ 677.711381][T25043] ? lock_downgrade+0x880/0x880 13:24:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) [ 677.711398][T25043] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 677.711415][T25043] ? kasan_check_read+0x11/0x20 [ 677.711432][T25043] ? __fget+0x381/0x550 [ 677.711450][T25043] ? ksys_dup3+0x3e0/0x3e0 [ 677.711465][T25043] ? find_held_lock+0x35/0x130 [ 677.711481][T25043] ? __fget_light+0x1a9/0x230 [ 677.711496][T25043] ? __fdget+0x1b/0x20 [ 677.711510][T25043] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 677.711525][T25043] ? sockfd_lookup_light+0xcb/0x180 [ 677.711545][T25043] __sys_sendmmsg+0x1bf/0x4d0 [ 677.711567][T25043] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 677.780893][T25043] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 677.780910][T25043] ? fput_many+0x12c/0x1a0 [ 677.780925][T25043] ? fput+0x1b/0x20 [ 677.780938][T25043] ? ksys_write+0x1cf/0x290 [ 677.780959][T25043] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 677.780974][T25043] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 677.780996][T25043] ? do_syscall_64+0x26/0x680 [ 677.795452][T25043] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 677.795472][T25043] ? do_syscall_64+0x26/0x680 [ 677.795498][T25043] __x64_sys_sendmmsg+0x9d/0x100 [ 677.795519][T25043] do_syscall_64+0xfd/0x680 [ 677.835847][T25043] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 677.841758][T25043] RIP: 0033:0x459279 [ 677.845678][T25043] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 677.865400][T25043] RSP: 002b:00007f58d3070c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 13:24:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) [ 677.873826][T25043] RAX: ffffffffffffffda RBX: 00007f58d3070c90 RCX: 0000000000459279 [ 677.881805][T25043] RDX: 04924924924926c8 RSI: 0000000020236fc8 RDI: 0000000000000005 [ 677.889782][T25043] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 677.897965][T25043] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f58d30716d4 [ 677.906083][T25043] R13: 00000000004c6605 R14: 00000000004db2d8 R15: 0000000000000006 [ 677.951235][T25059] FAULT_INJECTION: forcing a failure. [ 677.951235][T25059] name failslab, interval 1, probability 0, space 0, times 0 [ 677.964631][T25059] CPU: 1 PID: 25059 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 677.972634][T25059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 677.982727][T25059] Call Trace: [ 677.986046][T25059] dump_stack+0x172/0x1f0 [ 677.990401][T25059] should_fail.cold+0xa/0x15 [ 677.995143][T25059] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 678.000973][T25059] ? mark_held_locks+0xf0/0xf0 [ 678.005755][T25059] ? __es_tree_search.isra.0+0x1bf/0x230 [ 678.005771][T25059] ? save_stack+0x5c/0x90 [ 678.005793][T25059] __should_failslab+0x121/0x190 [ 678.005818][T25059] should_failslab+0x9/0x14 [ 678.025244][T25059] kmem_cache_alloc+0x47/0x6f0 [ 678.030033][T25059] ? ext4_es_scan+0x730/0x730 [ 678.034749][T25059] ? do_raw_write_lock+0x124/0x290 [ 678.039892][T25059] __es_insert_extent+0x2cc/0xf20 [ 678.044960][T25059] ext4_es_insert_extent+0x2b7/0xa30 13:24:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) [ 678.050281][T25059] ? ext4_es_scan_clu+0x50/0x50 [ 678.055167][T25059] ? rcu_read_lock_sched_held+0x110/0x130 [ 678.060914][T25059] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 678.067190][T25059] ? ext4_es_find_extent_range+0xff/0x600 [ 678.072949][T25059] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 678.078711][T25059] ? ext4_rereserve_cluster+0x240/0x240 [ 678.084286][T25059] ? ext4_find_extent+0x76e/0x9d0 [ 678.089439][T25059] ? ext4_find_extent+0x6a6/0x9d0 [ 678.094792][T25059] ? __bch_cut_front+0x360/0x370 [ 678.099774][T25059] ext4_ext_map_blocks+0x20a1/0x5250 [ 678.105094][T25059] ? mark_held_locks+0xf0/0xf0 [ 678.109906][T25059] ? ext4_ext_release+0x10/0x10 [ 678.114808][T25059] ? lock_acquire+0x16f/0x3f0 [ 678.119524][T25059] ? ext4_map_blocks+0x3fd/0x18e0 [ 678.124580][T25059] ? kasan_check_write+0x14/0x20 [ 678.129543][T25059] ext4_map_blocks+0xec7/0x18e0 [ 678.134425][T25059] ? ext4_issue_zeroout+0x190/0x190 [ 678.139655][T25059] ? kasan_check_write+0x14/0x20 [ 678.144629][T25059] ext4_getblk+0xc4/0x510 13:24:29 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x3b9ac9ff}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 678.148990][T25059] ? ext4_iomap_begin+0xfe0/0xfe0 [ 678.154044][T25059] ext4_bread+0x8f/0x230 [ 678.158313][T25059] ? ext4_getblk+0x510/0x510 [ 678.162937][T25059] ext4_append+0x155/0x370 [ 678.167564][T25059] ext4_mkdir+0x61b/0xdf0 [ 678.171922][T25059] ? ext4_init_dot_dotdot+0x520/0x520 [ 678.177318][T25059] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 678.183585][T25059] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 678.189855][T25059] ? security_inode_permission+0xcb/0x100 [ 678.195613][T25059] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 13:24:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) [ 678.201879][T25059] ? security_inode_mkdir+0xe4/0x120 [ 678.207192][T25059] vfs_mkdir+0x42e/0x670 [ 678.211461][T25059] do_mkdirat+0x234/0x2a0 [ 678.215824][T25059] ? __ia32_sys_mknod+0xb0/0xb0 [ 678.220705][T25059] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 678.226207][T25059] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 678.232306][T25059] ? do_syscall_64+0x26/0x680 [ 678.237010][T25059] ? lockdep_hardirqs_on+0x418/0x5d0 [ 678.242321][T25059] __x64_sys_mkdir+0x5c/0x80 [ 678.246932][T25059] do_syscall_64+0xfd/0x680 [ 678.251470][T25059] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 678.257406][T25059] RIP: 0033:0x458697 [ 678.261490][T25059] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 678.281126][T25059] RSP: 002b:00007f050b165a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 678.289566][T25059] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458697 [ 678.297563][T25059] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 678.305556][T25059] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 678.313551][T25059] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 678.321536][T25059] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:29 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x28, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:24:30 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\b', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:30 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0)={0xffc99a3b}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 13:24:30 executing program 1 (fault-call:0 fault-nth:38): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:30 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x29, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 678.737251][T25089] FAULT_INJECTION: forcing a failure. [ 678.737251][T25089] name failslab, interval 1, probability 0, space 0, times 0 [ 678.750281][T25089] CPU: 0 PID: 25089 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 678.758388][T25089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 678.768654][T25089] Call Trace: [ 678.771993][T25089] dump_stack+0x172/0x1f0 [ 678.776367][T25089] should_fail.cold+0xa/0x15 [ 678.781003][T25089] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 678.786847][T25089] ? mark_held_locks+0xf0/0xf0 [ 678.791671][T25089] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 678.797432][T25089] ? __es_tree_search.isra.0+0x1bf/0x230 [ 678.803119][T25089] __should_failslab+0x121/0x190 [ 678.808112][T25089] should_failslab+0x9/0x14 [ 678.812659][T25089] kmem_cache_alloc+0x47/0x6f0 [ 678.817467][T25089] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 678.823235][T25089] ? ext4_es_can_be_merged+0x1a3/0x2a0 [ 678.828848][T25089] ? ext4_es_scan+0x730/0x730 [ 678.833567][T25089] ? do_raw_write_lock+0x124/0x290 [ 678.838722][T25089] __es_insert_extent+0x2cc/0xf20 [ 678.843804][T25089] ext4_es_insert_extent+0x2b7/0xa30 [ 678.849135][T25089] ? ext4_es_scan_clu+0x50/0x50 [ 678.854152][T25089] ext4_map_blocks+0xb87/0x18e0 [ 678.859068][T25089] ? ext4_issue_zeroout+0x190/0x190 [ 678.864331][T25089] ? kasan_check_write+0x14/0x20 [ 678.869331][T25089] ext4_getblk+0xc4/0x510 [ 678.873711][T25089] ? ext4_iomap_begin+0xfe0/0xfe0 [ 678.878797][T25089] ext4_bread+0x8f/0x230 [ 678.883082][T25089] ? ext4_getblk+0x510/0x510 [ 678.887722][T25089] ext4_append+0x155/0x370 [ 678.892195][T25089] ext4_mkdir+0x61b/0xdf0 [ 678.896589][T25089] ? ext4_init_dot_dotdot+0x520/0x520 [ 678.902012][T25089] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 678.908323][T25089] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 678.914636][T25089] ? security_inode_permission+0xcb/0x100 [ 678.920400][T25089] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 678.926681][T25089] ? security_inode_mkdir+0xe4/0x120 [ 678.932016][T25089] vfs_mkdir+0x42e/0x670 [ 678.936302][T25089] do_mkdirat+0x234/0x2a0 [ 678.940670][T25089] ? __ia32_sys_mknod+0xb0/0xb0 [ 678.945560][T25089] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 678.951060][T25089] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 678.957162][T25089] ? do_syscall_64+0x26/0x680 [ 678.961889][T25089] ? lockdep_hardirqs_on+0x418/0x5d0 [ 678.967235][T25089] __x64_sys_mkdir+0x5c/0x80 [ 678.971956][T25089] do_syscall_64+0xfd/0x680 [ 678.976509][T25089] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 678.982522][T25089] RIP: 0033:0x458697 [ 678.986446][T25089] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 679.006105][T25089] RSP: 002b:00007f050b165a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 679.014561][T25089] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458697 [ 679.022566][T25089] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 679.030568][T25089] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 13:24:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:24:30 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0)={0xffc99a3b00000000}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 679.038578][T25089] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 679.046583][T25089] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:30 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x2b, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x40000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) 13:24:30 executing program 1 (fault-call:0 fault-nth:39): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:30 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\t', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:30 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x3b9ac9ff}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 13:24:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:24:30 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x2c, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 679.418127][T25115] FAULT_INJECTION: forcing a failure. [ 679.418127][T25115] name failslab, interval 1, probability 0, space 0, times 0 [ 679.485837][T25115] CPU: 1 PID: 25115 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 679.493881][T25115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 679.503944][T25115] Call Trace: [ 679.507263][T25115] dump_stack+0x172/0x1f0 [ 679.511638][T25115] should_fail.cold+0xa/0x15 [ 679.516254][T25115] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 679.522090][T25115] ? ___might_sleep+0x163/0x280 [ 679.527363][T25115] __should_failslab+0x121/0x190 [ 679.532844][T25115] should_failslab+0x9/0x14 [ 679.538037][T25115] __kmalloc+0x2d9/0x740 [ 679.542330][T25115] ? ext4_find_extent+0x76e/0x9d0 [ 679.549049][T25115] ext4_find_extent+0x76e/0x9d0 [ 679.554759][T25115] ext4_ext_map_blocks+0x1c3/0x5250 [ 679.554788][T25115] ? ext4_ext_release+0x10/0x10 [ 679.564854][T25115] ? lock_acquire+0x16f/0x3f0 [ 679.564872][T25115] ? ext4_map_blocks+0x85d/0x18e0 [ 679.564896][T25115] ext4_map_blocks+0x8c5/0x18e0 [ 679.575397][T25115] ? ext4_issue_zeroout+0x190/0x190 [ 679.575424][T25115] ? kasan_check_write+0x14/0x20 [ 679.575444][T25115] ext4_getblk+0xc4/0x510 [ 679.594896][T25115] ? ext4_iomap_begin+0xfe0/0xfe0 [ 679.599955][T25115] ext4_bread+0x8f/0x230 [ 679.604215][T25115] ? ext4_getblk+0x510/0x510 [ 679.608836][T25115] ext4_append+0x155/0x370 [ 679.613281][T25115] ext4_mkdir+0x61b/0xdf0 [ 679.617633][T25115] ? ext4_init_dot_dotdot+0x520/0x520 [ 679.623467][T25115] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 679.629722][T25115] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 679.635993][T25115] ? security_inode_permission+0xcb/0x100 [ 679.641727][T25115] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 679.647989][T25115] ? security_inode_mkdir+0xe4/0x120 [ 679.653296][T25115] vfs_mkdir+0x42e/0x670 [ 679.657614][T25115] do_mkdirat+0x234/0x2a0 [ 679.661984][T25115] ? __ia32_sys_mknod+0xb0/0xb0 [ 679.666855][T25115] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 679.672368][T25115] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 679.678450][T25115] ? do_syscall_64+0x26/0x680 [ 679.683238][T25115] ? lockdep_hardirqs_on+0x418/0x5d0 [ 679.688540][T25115] __x64_sys_mkdir+0x5c/0x80 [ 679.693181][T25115] do_syscall_64+0xfd/0x680 [ 679.697717][T25115] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 679.703664][T25115] RIP: 0033:0x458697 [ 679.707845][T25115] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 679.727472][T25115] RSP: 002b:00007f050b165a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 13:24:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x0, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:24:31 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0xffc99a3b}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 13:24:31 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x2f, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:31 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\n', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 679.735919][T25115] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458697 [ 679.743906][T25115] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 679.751889][T25115] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 679.760179][T25115] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 679.768172][T25115] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:31 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x3c, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:31 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0xffc99a3b00000000}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 13:24:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x1000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) 13:24:31 executing program 1 (fault-call:0 fault-nth:40): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x0, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:24:31 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x50, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:31 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x3b9ac9ff}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 13:24:31 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x0e', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 680.207219][T25148] FAULT_INJECTION: forcing a failure. [ 680.207219][T25148] name failslab, interval 1, probability 0, space 0, times 0 [ 680.220975][T25148] CPU: 1 PID: 25148 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 680.228992][T25148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 680.239071][T25148] Call Trace: [ 680.242407][T25148] dump_stack+0x172/0x1f0 [ 680.246798][T25148] should_fail.cold+0xa/0x15 [ 680.251424][T25148] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 680.257411][T25148] ? ___might_sleep+0x163/0x280 [ 680.262288][T25148] __should_failslab+0x121/0x190 [ 680.267259][T25148] should_failslab+0x9/0x14 [ 680.276518][T25148] __kmalloc+0x2d9/0x740 [ 680.281081][T25148] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 680.287451][T25148] ? d_absolute_path+0x11b/0x170 [ 680.292407][T25148] ? __d_path+0x140/0x140 [ 680.296882][T25148] ? tomoyo_encode2.part.0+0xf5/0x400 [ 680.302376][T25148] tomoyo_encode2.part.0+0xf5/0x400 13:24:31 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x58, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 680.307588][T25148] tomoyo_encode+0x2b/0x50 [ 680.312017][T25148] tomoyo_realpath_from_path+0x1d3/0x7a0 [ 680.317678][T25148] tomoyo_path_number_perm+0x1dd/0x520 [ 680.323149][T25148] ? tomoyo_path_number_perm+0x193/0x520 [ 680.328801][T25148] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 680.334888][T25148] ? debug_check_no_obj_freed+0x200/0x464 [ 680.340655][T25148] ? kasan_check_write+0x14/0x20 [ 680.345673][T25148] ? putname+0xef/0x130 [ 680.349865][T25148] ? putname+0xef/0x130 [ 680.354042][T25148] ? putname+0xef/0x130 [ 680.358379][T25148] ? rcu_read_lock_sched_held+0x110/0x130 [ 680.364128][T25148] ? kmem_cache_free+0x222/0x260 [ 680.369090][T25148] tomoyo_path_mkdir+0xaa/0xf0 [ 680.373868][T25148] ? tomoyo_file_ioctl+0x30/0x30 [ 680.378827][T25148] ? kern_path_mountpoint+0x40/0x40 [ 680.384038][T25148] ? strncpy_from_user+0x2ac/0x380 [ 680.384134][T25148] security_path_mkdir+0x113/0x170 [ 680.384155][T25148] do_mkdirat+0x160/0x2a0 [ 680.384189][T25148] ? __ia32_sys_mknod+0xb0/0xb0 13:24:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x0, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) [ 680.403611][T25148] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 680.409141][T25148] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 680.415330][T25148] ? do_syscall_64+0x26/0x680 [ 680.415350][T25148] ? lockdep_hardirqs_on+0x418/0x5d0 [ 680.415373][T25148] __x64_sys_mkdir+0x5c/0x80 [ 680.415394][T25148] do_syscall_64+0xfd/0x680 [ 680.434430][T25148] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 680.440336][T25148] RIP: 0033:0x458697 [ 680.444248][T25148] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 680.463854][T25148] RSP: 002b:00007f050b165a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 680.472384][T25148] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458697 [ 680.472393][T25148] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 680.472402][T25148] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 680.472412][T25148] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 13:24:31 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x60, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 680.472421][T25148] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 [ 680.505540][T25148] ERROR: Out of memory at tomoyo_realpath_from_path. 13:24:32 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0xffc99a3b}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 13:24:32 executing program 1 (fault-call:0 fault-nth:41): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, 0x0, 0x0) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) [ 680.732939][T25176] FAULT_INJECTION: forcing a failure. [ 680.732939][T25176] name failslab, interval 1, probability 0, space 0, times 0 [ 680.745745][T25176] CPU: 0 PID: 25176 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 680.753756][T25176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 680.763831][T25176] Call Trace: [ 680.767162][T25176] dump_stack+0x172/0x1f0 [ 680.771540][T25176] should_fail.cold+0xa/0x15 [ 680.776162][T25176] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 680.781999][T25176] ? mark_held_locks+0xf0/0xf0 [ 680.786801][T25176] ? __es_tree_search.isra.0+0x1bf/0x230 [ 680.792466][T25176] ? save_stack+0x5c/0x90 [ 680.796837][T25176] __should_failslab+0x121/0x190 [ 680.801913][T25176] should_failslab+0x9/0x14 [ 680.806551][T25176] kmem_cache_alloc+0x47/0x6f0 [ 680.811433][T25176] ? ext4_es_scan+0x730/0x730 [ 680.816144][T25176] ? do_raw_write_lock+0x124/0x290 [ 680.821298][T25176] __es_insert_extent+0x2cc/0xf20 [ 680.826363][T25176] ext4_es_insert_extent+0x2b7/0xa30 [ 680.831682][T25176] ? ext4_es_scan_clu+0x50/0x50 [ 680.836574][T25176] ? rcu_read_lock_sched_held+0x110/0x130 [ 680.842465][T25176] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 680.848734][T25176] ? ext4_es_find_extent_range+0xff/0x600 [ 680.854616][T25176] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 680.860196][T25176] ? ext4_rereserve_cluster+0x240/0x240 [ 680.865772][T25176] ? ext4_find_extent+0x76e/0x9d0 [ 680.870837][T25176] ? ext4_find_extent+0x6a6/0x9d0 [ 680.875898][T25176] ext4_ext_map_blocks+0x20a1/0x5250 [ 680.881212][T25176] ? mark_held_locks+0xf0/0xf0 [ 680.886027][T25176] ? ext4_ext_release+0x10/0x10 [ 680.890921][T25176] ? lock_acquire+0x16f/0x3f0 [ 680.895642][T25176] ? ext4_map_blocks+0x3fd/0x18e0 [ 680.900761][T25176] ? kasan_check_write+0x14/0x20 [ 680.905768][T25176] ext4_map_blocks+0xec7/0x18e0 [ 680.910663][T25176] ? ext4_issue_zeroout+0x190/0x190 [ 680.915900][T25176] ? kasan_check_write+0x14/0x20 [ 680.920870][T25176] ext4_getblk+0xc4/0x510 [ 680.925234][T25176] ? ext4_iomap_begin+0xfe0/0xfe0 [ 680.930299][T25176] ext4_bread+0x8f/0x230 [ 680.934571][T25176] ? ext4_getblk+0x510/0x510 [ 680.939207][T25176] ext4_append+0x155/0x370 [ 680.943664][T25176] ext4_mkdir+0x61b/0xdf0 [ 680.948032][T25176] ? ext4_init_dot_dotdot+0x520/0x520 [ 680.953432][T25176] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 680.959696][T25176] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 680.966151][T25176] ? security_inode_permission+0xcb/0x100 [ 680.972075][T25176] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 680.978353][T25176] ? security_inode_mkdir+0xe4/0x120 [ 680.983672][T25176] vfs_mkdir+0x42e/0x670 [ 680.987953][T25176] do_mkdirat+0x234/0x2a0 [ 680.992319][T25176] ? __ia32_sys_mknod+0xb0/0xb0 [ 680.997210][T25176] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 681.002701][T25176] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 681.008803][T25176] ? do_syscall_64+0x26/0x680 [ 681.013508][T25176] ? lockdep_hardirqs_on+0x418/0x5d0 [ 681.018834][T25176] __x64_sys_mkdir+0x5c/0x80 [ 681.023464][T25176] do_syscall_64+0xfd/0x680 [ 681.027999][T25176] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 681.033920][T25176] RIP: 0033:0x458697 [ 681.037850][T25176] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 681.057678][T25176] RSP: 002b:00007f050b165a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 681.066123][T25176] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458697 [ 681.074131][T25176] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 681.082308][T25176] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 681.090324][T25176] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 681.098331][T25176] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:32 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x10', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:32 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0xffc99a3b00000000}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 13:24:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x2000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) 13:24:32 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0xf0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:32 executing program 1 (fault-call:0 fault-nth:42): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, 0x0, 0x0) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:24:32 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0xfc, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:32 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3b9ac9ff}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 13:24:33 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs#', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 681.528581][T25191] FAULT_INJECTION: forcing a failure. [ 681.528581][T25191] name failslab, interval 1, probability 0, space 0, times 0 13:24:33 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x300, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 681.576441][T25191] CPU: 1 PID: 25191 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 681.584777][T25191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 681.584786][T25191] Call Trace: [ 681.584820][T25191] dump_stack+0x172/0x1f0 [ 681.584850][T25191] should_fail.cold+0xa/0x15 [ 681.584874][T25191] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 681.584897][T25191] ? ___might_sleep+0x163/0x280 [ 681.584921][T25191] __should_failslab+0x121/0x190 [ 681.584949][T25191] should_failslab+0x9/0x14 [ 681.628128][T25191] __kmalloc_track_caller+0x2d5/0x740 [ 681.628149][T25191] ? setup_sigcontext+0x7d0/0x7d0 [ 681.628170][T25191] ? __bad_area_nosemaphore+0xb3/0x420 [ 681.638893][T25191] ? strndup_user+0x77/0xd0 [ 681.649427][T25191] memdup_user+0x26/0xb0 [ 681.653710][T25191] strndup_user+0x77/0xd0 [ 681.658078][T25191] ksys_mount+0x3c/0x150 [ 681.662356][T25191] __x64_sys_mount+0xbe/0x150 [ 681.667198][T25191] do_syscall_64+0xfd/0x680 [ 681.671908][T25191] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 681.677825][T25191] RIP: 0033:0x45bcca [ 681.681807][T25191] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 681.701701][T25191] RSP: 002b:00007f050b165a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 681.710233][T25191] RAX: ffffffffffffffda RBX: 00007f050b165b40 RCX: 000000000045bcca [ 681.718237][T25191] RDX: 00007f050b165ae0 RSI: 00000000200000c0 RDI: 00007f050b165b00 13:24:33 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xffc99a3b}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 13:24:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, 0x0, 0x0) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) [ 681.726237][T25191] RBP: 0000000000000001 R08: 00007f050b165b40 R09: 00007f050b165ae0 [ 681.734236][T25191] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 681.742228][T25191] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:33 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x500, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:33 executing program 1 (fault-call:0 fault-nth:43): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 681.961282][T25220] FAULT_INJECTION: forcing a failure. [ 681.961282][T25220] name failslab, interval 1, probability 0, space 0, times 0 [ 681.974385][T25220] CPU: 1 PID: 25220 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 681.982402][T25220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 681.992506][T25220] Call Trace: [ 681.995827][T25220] dump_stack+0x172/0x1f0 [ 681.995852][T25220] should_fail.cold+0xa/0x15 [ 681.995874][T25220] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 682.010819][T25220] ? mark_held_locks+0xf0/0xf0 [ 682.015641][T25220] ? __es_tree_search.isra.0+0x1bf/0x230 [ 682.021334][T25220] ? save_stack+0x5c/0x90 [ 682.025724][T25220] __should_failslab+0x121/0x190 [ 682.030708][T25220] should_failslab+0x9/0x14 [ 682.035476][T25220] kmem_cache_alloc+0x47/0x6f0 [ 682.040283][T25220] ? ext4_es_scan+0x730/0x730 [ 682.045151][T25220] ? do_raw_write_lock+0x124/0x290 [ 682.050544][T25220] __es_insert_extent+0x2cc/0xf20 [ 682.055927][T25220] ext4_es_insert_extent+0x2b7/0xa30 [ 682.061299][T25220] ? ext4_es_scan_clu+0x50/0x50 [ 682.066195][T25220] ? rcu_read_lock_sched_held+0x110/0x130 [ 682.072096][T25220] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 682.078465][T25220] ? ext4_es_find_extent_range+0xff/0x600 [ 682.084303][T25220] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 682.089878][T25220] ? ext4_rereserve_cluster+0x240/0x240 [ 682.095455][T25220] ? ext4_find_extent+0x76e/0x9d0 [ 682.100508][T25220] ? ext4_find_extent+0x6a6/0x9d0 [ 682.105590][T25220] ext4_ext_map_blocks+0x20a1/0x5250 [ 682.110989][T25220] ? mark_held_locks+0xf0/0xf0 [ 682.115986][T25220] ? ext4_ext_release+0x10/0x10 [ 682.120873][T25220] ? lock_acquire+0x16f/0x3f0 [ 682.125576][T25220] ? ext4_map_blocks+0x3fd/0x18e0 [ 682.130723][T25220] ? kasan_check_write+0x14/0x20 [ 682.135715][T25220] ext4_map_blocks+0xec7/0x18e0 [ 682.140620][T25220] ? ext4_issue_zeroout+0x190/0x190 [ 682.145854][T25220] ? kasan_check_write+0x14/0x20 [ 682.150821][T25220] ext4_getblk+0xc4/0x510 [ 682.155179][T25220] ? ext4_iomap_begin+0xfe0/0xfe0 [ 682.160329][T25220] ext4_bread+0x8f/0x230 [ 682.164624][T25220] ? ext4_getblk+0x510/0x510 [ 682.169253][T25220] ext4_append+0x155/0x370 [ 682.173870][T25220] ext4_mkdir+0x61b/0xdf0 [ 682.178237][T25220] ? ext4_init_dot_dotdot+0x520/0x520 [ 682.183644][T25220] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 682.190090][T25220] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 682.196526][T25220] ? security_inode_permission+0xcb/0x100 [ 682.202308][T25220] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 682.208576][T25220] ? security_inode_mkdir+0xe4/0x120 [ 682.213986][T25220] vfs_mkdir+0x42e/0x670 [ 682.218267][T25220] do_mkdirat+0x234/0x2a0 [ 682.222718][T25220] ? __ia32_sys_mknod+0xb0/0xb0 [ 682.227599][T25220] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 682.233181][T25220] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 682.239388][T25220] ? do_syscall_64+0x26/0x680 [ 682.244212][T25220] ? lockdep_hardirqs_on+0x418/0x5d0 [ 682.249647][T25220] __x64_sys_mkdir+0x5c/0x80 [ 682.254316][T25220] do_syscall_64+0xfd/0x680 13:24:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x7000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) 13:24:33 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xffc99a3b00000000}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 13:24:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(0xffffffffffffffff, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:24:33 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfsH', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:33 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x543, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 682.258916][T25220] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 682.264862][T25220] RIP: 0033:0x458697 [ 682.268792][T25220] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 682.292701][T25220] RSP: 002b:00007f050b165a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 682.301324][T25220] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458697 [ 682.309610][T25220] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 682.317743][T25220] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 682.325844][T25220] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 682.334384][T25220] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:33 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x600, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:33 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x3b9ac9ff}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 13:24:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(0xffffffffffffffff, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:24:33 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x608, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:34 executing program 1 (fault-call:0 fault-nth:44): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:34 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x689, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(0xffffffffffffffff, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) [ 682.798510][T25256] FAULT_INJECTION: forcing a failure. [ 682.798510][T25256] name failslab, interval 1, probability 0, space 0, times 0 [ 682.825810][T25256] CPU: 0 PID: 25256 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 682.833897][T25256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 682.844091][T25256] Call Trace: [ 682.847460][T25256] dump_stack+0x172/0x1f0 [ 682.851973][T25256] should_fail.cold+0xa/0x15 [ 682.856629][T25256] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 682.862499][T25256] ? ___might_sleep+0x163/0x280 [ 682.867405][T25256] __should_failslab+0x121/0x190 [ 682.872591][T25256] should_failslab+0x9/0x14 [ 682.877147][T25256] __kmalloc+0x2d9/0x740 [ 682.881536][T25256] ? ext4_find_extent+0x76e/0x9d0 [ 682.886614][T25256] ext4_find_extent+0x76e/0x9d0 [ 682.891716][T25256] ext4_ext_map_blocks+0x1c3/0x5250 [ 682.896979][T25256] ? ext4_ext_release+0x10/0x10 [ 682.902020][T25256] ? lock_acquire+0x16f/0x3f0 [ 682.906749][T25256] ? ext4_map_blocks+0x85d/0x18e0 [ 682.911854][T25256] ext4_map_blocks+0x8c5/0x18e0 [ 682.916852][T25256] ? ext4_issue_zeroout+0x190/0x190 [ 682.922290][T25256] ? kasan_check_write+0x14/0x20 [ 682.927433][T25256] ext4_getblk+0xc4/0x510 [ 682.931822][T25256] ? ext4_iomap_begin+0xfe0/0xfe0 [ 682.936911][T25256] ext4_bread+0x8f/0x230 [ 682.941296][T25256] ? ext4_getblk+0x510/0x510 [ 682.945947][T25256] ext4_append+0x155/0x370 [ 682.950430][T25256] ext4_mkdir+0x61b/0xdf0 [ 682.954915][T25256] ? ext4_init_dot_dotdot+0x520/0x520 [ 682.960350][T25256] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 682.966794][T25256] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 682.973090][T25256] ? security_inode_permission+0xcb/0x100 [ 682.978873][T25256] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 682.985405][T25256] ? security_inode_mkdir+0xe4/0x120 [ 682.990749][T25256] vfs_mkdir+0x42e/0x670 [ 682.995136][T25256] do_mkdirat+0x234/0x2a0 [ 682.999524][T25256] ? __ia32_sys_mknod+0xb0/0xb0 [ 683.004439][T25256] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 683.009957][T25256] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 683.016082][T25256] ? do_syscall_64+0x26/0x680 [ 683.020901][T25256] ? lockdep_hardirqs_on+0x418/0x5d0 [ 683.026261][T25256] __x64_sys_mkdir+0x5c/0x80 [ 683.030913][T25256] do_syscall_64+0xfd/0x680 [ 683.035477][T25256] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 683.041622][T25256] RIP: 0033:0x458697 [ 683.045597][T25256] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 683.066180][T25256] RSP: 002b:00007f050b165a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 683.074644][T25256] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458697 [ 683.082662][T25256] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 683.091101][T25256] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 683.099119][T25256] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 683.107297][T25256] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:34 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfsL', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:34 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x700, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:34 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0xffc99a3b}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 13:24:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000002, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) 13:24:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:24:34 executing program 1 (fault-call:0 fault-nth:45): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 683.350261][T25268] FAULT_INJECTION: forcing a failure. [ 683.350261][T25268] name failslab, interval 1, probability 0, space 0, times 0 [ 683.364235][T25268] CPU: 0 PID: 25268 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 683.372346][T25268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 683.382700][T25268] Call Trace: [ 683.386036][T25268] dump_stack+0x172/0x1f0 [ 683.391266][T25268] should_fail.cold+0xa/0x15 [ 683.395939][T25268] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 683.401887][T25268] ? mark_held_locks+0xf0/0xf0 [ 683.406704][T25268] ? __es_tree_search.isra.0+0x1bf/0x230 [ 683.412393][T25268] ? save_stack+0x5c/0x90 [ 683.416774][T25268] __should_failslab+0x121/0x190 [ 683.421848][T25268] should_failslab+0x9/0x14 [ 683.426400][T25268] kmem_cache_alloc+0x47/0x6f0 [ 683.431223][T25268] ? ext4_es_scan+0x730/0x730 [ 683.436045][T25268] ? do_raw_write_lock+0x124/0x290 [ 683.441230][T25268] __es_insert_extent+0x2cc/0xf20 [ 683.446317][T25268] ext4_es_insert_extent+0x2b7/0xa30 [ 683.451972][T25268] ? ext4_es_scan_clu+0x50/0x50 [ 683.456885][T25268] ? rcu_read_lock_sched_held+0x110/0x130 [ 683.462770][T25268] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 683.469095][T25268] ? ext4_es_find_extent_range+0xff/0x600 [ 683.474870][T25268] ext4_ext_put_gap_in_cache+0xfe/0x150 [ 683.480564][T25268] ? ext4_rereserve_cluster+0x240/0x240 [ 683.486164][T25268] ? ext4_find_extent+0x76e/0x9d0 [ 683.491247][T25268] ? ext4_find_extent+0x6a6/0x9d0 [ 683.496367][T25268] ext4_ext_map_blocks+0x20a1/0x5250 [ 683.501820][T25268] ? mark_held_locks+0xf0/0xf0 [ 683.506655][T25268] ? ext4_ext_release+0x10/0x10 [ 683.511571][T25268] ? lock_acquire+0x16f/0x3f0 [ 683.516293][T25268] ? ext4_map_blocks+0x3fd/0x18e0 [ 683.521472][T25268] ? kasan_check_write+0x14/0x20 [ 683.526559][T25268] ext4_map_blocks+0xec7/0x18e0 [ 683.531716][T25268] ? ext4_issue_zeroout+0x190/0x190 [ 683.537067][T25268] ? kasan_check_write+0x14/0x20 [ 683.542494][T25268] ext4_getblk+0xc4/0x510 [ 683.546876][T25268] ? ext4_iomap_begin+0xfe0/0xfe0 [ 683.552012][T25268] ext4_bread+0x8f/0x230 [ 683.556309][T25268] ? ext4_getblk+0x510/0x510 [ 683.560955][T25268] ext4_append+0x155/0x370 [ 683.565625][T25268] ext4_mkdir+0x61b/0xdf0 [ 683.570018][T25268] ? ext4_init_dot_dotdot+0x520/0x520 [ 683.575438][T25268] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 683.581731][T25268] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 683.588027][T25268] ? security_inode_permission+0xcb/0x100 [ 683.594194][T25268] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 683.600490][T25268] ? security_inode_mkdir+0xe4/0x120 [ 683.605833][T25268] vfs_mkdir+0x42e/0x670 [ 683.610143][T25268] do_mkdirat+0x234/0x2a0 [ 683.614615][T25268] ? __ia32_sys_mknod+0xb0/0xb0 [ 683.619506][T25268] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 683.625163][T25268] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 683.631454][T25268] ? do_syscall_64+0x26/0x680 [ 683.636188][T25268] ? lockdep_hardirqs_on+0x418/0x5d0 [ 683.641658][T25268] __x64_sys_mkdir+0x5c/0x80 [ 683.646309][T25268] do_syscall_64+0xfd/0x680 [ 683.651046][T25268] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 683.656984][T25268] RIP: 0033:0x458697 [ 683.661034][T25268] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 683.680676][T25268] RSP: 002b:00007f050b165a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 683.689138][T25268] RAX: ffffffffffffffda RBX: 0000000020000228 RCX: 0000000000458697 13:24:35 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x806, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:24:35 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0xffc99a3b00000000}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 683.697175][T25268] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 00000000200000c0 [ 683.705403][T25268] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 683.713425][T25268] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 683.722204][T25268] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:35 executing program 1 (fault-call:0 fault-nth:46): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:35 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0xb00, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:35 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs`', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:35 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3b9ac9ff}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 13:24:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:24:35 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0xd00, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 684.050915][T25287] FAULT_INJECTION: forcing a failure. [ 684.050915][T25287] name failslab, interval 1, probability 0, space 0, times 0 [ 684.087565][T25287] CPU: 1 PID: 25287 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 684.095853][T25287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 684.106564][T25287] Call Trace: [ 684.106612][T25287] dump_stack+0x172/0x1f0 [ 684.106638][T25287] should_fail.cold+0xa/0x15 [ 684.106660][T25287] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 684.106693][T25287] ? ___might_sleep+0x163/0x280 [ 684.106718][T25287] __should_failslab+0x121/0x190 [ 684.106741][T25287] should_failslab+0x9/0x14 [ 684.106755][T25287] __kmalloc_track_caller+0x2d5/0x740 [ 684.106787][T25287] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 684.151822][T25287] ? strndup_user+0x77/0xd0 [ 684.156394][T25287] memdup_user+0x26/0xb0 [ 684.160905][T25287] strndup_user+0x77/0xd0 [ 684.165308][T25287] ksys_mount+0x7b/0x150 [ 684.169735][T25287] __x64_sys_mount+0xbe/0x150 [ 684.174469][T25287] do_syscall_64+0xfd/0x680 [ 684.179063][T25287] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 684.185018][T25287] RIP: 0033:0x45bcca [ 684.189231][T25287] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 684.209185][T25287] RSP: 002b:00007f050b165a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 684.209203][T25287] RAX: ffffffffffffffda RBX: 00007f050b165b40 RCX: 000000000045bcca [ 684.209211][T25287] RDX: 00007f050b165ae0 RSI: 00000000200000c0 RDI: 00007f050b165b00 [ 684.209218][T25287] RBP: 0000000000000001 R08: 00007f050b165b40 R09: 00007f050b165ae0 13:24:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000004, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) 13:24:35 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 684.209225][T25287] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 684.209231][T25287] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000), 0x0) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:24:35 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0xe80, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:35 executing program 1 (fault-call:0 fault-nth:47): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:35 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfsh', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:36 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b00000000}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 684.531474][T25315] FAULT_INJECTION: forcing a failure. [ 684.531474][T25315] name failslab, interval 1, probability 0, space 0, times 0 [ 684.577014][T25315] CPU: 0 PID: 25315 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 684.585100][T25315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 684.595486][T25315] Call Trace: [ 684.598856][T25315] dump_stack+0x172/0x1f0 [ 684.603357][T25315] should_fail.cold+0xa/0x15 [ 684.608296][T25315] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 684.614278][T25315] ? ___might_sleep+0x163/0x280 [ 684.619366][T25315] __should_failslab+0x121/0x190 [ 684.624470][T25315] should_failslab+0x9/0x14 [ 684.629042][T25315] __kmalloc_track_caller+0x2d5/0x740 [ 684.634489][T25315] ? setup_sigcontext+0x7d0/0x7d0 [ 684.639668][T25315] ? __bad_area_nosemaphore+0xb3/0x420 [ 684.645296][T25315] ? strndup_user+0x77/0xd0 [ 684.650062][T25315] memdup_user+0x26/0xb0 [ 684.654392][T25315] strndup_user+0x77/0xd0 [ 684.658795][T25315] ksys_mount+0x3c/0x150 [ 684.663216][T25315] __x64_sys_mount+0xbe/0x150 [ 684.667967][T25315] do_syscall_64+0xfd/0x680 [ 684.672546][T25315] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 684.678589][T25315] RIP: 0033:0x45bcca [ 684.682631][T25315] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 684.703409][T25315] RSP: 002b:00007f050b165a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 684.711980][T25315] RAX: ffffffffffffffda RBX: 00007f050b165b40 RCX: 000000000045bcca 13:24:36 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x2800, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000), 0x0) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) [ 684.720266][T25315] RDX: 00007f050b165ae0 RSI: 00000000200000c0 RDI: 00007f050b165b00 [ 684.728573][T25315] RBP: 0000000000000001 R08: 00007f050b165b40 R09: 00007f050b165ae0 [ 684.736693][T25315] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 684.744985][T25315] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:36 executing program 1 (fault-call:0 fault-nth:48): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:36 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b9ac9ff}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 13:24:36 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x2900, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 685.019186][T25333] FAULT_INJECTION: forcing a failure. [ 685.019186][T25333] name failslab, interval 1, probability 0, space 0, times 0 [ 685.062893][T25333] CPU: 0 PID: 25333 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 685.071252][T25333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 685.081534][T25333] Call Trace: [ 685.085051][T25333] dump_stack+0x172/0x1f0 [ 685.089623][T25333] should_fail.cold+0xa/0x15 [ 685.094375][T25333] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 685.100274][T25333] ? ___might_sleep+0x163/0x280 [ 685.105240][T25333] __should_failslab+0x121/0x190 [ 685.110498][T25333] should_failslab+0x9/0x14 [ 685.115523][T25333] __kmalloc_track_caller+0x2d5/0x740 [ 685.121041][T25333] ? setup_sigcontext+0x7d0/0x7d0 [ 685.126500][T25333] ? __bad_area_nosemaphore+0xb3/0x420 [ 685.132285][T25333] ? strndup_user+0x77/0xd0 [ 685.136865][T25333] memdup_user+0x26/0xb0 [ 685.141196][T25333] strndup_user+0x77/0xd0 [ 685.145595][T25333] ksys_mount+0x3c/0x150 [ 685.150001][T25333] __x64_sys_mount+0xbe/0x150 [ 685.154745][T25333] do_syscall_64+0xfd/0x680 [ 685.159313][T25333] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 685.165386][T25333] RIP: 0033:0x45bcca [ 685.169333][T25333] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 685.189315][T25333] RSP: 002b:00007f050b165a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 685.197787][T25333] RAX: ffffffffffffffda RBX: 00007f050b165b40 RCX: 000000000045bcca 13:24:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x800000c, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) 13:24:36 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfsl', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000), 0x0) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:24:36 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x2b00, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:36 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 685.205913][T25333] RDX: 00007f050b165ae0 RSI: 00000000200000c0 RDI: 00007f050b165b00 [ 685.214505][T25333] RBP: 0000000000000001 R08: 00007f050b165b40 R09: 00007f050b165ae0 [ 685.223059][T25333] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 685.231180][T25333] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:36 executing program 1 (fault-call:0 fault-nth:49): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:36 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b00000000}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 13:24:36 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x2c00, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{0x0}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:24:37 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfst', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 685.544679][T25361] FAULT_INJECTION: forcing a failure. [ 685.544679][T25361] name failslab, interval 1, probability 0, space 0, times 0 [ 685.574445][T25361] CPU: 0 PID: 25361 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 685.582689][T25361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 685.592799][T25361] Call Trace: [ 685.596471][T25361] dump_stack+0x172/0x1f0 [ 685.600861][T25361] should_fail.cold+0xa/0x15 [ 685.605514][T25361] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 685.611363][T25361] ? ___might_sleep+0x163/0x280 [ 685.611387][T25361] __should_failslab+0x121/0x190 [ 685.611404][T25361] should_failslab+0x9/0x14 [ 685.611419][T25361] kmem_cache_alloc+0x2af/0x6f0 [ 685.611442][T25361] ? find_held_lock+0x35/0x130 [ 685.630900][T25361] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 685.641428][T25361] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 685.641449][T25361] getname_flags+0xd6/0x5b0 [ 685.641466][T25361] user_path_at_empty+0x2f/0x50 [ 685.641484][T25361] do_mount+0x150/0x1c00 [ 685.641498][T25361] ? copy_mount_options+0x5c/0x3a0 [ 685.641528][T25361] ? copy_mount_string+0x40/0x40 [ 685.661431][T25361] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 685.661449][T25361] ? _copy_from_user+0xdd/0x150 [ 685.661471][T25361] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 685.689213][T25361] ? copy_mount_options+0x280/0x3a0 [ 685.694548][T25361] ksys_mount+0xdb/0x150 [ 685.698841][T25361] __x64_sys_mount+0xbe/0x150 [ 685.703583][T25361] do_syscall_64+0xfd/0x680 [ 685.708141][T25361] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 685.714258][T25361] RIP: 0033:0x45bcca [ 685.718220][T25361] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 13:24:37 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x2f00, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:37 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b9ac9ff}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 685.738023][T25361] RSP: 002b:00007f050b165a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 685.746658][T25361] RAX: ffffffffffffffda RBX: 00007f050b165b40 RCX: 000000000045bcca [ 685.754671][T25361] RDX: 00007f050b165ae0 RSI: 00000000200000c0 RDI: 00007f050b165b00 [ 685.762782][T25361] RBP: 0000000000000001 R08: 00007f050b165b40 R09: 00007f050b165ae0 [ 685.771067][T25361] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 685.779092][T25361] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000c00, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) 13:24:37 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x3580, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:37 executing program 1 (fault-call:0 fault-nth:50): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{0x0}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:24:37 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 13:24:37 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfsz', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 686.267959][T25391] FAULT_INJECTION: forcing a failure. [ 686.267959][T25391] name failslab, interval 1, probability 0, space 0, times 0 [ 686.290722][T25391] CPU: 1 PID: 25391 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 686.299002][T25391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 686.309085][T25391] Call Trace: [ 686.312426][T25391] dump_stack+0x172/0x1f0 [ 686.316804][T25391] should_fail.cold+0xa/0x15 [ 686.321531][T25391] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 686.327386][T25391] ? ___might_sleep+0x163/0x280 [ 686.332461][T25391] __should_failslab+0x121/0x190 [ 686.337443][T25391] should_failslab+0x9/0x14 [ 686.341981][T25391] kmem_cache_alloc_trace+0x2ce/0x750 [ 686.347488][T25391] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 686.353814][T25391] ? _copy_from_user+0xdd/0x150 [ 686.358719][T25391] copy_mount_options+0x5c/0x3a0 [ 686.363708][T25391] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 686.370026][T25391] ksys_mount+0xa7/0x150 [ 686.374307][T25391] __x64_sys_mount+0xbe/0x150 [ 686.379007][T25391] do_syscall_64+0xfd/0x680 [ 686.383532][T25391] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 686.389447][T25391] RIP: 0033:0x45bcca [ 686.393360][T25391] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 13:24:37 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x3c00, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:37 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b00000000}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 13:24:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{0x0}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) [ 686.413329][T25391] RSP: 002b:00007f050b165a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 686.421783][T25391] RAX: ffffffffffffffda RBX: 00007f050b165b40 RCX: 000000000045bcca [ 686.429769][T25391] RDX: 00007f050b165ae0 RSI: 00000000200000c0 RDI: 00007f050b165b00 [ 686.437759][T25391] RBP: 0000000000000001 R08: 00007f050b165b40 R09: 00007f050b165ae0 [ 686.445755][T25391] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 686.453736][T25391] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:38 executing program 1 (fault-call:0 fault-nth:51): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:38 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:38 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x4000, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 686.702814][T25411] FAULT_INJECTION: forcing a failure. [ 686.702814][T25411] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 686.716234][T25411] CPU: 0 PID: 25411 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 686.724240][T25411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 686.734590][T25411] Call Trace: [ 686.737933][T25411] dump_stack+0x172/0x1f0 [ 686.742356][T25411] should_fail.cold+0xa/0x15 [ 686.747006][T25411] ? mark_held_locks+0xf0/0xf0 [ 686.751828][T25411] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 686.757679][T25411] ? mark_held_locks+0xf0/0xf0 [ 686.762580][T25411] should_fail_alloc_page+0x50/0x60 [ 686.767817][T25411] __alloc_pages_nodemask+0x1a1/0x8d0 [ 686.773223][T25411] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 686.778890][T25411] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 686.784643][T25411] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 686.790317][T25411] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 686.796601][T25411] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 686.802449][T25411] cache_grow_begin+0x9d/0x650 [ 686.807244][T25411] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 686.813585][T25411] kmem_cache_alloc_trace+0x67c/0x750 [ 686.818998][T25411] copy_mount_options+0x5c/0x3a0 [ 686.819019][T25411] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 686.819040][T25411] ksys_mount+0xa7/0x150 [ 686.834481][T25411] __x64_sys_mount+0xbe/0x150 [ 686.834507][T25411] do_syscall_64+0xfd/0x680 [ 686.843710][T25411] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 686.849634][T25411] RIP: 0033:0x45bcca [ 686.849654][T25411] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 686.849660][T25411] RSP: 002b:00007f050b165a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 686.849674][T25411] RAX: ffffffffffffffda RBX: 00007f050b165b40 RCX: 000000000045bcca [ 686.849682][T25411] RDX: 00007f050b165ae0 RSI: 00000000200000c0 RDI: 00007f050b165b00 [ 686.849689][T25411] RBP: 0000000000000001 R08: 00007f050b165b40 R09: 00007f050b165ae0 [ 686.849696][T25411] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 686.849703][T25411] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 [ 686.959393][T25415] hfs: can't find a HFS filesystem on dev loop3 [ 687.028473][T25415] hfs: can't find a HFS filesystem on dev loop3 13:24:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8004000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) 13:24:38 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x3b9ac9ff}, &(0x7f0000000200), 0x0) 13:24:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:24:38 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x4305, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:38 executing program 1 (fault-call:0 fault-nth:52): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:38 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:38 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x4788, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 687.293266][T25429] FAULT_INJECTION: forcing a failure. [ 687.293266][T25429] name failslab, interval 1, probability 0, space 0, times 0 [ 687.294859][T25431] hfs: can't find a HFS filesystem on dev loop3 13:24:38 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0xffc99a3b}, &(0x7f0000000200), 0x0) 13:24:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) [ 687.394852][T25429] CPU: 0 PID: 25429 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 687.402908][T25429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 687.412989][T25429] Call Trace: [ 687.416320][T25429] dump_stack+0x172/0x1f0 [ 687.420680][T25429] should_fail.cold+0xa/0x15 [ 687.425304][T25429] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 687.431142][T25429] ? ___might_sleep+0x163/0x280 [ 687.436025][T25429] __should_failslab+0x121/0x190 [ 687.440990][T25429] should_failslab+0x9/0x14 [ 687.445512][T25429] kmem_cache_alloc_trace+0x2ce/0x750 [ 687.450908][T25429] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 687.457160][T25429] ? _copy_from_user+0xdd/0x150 [ 687.462040][T25429] copy_mount_options+0x5c/0x3a0 [ 687.466998][T25429] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 687.473263][T25429] ksys_mount+0xa7/0x150 [ 687.477527][T25429] __x64_sys_mount+0xbe/0x150 [ 687.482231][T25429] do_syscall_64+0xfd/0x680 [ 687.486756][T25429] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 687.492662][T25429] RIP: 0033:0x45bcca [ 687.496673][T25429] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 687.516303][T25429] RSP: 002b:00007f050b165a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 687.524750][T25429] RAX: ffffffffffffffda RBX: 00007f050b165b40 RCX: 000000000045bcca [ 687.532755][T25429] RDX: 00007f050b165ae0 RSI: 00000000200000c0 RDI: 00007f050b165b00 [ 687.540754][T25429] RBP: 0000000000000001 R08: 00007f050b165b40 R09: 00007f050b165ae0 [ 687.548750][T25429] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 687.556748][T25429] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:39 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:39 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x4888, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:39 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0xffc99a3b00000000}, &(0x7f0000000200), 0x0) [ 687.805081][T25448] hfs: can't find a HFS filesystem on dev loop3 [ 687.886667][T25448] hfs: can't find a HFS filesystem on dev loop3 13:24:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x800ff03, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) 13:24:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:24:39 executing program 1 (fault-call:0 fault-nth:53): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:39 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x5000, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:39 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x3b9ac9ff}, &(0x7f0000000200), 0x0) 13:24:39 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 688.248438][T25464] FAULT_INJECTION: forcing a failure. [ 688.248438][T25464] name failslab, interval 1, probability 0, space 0, times 0 [ 688.261814][T25464] CPU: 0 PID: 25464 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 688.269833][T25464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 688.287129][T25464] Call Trace: [ 688.290488][T25464] dump_stack+0x172/0x1f0 [ 688.294881][T25464] should_fail.cold+0xa/0x15 [ 688.299527][T25464] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 688.305390][T25464] ? ___might_sleep+0x163/0x280 [ 688.310290][T25464] __should_failslab+0x121/0x190 [ 688.315283][T25464] should_failslab+0x9/0x14 [ 688.319822][T25464] __kmalloc+0x2d9/0x740 [ 688.324109][T25464] ? tomoyo_realpath_from_path+0xc0/0x7a0 [ 688.329893][T25464] ? rcu_read_lock_sched_held+0x110/0x130 [ 688.335698][T25464] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 688.341466][T25464] tomoyo_realpath_from_path+0xcd/0x7a0 [ 688.347067][T25464] tomoyo_mount_acl+0x149/0x840 [ 688.351975][T25464] ? kasan_check_write+0x14/0x20 [ 688.356955][T25464] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 688.362553][T25464] ? lock_downgrade+0x880/0x880 [ 688.367466][T25464] ? mark_held_locks+0xf0/0xf0 [ 688.372287][T25464] ? lock_acquire+0x16f/0x3f0 [ 688.377030][T25464] ? tomoyo_mount_permission+0x10a/0x410 [ 688.382723][T25464] tomoyo_mount_permission+0x16a/0x410 [ 688.388243][T25464] ? tomoyo_mount_permission+0x10a/0x410 [ 688.393929][T25464] ? tomoyo_mount_acl+0x840/0x840 [ 688.399009][T25464] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 688.405300][T25464] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 688.411590][T25464] ? strncpy_from_user+0x2ac/0x380 [ 688.416767][T25464] tomoyo_sb_mount+0x35/0x40 [ 688.421405][T25464] security_sb_mount+0x87/0xd0 [ 688.426234][T25464] do_mount+0x1d4/0x1c00 [ 688.430523][T25464] ? copy_mount_options+0x5c/0x3a0 [ 688.435685][T25464] ? copy_mount_string+0x40/0x40 [ 688.440674][T25464] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 13:24:39 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x5800, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 688.447133][T25464] ? copy_mount_options+0x280/0x3a0 [ 688.452390][T25464] ksys_mount+0xdb/0x150 [ 688.456676][T25464] __x64_sys_mount+0xbe/0x150 [ 688.461496][T25464] do_syscall_64+0xfd/0x680 [ 688.466048][T25464] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 688.472004][T25464] RIP: 0033:0x45bcca [ 688.475953][T25464] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 688.495669][T25464] RSP: 002b:00007f050b165a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 688.504219][T25464] RAX: ffffffffffffffda RBX: 00007f050b165b40 RCX: 000000000045bcca [ 688.512232][T25464] RDX: 00007f050b165ae0 RSI: 00000000200000c0 RDI: 00007f050b165b00 [ 688.520246][T25464] RBP: 0000000000000001 R08: 00007f050b165b40 R09: 00007f050b165ae0 [ 688.528270][T25464] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 688.536279][T25464] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:40 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0xffc99a3b}, &(0x7f0000000200), 0x0) 13:24:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) [ 688.551983][T25464] ERROR: Out of memory at tomoyo_realpath_from_path. 13:24:40 executing program 1 (fault-call:0 fault-nth:54): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 688.617508][T25470] hfs: can't find a HFS filesystem on dev loop3 13:24:40 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x6000, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 688.717197][T25470] hfs: can't find a HFS filesystem on dev loop3 13:24:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) [ 688.803183][T25486] FAULT_INJECTION: forcing a failure. [ 688.803183][T25486] name failslab, interval 1, probability 0, space 0, times 0 [ 688.849981][T25486] CPU: 0 PID: 25486 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 688.858062][T25486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 688.868327][T25486] Call Trace: [ 688.871679][T25486] dump_stack+0x172/0x1f0 [ 688.876063][T25486] should_fail.cold+0xa/0x15 [ 688.880709][T25486] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 688.886917][T25486] ? ___might_sleep+0x163/0x280 [ 688.891815][T25486] __should_failslab+0x121/0x190 [ 688.896820][T25486] should_failslab+0x9/0x14 [ 688.901366][T25486] kmem_cache_alloc_trace+0x2ce/0x750 [ 688.906780][T25486] ? lockdep_init_map+0x1be/0x6d0 [ 688.911983][T25486] legacy_init_fs_context+0x48/0xe0 [ 688.917221][T25486] ? generic_parse_monolithic+0x200/0x200 [ 688.922980][T25486] alloc_fs_context+0x3a7/0x690 [ 688.927881][T25486] fs_context_for_mount+0x25/0x30 [ 688.932951][T25486] do_mount+0x132d/0x1c00 [ 688.937329][T25486] ? copy_mount_string+0x40/0x40 [ 688.942318][T25486] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 688.948588][T25486] ? copy_mount_options+0x280/0x3a0 [ 688.948611][T25486] ksys_mount+0xdb/0x150 [ 688.948633][T25486] __x64_sys_mount+0xbe/0x150 [ 688.962813][T25486] do_syscall_64+0xfd/0x680 [ 688.967342][T25486] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 688.973269][T25486] RIP: 0033:0x45bcca [ 688.977295][T25486] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 688.977305][T25486] RSP: 002b:00007f050b165a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 688.977317][T25486] RAX: ffffffffffffffda RBX: 00007f050b165b40 RCX: 000000000045bcca [ 688.977325][T25486] RDX: 00007f050b165ae0 RSI: 00000000200000c0 RDI: 00007f050b165b00 [ 688.977334][T25486] RBP: 0000000000000001 R08: 00007f050b165b40 R09: 00007f050b165ae0 [ 688.977342][T25486] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 688.977350][T25486] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0xa000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) 13:24:40 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0xffc99a3b00000000}, &(0x7f0000000200), 0x0) 13:24:40 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0xf0ff7f) 13:24:40 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x6488, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:40 executing program 1 (fault-call:0 fault-nth:55): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:40 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x800e, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 689.254410][T25499] FAULT_INJECTION: forcing a failure. [ 689.254410][T25499] name failslab, interval 1, probability 0, space 0, times 0 [ 689.316503][T25499] CPU: 1 PID: 25499 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 689.324542][T25499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 689.334679][T25499] Call Trace: [ 689.334716][T25499] dump_stack+0x172/0x1f0 [ 689.334745][T25499] should_fail.cold+0xa/0x15 [ 689.334771][T25499] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 689.352835][T25499] ? ___might_sleep+0x163/0x280 [ 689.352858][T25499] __should_failslab+0x121/0x190 [ 689.352878][T25499] should_failslab+0x9/0x14 [ 689.352892][T25499] kmem_cache_alloc+0x2af/0x6f0 [ 689.352907][T25499] ? kasan_check_write+0x14/0x20 [ 689.352926][T25499] getname_flags+0xd6/0x5b0 [ 689.352949][T25499] user_path_at_empty+0x2f/0x50 [ 689.388029][T25499] do_mount+0x150/0x1c00 [ 689.392324][T25499] ? copy_mount_options+0x5c/0x3a0 [ 689.397497][T25499] ? copy_mount_string+0x40/0x40 [ 689.402744][T25499] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 689.409144][T25499] ? copy_mount_options+0x280/0x3a0 [ 689.414383][T25499] ksys_mount+0xdb/0x150 [ 689.418816][T25499] __x64_sys_mount+0xbe/0x150 [ 689.423528][T25499] do_syscall_64+0xfd/0x680 [ 689.428055][T25499] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 689.428071][T25499] RIP: 0033:0x45bcca [ 689.428088][T25499] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 689.428105][T25499] RSP: 002b:00007f050b165a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 13:24:40 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x8035, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, 0x0, 0x0, 0xf0ff7f) 13:24:40 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x3b9ac9ff}, &(0x7f0000000200), 0x0) [ 689.437932][T25499] RAX: ffffffffffffffda RBX: 00007f050b165b40 RCX: 000000000045bcca [ 689.437943][T25499] RDX: 00007f050b165ae0 RSI: 00000000200000c0 RDI: 00007f050b165b00 [ 689.437953][T25499] RBP: 0000000000000001 R08: 00007f050b165b40 R09: 00007f050b165ae0 [ 689.437961][T25499] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 689.437970][T25499] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 [ 689.515456][T25502] hfs: can't find a HFS filesystem on dev loop3 13:24:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, 0x0, 0x0, 0xf0ff7f) 13:24:41 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0xffc99a3b}, &(0x7f0000000200), 0x0) [ 689.587133][T25502] hfs: can't find a HFS filesystem on dev loop3 13:24:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0xc000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) 13:24:41 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x80fe, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:41 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:41 executing program 1 (fault-call:0 fault-nth:56): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, 0x0, 0x0, 0xf0ff7f) 13:24:41 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0xffc99a3b00000000}, &(0x7f0000000200), 0x0) 13:24:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8), 0x0, 0xf0ff7f) [ 690.166604][T25533] FAULT_INJECTION: forcing a failure. [ 690.166604][T25533] name failslab, interval 1, probability 0, space 0, times 0 [ 690.239765][T25533] CPU: 0 PID: 25533 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 690.247844][T25533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 690.257931][T25533] Call Trace: [ 690.257977][T25533] dump_stack+0x172/0x1f0 [ 690.258012][T25533] should_fail.cold+0xa/0x15 [ 690.258040][T25533] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 690.270288][T25533] ? ___might_sleep+0x163/0x280 [ 690.281546][T25533] __should_failslab+0x121/0x190 [ 690.286535][T25533] should_failslab+0x9/0x14 [ 690.291086][T25533] __kmalloc_track_caller+0x2d5/0x740 [ 690.296497][T25533] ? mark_held_locks+0xf0/0xf0 [ 690.301301][T25533] ? __x64_sys_mount+0xbe/0x150 [ 690.306225][T25533] ? do_syscall_64+0xfd/0x680 [ 690.311034][T25533] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 690.317164][T25533] ? btrfs_mount+0xdc/0x15e2 [ 690.321823][T25533] kstrdup+0x3a/0x70 [ 690.325763][T25533] ? btrfs_remount+0x11f0/0x11f0 [ 690.330741][T25533] btrfs_mount+0xdc/0x15e2 [ 690.335215][T25533] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 690.340884][T25533] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 690.347186][T25533] ? should_fail+0x1de/0x852 [ 690.351828][T25533] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 690.357689][T25533] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 690.364022][T25533] ? btrfs_remount+0x11f0/0x11f0 [ 690.369003][T25533] ? rcu_read_lock_sched_held+0x110/0x130 [ 690.374849][T25533] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 690.381162][T25533] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 13:24:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8), 0x0, 0xf0ff7f) [ 690.387448][T25533] ? vfs_parse_fs_string+0x111/0x170 [ 690.392779][T25533] ? vfs_parse_fs_string+0x111/0x170 [ 690.398108][T25533] ? rcu_read_lock_sched_held+0x110/0x130 [ 690.403849][T25533] ? kfree+0x1f7/0x220 [ 690.407937][T25533] ? vfs_parse_fs_string+0x116/0x170 [ 690.407953][T25533] ? vfs_parse_fs_param+0x540/0x540 [ 690.407976][T25533] ? btrfs_remount+0x11f0/0x11f0 [ 690.407991][T25533] legacy_get_tree+0x108/0x220 [ 690.408005][T25533] ? legacy_get_tree+0x108/0x220 [ 690.408027][T25533] ? legacy_parse_monolithic+0x11f/0x180 [ 690.438975][T25533] vfs_get_tree+0x8e/0x390 [ 690.443415][T25533] do_mount+0x138c/0x1c00 [ 690.447787][T25533] ? copy_mount_string+0x40/0x40 [ 690.452760][T25533] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 690.459026][T25533] ? _copy_from_user+0xdd/0x150 [ 690.463913][T25533] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 690.470200][T25533] ? copy_mount_options+0x280/0x3a0 [ 690.475439][T25533] ksys_mount+0xdb/0x150 [ 690.479731][T25533] __x64_sys_mount+0xbe/0x150 [ 690.484449][T25533] do_syscall_64+0xfd/0x680 13:24:41 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x3b9ac9ff}, &(0x7f0000000200), 0x0) [ 690.488990][T25533] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 690.494909][T25533] RIP: 0033:0x45bcca [ 690.498829][T25533] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 690.518459][T25533] RSP: 002b:00007f050b165a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 690.526906][T25533] RAX: ffffffffffffffda RBX: 00007f050b165b40 RCX: 000000000045bcca 13:24:42 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x8100, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8), 0x0, 0xf0ff7f) [ 690.534905][T25533] RDX: 00007f050b165ae0 RSI: 00000000200000c0 RDI: 00007f050b165b00 [ 690.542910][T25533] RBP: 0000000000000001 R08: 00007f050b165b40 R09: 00007f050b165ae0 [ 690.542920][T25533] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 690.542927][T25533] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 [ 690.563775][T25537] hfs: can't find a HFS filesystem on dev loop3 13:24:42 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x8847, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 690.632154][T25537] hfs: can't find a HFS filesystem on dev loop3 13:24:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x40000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) 13:24:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, 0x0, 0x0, &(0x7f00001e1e78)}], 0x1, 0xf0ff7f) 13:24:42 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:42 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0xffc99a3b}, &(0x7f0000000200), 0x0) 13:24:42 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x8848, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:42 executing program 1 (fault-call:0 fault-nth:57): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 691.165743][T25570] FAULT_INJECTION: forcing a failure. [ 691.165743][T25570] name failslab, interval 1, probability 0, space 0, times 0 [ 691.175122][T25564] hfs: can't find a HFS filesystem on dev loop3 [ 691.207271][T25570] CPU: 1 PID: 25570 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 691.215327][T25570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 691.225489][T25570] Call Trace: [ 691.228832][T25570] dump_stack+0x172/0x1f0 [ 691.233218][T25570] should_fail.cold+0xa/0x15 [ 691.237872][T25570] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 691.243739][T25570] ? ___might_sleep+0x163/0x280 [ 691.248641][T25570] __should_failslab+0x121/0x190 [ 691.253637][T25570] should_failslab+0x9/0x14 [ 691.258203][T25570] __kmalloc_track_caller+0x2d5/0x740 [ 691.263632][T25570] ? mark_held_locks+0xf0/0xf0 [ 691.268461][T25570] ? __x64_sys_mount+0xbe/0x150 [ 691.273368][T25570] ? do_syscall_64+0xfd/0x680 [ 691.278089][T25570] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 691.285469][T25570] ? btrfs_mount+0xdc/0x15e2 [ 691.290119][T25570] kstrdup+0x3a/0x70 [ 691.294069][T25570] ? btrfs_remount+0x11f0/0x11f0 [ 691.299059][T25570] btrfs_mount+0xdc/0x15e2 [ 691.303530][T25570] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 691.309309][T25570] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 691.315608][T25570] ? should_fail+0x1de/0x852 [ 691.320256][T25570] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 691.326119][T25570] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 691.332422][T25570] ? btrfs_remount+0x11f0/0x11f0 [ 691.337427][T25570] ? rcu_read_lock_sched_held+0x110/0x130 [ 691.343320][T25570] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 691.349767][T25570] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 691.356252][T25570] ? vfs_parse_fs_string+0x111/0x170 [ 691.361594][T25570] ? vfs_parse_fs_string+0x111/0x170 [ 691.366930][T25570] ? rcu_read_lock_sched_held+0x110/0x130 [ 691.372708][T25570] ? kfree+0x1f7/0x220 [ 691.377039][T25570] ? vfs_parse_fs_string+0x116/0x170 [ 691.382488][T25570] ? vfs_parse_fs_param+0x540/0x540 [ 691.389293][T25570] ? btrfs_remount+0x11f0/0x11f0 [ 691.394387][T25570] legacy_get_tree+0x108/0x220 [ 691.399203][T25570] ? legacy_get_tree+0x108/0x220 [ 691.404199][T25570] ? legacy_parse_monolithic+0x11f/0x180 [ 691.409909][T25570] vfs_get_tree+0x8e/0x390 [ 691.414530][T25570] do_mount+0x138c/0x1c00 [ 691.418916][T25570] ? copy_mount_string+0x40/0x40 [ 691.423915][T25570] ? copy_mount_options+0x1d9/0x3a0 [ 691.429258][T25570] ? __sanitizer_cov_trace_const_cmp8+0x19/0x20 [ 691.435554][T25570] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 691.441847][T25570] ? copy_mount_options+0x280/0x3a0 [ 691.447220][T25570] ksys_mount+0xdb/0x150 [ 691.451517][T25570] __x64_sys_mount+0xbe/0x150 [ 691.456245][T25570] do_syscall_64+0xfd/0x680 [ 691.460783][T25570] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 691.466699][T25570] RIP: 0033:0x45bcca [ 691.470625][T25570] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 691.490351][T25570] RSP: 002b:00007f050b165a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 691.498812][T25570] RAX: ffffffffffffffda RBX: 00007f050b165b40 RCX: 000000000045bcca 13:24:42 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x8864, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:42 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0xffc99a3b00000000}, &(0x7f0000000200), 0x0) 13:24:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, 0x0, 0x0, &(0x7f00001e1e78)}], 0x1, 0xf0ff7f) [ 691.506909][T25570] RDX: 00007f050b165ae0 RSI: 00000000200000c0 RDI: 00007f050b165b00 [ 691.515089][T25570] RBP: 0000000000000001 R08: 00007f050b165b40 R09: 00007f050b165ae0 [ 691.523096][T25570] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 691.531097][T25570] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:43 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x3b9ac9ff}, &(0x7f0000000200), 0x0) 13:24:43 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs ', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:43 executing program 1 (fault-call:0 fault-nth:58): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 691.798574][T25586] FAULT_INJECTION: forcing a failure. [ 691.798574][T25586] name failslab, interval 1, probability 0, space 0, times 0 [ 691.812618][T25586] CPU: 1 PID: 25586 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 691.820650][T25586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 691.830741][T25586] Call Trace: [ 691.830780][T25586] dump_stack+0x172/0x1f0 [ 691.830810][T25586] should_fail.cold+0xa/0x15 [ 691.830831][T25586] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 691.830852][T25586] ? ___might_sleep+0x163/0x280 [ 691.830882][T25586] __should_failslab+0x121/0x190 [ 691.838680][T25586] should_failslab+0x9/0x14 [ 691.849120][T25586] __kmalloc+0x2d9/0x740 [ 691.849142][T25586] ? tomoyo_realpath_from_path+0xc0/0x7a0 [ 691.849160][T25586] ? rcu_read_lock_sched_held+0x110/0x130 [ 691.849191][T25586] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 691.885073][T25586] tomoyo_realpath_from_path+0xcd/0x7a0 [ 691.890708][T25586] tomoyo_mount_acl+0x149/0x840 [ 691.895609][T25586] ? kasan_check_write+0x14/0x20 [ 691.900682][T25586] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 691.906285][T25586] ? lock_downgrade+0x880/0x880 [ 691.912073][T25586] ? mark_held_locks+0xf0/0xf0 [ 691.916902][T25586] ? lock_acquire+0x16f/0x3f0 [ 691.921630][T25586] ? tomoyo_mount_permission+0x10a/0x410 [ 691.927321][T25586] tomoyo_mount_permission+0x16a/0x410 [ 691.932827][T25586] ? tomoyo_mount_permission+0x10a/0x410 [ 691.938514][T25586] ? tomoyo_mount_acl+0x840/0x840 [ 691.943584][T25586] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 691.949883][T25586] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 691.956171][T25586] ? strncpy_from_user+0x2ac/0x380 [ 691.961338][T25586] tomoyo_sb_mount+0x35/0x40 [ 691.965978][T25586] security_sb_mount+0x87/0xd0 [ 691.970789][T25586] do_mount+0x1d4/0x1c00 [ 691.975080][T25586] ? copy_mount_options+0x5c/0x3a0 [ 691.980240][T25586] ? copy_mount_string+0x40/0x40 [ 691.985231][T25586] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 691.991529][T25586] ? copy_mount_options+0x280/0x3a0 [ 691.996784][T25586] ksys_mount+0xdb/0x150 [ 692.001077][T25586] __x64_sys_mount+0xbe/0x150 [ 692.005807][T25586] do_syscall_64+0xfd/0x680 [ 692.010362][T25586] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 692.016301][T25586] RIP: 0033:0x45bcca [ 692.020232][T25586] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 692.039868][T25586] RSP: 002b:00007f050b165a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 692.048331][T25586] RAX: ffffffffffffffda RBX: 00007f050b165b40 RCX: 000000000045bcca [ 692.056336][T25586] RDX: 00007f050b165ae0 RSI: 00000000200000c0 RDI: 00007f050b165b00 [ 692.064341][T25586] RBP: 0000000000000001 R08: 00007f050b165b40 R09: 00007f050b165ae0 [ 692.072344][T25586] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 692.080357][T25586] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 [ 692.099038][T25586] ERROR: Out of memory at tomoyo_realpath_from_path. 13:24:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0xff030000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) 13:24:43 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x8906, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, 0x0, 0x0, &(0x7f00001e1e78)}], 0x1, 0xf0ff7f) 13:24:43 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b}, &(0x7f0000000200), 0x0) 13:24:43 executing program 1 (fault-call:0 fault-nth:59): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:43 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 692.485654][T25606] FAULT_INJECTION: forcing a failure. [ 692.485654][T25606] name failslab, interval 1, probability 0, space 0, times 0 13:24:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80)}], 0x1, 0xf0ff7f) 13:24:44 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0xc0fe, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 692.528462][T25609] hfs: can't find a HFS filesystem on dev loop3 [ 692.575640][T25606] CPU: 1 PID: 25606 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 692.583711][T25606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 692.593796][T25606] Call Trace: [ 692.597132][T25606] dump_stack+0x172/0x1f0 [ 692.601507][T25606] should_fail.cold+0xa/0x15 [ 692.606180][T25606] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 692.612020][T25606] ? ___might_sleep+0x163/0x280 [ 692.617047][T25606] __should_failslab+0x121/0x190 [ 692.622015][T25606] should_failslab+0x9/0x14 [ 692.626544][T25606] __kmalloc+0x2d9/0x740 [ 692.630826][T25606] ? tomoyo_realpath_from_path+0xc0/0x7a0 [ 692.636582][T25606] ? rcu_read_lock_sched_held+0x110/0x130 [ 692.642330][T25606] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 692.648088][T25606] tomoyo_realpath_from_path+0xcd/0x7a0 [ 692.653685][T25606] tomoyo_mount_acl+0x2cc/0x840 [ 692.658582][T25606] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 692.664167][T25606] ? lock_downgrade+0x880/0x880 [ 692.669058][T25606] ? mark_held_locks+0xf0/0xf0 [ 692.674023][T25606] ? lock_acquire+0x16f/0x3f0 [ 692.678735][T25606] ? tomoyo_mount_permission+0x10a/0x410 [ 692.684410][T25606] tomoyo_mount_permission+0x16a/0x410 [ 692.689901][T25606] ? tomoyo_mount_permission+0x10a/0x410 [ 692.695563][T25606] ? tomoyo_mount_acl+0x840/0x840 [ 692.700710][T25606] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 692.707125][T25606] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 692.713400][T25606] ? strncpy_from_user+0x2ac/0x380 [ 692.718545][T25606] tomoyo_sb_mount+0x35/0x40 [ 692.723343][T25606] security_sb_mount+0x87/0xd0 [ 692.728151][T25606] do_mount+0x1d4/0x1c00 [ 692.732437][T25606] ? copy_mount_options+0x5c/0x3a0 [ 692.737586][T25606] ? copy_mount_string+0x40/0x40 [ 692.742573][T25606] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 692.748989][T25606] ? copy_mount_options+0x280/0x3a0 [ 692.754364][T25606] ksys_mount+0xdb/0x150 [ 692.758642][T25606] __x64_sys_mount+0xbe/0x150 [ 692.763356][T25606] do_syscall_64+0xfd/0x680 [ 692.767892][T25606] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 692.773813][T25606] RIP: 0033:0x45bcca [ 692.777722][T25606] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 692.797636][T25606] RSP: 002b:00007f050b165a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 692.806088][T25606] RAX: ffffffffffffffda RBX: 00007f050b165b40 RCX: 000000000045bcca [ 692.814210][T25606] RDX: 00007f050b165ae0 RSI: 00000000200000c0 RDI: 00007f050b165b00 13:24:44 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b00000000}, &(0x7f0000000200), 0x0) [ 692.822225][T25606] RBP: 0000000000000001 R08: 00007f050b165b40 R09: 00007f050b165ae0 [ 692.830235][T25606] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 692.838238][T25606] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 [ 692.857229][T25606] ERROR: Out of memory at tomoyo_realpath_from_path. 13:24:44 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0xf000, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 692.928865][T25609] hfs: can't find a HFS filesystem on dev loop3 13:24:44 executing program 1 (fault-call:0 fault-nth:60): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:44 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b9ac9ff}, &(0x7f0000000200), 0x0) [ 693.123222][T25626] FAULT_INJECTION: forcing a failure. [ 693.123222][T25626] name failslab, interval 1, probability 0, space 0, times 0 [ 693.136098][T25626] CPU: 1 PID: 25626 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 693.144097][T25626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 693.154169][T25626] Call Trace: [ 693.157497][T25626] dump_stack+0x172/0x1f0 [ 693.161855][T25626] should_fail.cold+0xa/0x15 [ 693.166475][T25626] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 693.172296][T25626] ? ___might_sleep+0x163/0x280 [ 693.172320][T25626] __should_failslab+0x121/0x190 [ 693.172340][T25626] should_failslab+0x9/0x14 [ 693.172354][T25626] kmem_cache_alloc+0x2af/0x6f0 [ 693.172375][T25626] ? kasan_check_write+0x14/0x20 [ 693.186662][T25626] getname_kernel+0x53/0x370 [ 693.186690][T25626] kern_path+0x20/0x40 [ 693.186713][T25626] tomoyo_mount_acl+0x28c/0x840 [ 693.209992][T25626] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 693.215558][T25626] ? lock_downgrade+0x880/0x880 [ 693.220459][T25626] ? mark_held_locks+0xf0/0xf0 [ 693.220495][T25626] ? lock_acquire+0x16f/0x3f0 [ 693.220512][T25626] ? tomoyo_mount_permission+0x10a/0x410 [ 693.220533][T25626] tomoyo_mount_permission+0x16a/0x410 [ 693.229978][T25626] ? tomoyo_mount_permission+0x10a/0x410 [ 693.229994][T25626] ? tomoyo_mount_acl+0x840/0x840 [ 693.230012][T25626] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 693.230041][T25626] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 693.264314][T25626] ? strncpy_from_user+0x2ac/0x380 [ 693.269480][T25626] tomoyo_sb_mount+0x35/0x40 [ 693.274115][T25626] security_sb_mount+0x87/0xd0 [ 693.279843][T25626] do_mount+0x1d4/0x1c00 [ 693.284106][T25626] ? copy_mount_options+0x5c/0x3a0 [ 693.289256][T25626] ? copy_mount_string+0x40/0x40 [ 693.294377][T25626] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 693.300682][T25626] ? copy_mount_options+0x280/0x3a0 [ 693.305935][T25626] ksys_mount+0xdb/0x150 [ 693.310219][T25626] __x64_sys_mount+0xbe/0x150 [ 693.314937][T25626] do_syscall_64+0xfd/0x680 [ 693.319480][T25626] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 693.325401][T25626] RIP: 0033:0x45bcca [ 693.329337][T25626] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 693.348992][T25626] RSP: 002b:00007f050b165a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 693.357528][T25626] RAX: ffffffffffffffda RBX: 00007f050b165b40 RCX: 000000000045bcca [ 693.365636][T25626] RDX: 00007f050b165ae0 RSI: 00000000200000c0 RDI: 00007f050b165b00 [ 693.373639][T25626] RBP: 0000000000000001 R08: 00007f050b165b40 R09: 00007f050b165ae0 [ 693.381637][T25626] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 693.391146][T25626] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x2, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) 13:24:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80)}], 0x1, 0xf0ff7f) 13:24:44 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x10', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:44 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b}, &(0x7f0000000200), 0x0) 13:24:44 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0xfc00, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:45 executing program 1 (fault-call:0 fault-nth:61): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:45 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0xfe80, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80)}], 0x1, 0xf0ff7f) 13:24:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x4, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) 13:24:45 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b00000000}, &(0x7f0000000200), 0x0) [ 693.698476][T25653] FAULT_INJECTION: forcing a failure. [ 693.698476][T25653] name failslab, interval 1, probability 0, space 0, times 0 [ 693.759854][T25653] CPU: 1 PID: 25653 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 693.767904][T25653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 693.777985][T25653] Call Trace: [ 693.781305][T25653] dump_stack+0x172/0x1f0 [ 693.785682][T25653] should_fail.cold+0xa/0x15 [ 693.790343][T25653] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 693.796174][T25653] ? ___might_sleep+0x163/0x280 [ 693.801042][T25653] __should_failslab+0x121/0x190 [ 693.801064][T25653] should_failslab+0x9/0x14 [ 693.801077][T25653] kmem_cache_alloc_trace+0x2ce/0x750 [ 693.801103][T25653] alloc_fs_context+0x5a/0x690 [ 693.801124][T25653] fs_context_for_mount+0x25/0x30 [ 693.810565][T25653] do_mount+0x132d/0x1c00 [ 693.810589][T25653] ? copy_mount_string+0x40/0x40 [ 693.810614][T25653] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 693.810628][T25653] ? copy_mount_options+0x280/0x3a0 [ 693.810648][T25653] ksys_mount+0xdb/0x150 [ 693.850825][T25653] __x64_sys_mount+0xbe/0x150 [ 693.855569][T25653] do_syscall_64+0xfd/0x680 [ 693.860114][T25653] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 693.866025][T25653] RIP: 0033:0x45bcca [ 693.869938][T25653] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 693.889561][T25653] RSP: 002b:00007f050b165a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 693.898001][T25653] RAX: ffffffffffffffda RBX: 00007f050b165b40 RCX: 000000000045bcca 13:24:45 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0xfec0, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:45 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) [ 693.905999][T25653] RDX: 00007f050b165ae0 RSI: 00000000200000c0 RDI: 00007f050b165b00 [ 693.914001][T25653] RBP: 0000000000000001 R08: 00007f050b165b40 R09: 00007f050b165ae0 [ 693.922007][T25653] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 693.930013][T25653] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:45 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b9ac9ff}, &(0x7f0000000200), 0x0) 13:24:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0xc, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) 13:24:45 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0xff00, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 694.051586][T25668] hfs: can't find a HFS filesystem on dev loop3 13:24:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0xc00, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) [ 694.148688][T25668] hfs: can't find a HFS filesystem on dev loop3 13:24:45 executing program 1 (fault-call:0 fault-nth:62): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:45 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b}, &(0x7f0000000200), 0x0) 13:24:45 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:45 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0xf0ffff, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x4000, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) 13:24:45 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x1000000, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0xff03, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) [ 694.448425][T25691] hfs: can't find a HFS filesystem on dev loop3 [ 694.561963][T25698] FAULT_INJECTION: forcing a failure. [ 694.561963][T25698] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 694.575270][T25698] CPU: 0 PID: 25698 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 694.583268][T25698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 694.593352][T25698] Call Trace: [ 694.596688][T25698] dump_stack+0x172/0x1f0 [ 694.601066][T25698] should_fail.cold+0xa/0x15 [ 694.605706][T25698] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 694.611587][T25698] should_fail_alloc_page+0x50/0x60 [ 694.616923][T25698] __alloc_pages_nodemask+0x1a1/0x8d0 [ 694.622331][T25698] ? rcu_read_lock_sched_held+0x110/0x130 [ 694.628078][T25698] ? kmem_cache_free+0x222/0x260 [ 694.633055][T25698] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 694.638812][T25698] ? putname+0xf4/0x130 [ 694.643003][T25698] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 694.648861][T25698] cache_grow_begin+0x9d/0x650 [ 694.653769][T25698] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 694.660050][T25698] __kmalloc+0x67c/0x740 [ 694.664334][T25698] ? tomoyo_realpath_from_path+0xcd/0x7a0 [ 694.670098][T25698] tomoyo_realpath_from_path+0xcd/0x7a0 [ 694.675693][T25698] tomoyo_mount_acl+0x2cc/0x840 [ 694.680581][T25698] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 694.686217][T25698] ? lock_downgrade+0x880/0x880 [ 694.691120][T25698] ? mark_held_locks+0xf0/0xf0 [ 694.695949][T25698] ? lock_acquire+0x16f/0x3f0 [ 694.700669][T25698] ? tomoyo_mount_permission+0x10a/0x410 [ 694.706329][T25698] tomoyo_mount_permission+0x16a/0x410 [ 694.706345][T25698] ? tomoyo_mount_permission+0x10a/0x410 [ 694.706361][T25698] ? tomoyo_mount_acl+0x840/0x840 [ 694.706380][T25698] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 694.706406][T25698] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 694.706424][T25698] ? strncpy_from_user+0x2ac/0x380 [ 694.706447][T25698] tomoyo_sb_mount+0x35/0x40 [ 694.728845][T25698] security_sb_mount+0x87/0xd0 [ 694.728872][T25698] do_mount+0x1d4/0x1c00 [ 694.728889][T25698] ? copy_mount_options+0x5c/0x3a0 [ 694.728916][T25698] ? copy_mount_string+0x40/0x40 [ 694.763976][T25698] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 694.770256][T25698] ? copy_mount_options+0x280/0x3a0 [ 694.775527][T25698] ksys_mount+0xdb/0x150 [ 694.779818][T25698] __x64_sys_mount+0xbe/0x150 [ 694.784536][T25698] do_syscall_64+0xfd/0x680 [ 694.789115][T25698] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 694.795074][T25698] RIP: 0033:0x45bcca [ 694.798993][T25698] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 694.818631][T25698] RSP: 002b:00007f050b165a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 694.827112][T25698] RAX: ffffffffffffffda RBX: 00007f050b165b40 RCX: 000000000045bcca [ 694.835113][T25698] RDX: 00007f050b165ae0 RSI: 00000000200000c0 RDI: 00007f050b165b00 [ 694.843124][T25698] RBP: 0000000000000001 R08: 00007f050b165b40 R09: 00007f050b165ae0 [ 694.851134][T25698] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 13:24:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) 13:24:46 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffc99a3b00000000}, &(0x7f0000000200), 0x0) 13:24:46 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x101d0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) 13:24:46 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x2000000, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 694.859134][T25698] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:46 executing program 1 (fault-call:0 fault-nth:63): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 694.966175][T25713] hfs: can't find a HFS filesystem on dev loop3 13:24:46 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x3000000, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:46 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x3d, &(0x7f0000000240)=0x1, 0x4) r4 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000001200)="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", 0x1000, 0xfffffffffffffffb) keyctl$invalidate(0x15, r4) ioctl$RNDGETENTCNT(r3, 0x80045200, &(0x7f00000001c0)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 13:24:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x40000, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) [ 695.069705][T25713] hfs: can't find a HFS filesystem on dev loop3 13:24:46 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfsD', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 695.125577][T25721] FAULT_INJECTION: forcing a failure. [ 695.125577][T25721] name failslab, interval 1, probability 0, space 0, times 0 [ 695.149663][T25721] CPU: 0 PID: 25721 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 695.157742][T25721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 695.167839][T25721] Call Trace: [ 695.171281][T25721] dump_stack+0x172/0x1f0 [ 695.175669][T25721] should_fail.cold+0xa/0x15 [ 695.180338][T25721] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 695.186212][T25721] ? ___might_sleep+0x163/0x280 [ 695.191107][T25721] __should_failslab+0x121/0x190 [ 695.196133][T25721] should_failslab+0x9/0x14 [ 695.200861][T25721] kmem_cache_alloc_trace+0x2ce/0x750 [ 695.206279][T25721] ? kasan_kmalloc+0x9/0x10 [ 695.210831][T25721] ? __kmalloc_node+0x4e/0x70 [ 695.215571][T25721] btrfs_mount_root+0x1d0/0x1220 [ 695.220566][T25721] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 695.226859][T25721] ? btrfs_decode_error+0x70/0x70 [ 695.231931][T25721] ? rcu_read_lock_sched_held+0x110/0x130 [ 695.237689][T25721] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 695.243974][T25721] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 695.250259][T25721] ? vfs_parse_fs_string+0x111/0x170 [ 695.255763][T25721] ? vfs_parse_fs_string+0x111/0x170 [ 695.261095][T25721] ? rcu_read_lock_sched_held+0x110/0x130 [ 695.266867][T25721] ? kfree+0x1f7/0x220 [ 695.270987][T25721] ? vfs_parse_fs_string+0x116/0x170 13:24:46 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 695.276330][T25721] ? vfs_parse_fs_param+0x540/0x540 [ 695.284116][T25721] ? btrfs_decode_error+0x70/0x70 [ 695.289212][T25721] legacy_get_tree+0x108/0x220 [ 695.294038][T25721] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 695.300344][T25721] vfs_get_tree+0x8e/0x390 [ 695.304818][T25721] fc_mount+0x17/0xc0 [ 695.308864][T25721] vfs_kern_mount.part.0+0xd8/0xf0 [ 695.314024][T25721] vfs_kern_mount+0x40/0x60 [ 695.318581][T25721] btrfs_mount+0x2b4/0x15e2 [ 695.323140][T25721] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 695.328832][T25721] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 695.335305][T25721] ? should_fail+0x1de/0x852 [ 695.340937][T25721] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 695.346803][T25721] ? btrfs_remount+0x11f0/0x11f0 [ 695.351788][T25721] ? rcu_read_lock_sched_held+0x110/0x130 [ 695.357967][T25721] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 695.364250][T25721] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 695.370530][T25721] ? vfs_parse_fs_string+0x111/0x170 [ 695.375853][T25721] ? vfs_parse_fs_string+0x111/0x170 [ 695.381193][T25721] ? rcu_read_lock_sched_held+0x110/0x130 [ 695.387516][T25721] ? kfree+0x1f7/0x220 [ 695.391621][T25721] ? vfs_parse_fs_string+0x116/0x170 [ 695.396940][T25721] ? vfs_parse_fs_param+0x540/0x540 [ 695.402191][T25721] ? btrfs_remount+0x11f0/0x11f0 [ 695.407207][T25721] legacy_get_tree+0x108/0x220 [ 695.412048][T25721] ? legacy_get_tree+0x108/0x220 [ 695.417056][T25721] ? legacy_parse_monolithic+0x11f/0x180 [ 695.422910][T25721] vfs_get_tree+0x8e/0x390 [ 695.427356][T25721] do_mount+0x138c/0x1c00 [ 695.431721][T25721] ? copy_mount_string+0x40/0x40 [ 695.436678][T25721] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 695.442937][T25721] ? _copy_from_user+0xdd/0x150 [ 695.447822][T25721] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 695.454073][T25721] ? copy_mount_options+0x280/0x3a0 [ 695.459297][T25721] ksys_mount+0xdb/0x150 [ 695.463563][T25721] __x64_sys_mount+0xbe/0x150 [ 695.468262][T25721] do_syscall_64+0xfd/0x680 13:24:46 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x4000000, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 695.472787][T25721] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 695.478690][T25721] RIP: 0033:0x45bcca [ 695.482590][T25721] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 695.502214][T25721] RSP: 002b:00007f050b165a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 695.510651][T25721] RAX: ffffffffffffffda RBX: 00007f050b165b40 RCX: 000000000045bcca [ 695.518638][T25721] RDX: 00007f050b165ae0 RSI: 00000000200000c0 RDI: 00007f050b165b00 [ 695.526618][T25721] RBP: 0000000000000001 R08: 00007f050b165b40 R09: 00007f050b165ae0 [ 695.534604][T25721] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 695.542591][T25721] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) 13:24:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0xf0ff7f, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) 13:24:47 executing program 1 (fault-call:0 fault-nth:64): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:47 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x5000000, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:47 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000080)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r3 = dup2(r1, r0) r4 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r4, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000040)=0x0) sched_getparam(r5, &(0x7f0000000100)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 13:24:47 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfsB', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:47 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x6000000, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x1000000, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) [ 695.893850][T25748] FAULT_INJECTION: forcing a failure. [ 695.893850][T25748] name failslab, interval 1, probability 0, space 0, times 0 [ 695.955206][T25748] CPU: 1 PID: 25748 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 695.963264][T25748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 695.973344][T25748] Call Trace: [ 695.976679][T25748] dump_stack+0x172/0x1f0 [ 695.981043][T25748] should_fail.cold+0xa/0x15 [ 695.985655][T25748] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 695.991501][T25748] ? ___might_sleep+0x163/0x280 [ 695.996382][T25748] __should_failslab+0x121/0x190 [ 696.001341][T25748] should_failslab+0x9/0x14 [ 696.005863][T25748] kmem_cache_alloc_trace+0x2ce/0x750 [ 696.011260][T25748] ? lockdep_init_map+0x1be/0x6d0 [ 696.016320][T25748] legacy_init_fs_context+0x48/0xe0 [ 696.021549][T25748] ? generic_parse_monolithic+0x200/0x200 [ 696.027307][T25748] alloc_fs_context+0x3a7/0x690 [ 696.032188][T25748] fs_context_for_mount+0x25/0x30 [ 696.037238][T25748] do_mount+0x132d/0x1c00 [ 696.041743][T25748] ? copy_mount_string+0x40/0x40 [ 696.046724][T25748] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 13:24:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x2000000, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) 13:24:47 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x40000) r3 = dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) fsetxattr$security_selinux(r2, &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:chfn_exec_t:s0\x00', 0x21, 0x2) setsockopt$inet6_tcp_int(r3, 0x6, 0x18, &(0x7f0000000240)=0x2, 0x4) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 696.052992][T25748] ? _copy_from_user+0xdd/0x150 [ 696.057876][T25748] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 696.064132][T25748] ? copy_mount_options+0x280/0x3a0 [ 696.069357][T25748] ksys_mount+0xdb/0x150 [ 696.073629][T25748] __x64_sys_mount+0xbe/0x150 [ 696.078334][T25748] do_syscall_64+0xfd/0x680 [ 696.082851][T25748] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 696.082866][T25748] RIP: 0033:0x45bcca [ 696.082884][T25748] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 696.082893][T25748] RSP: 002b:00007f050b165a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 696.082909][T25748] RAX: ffffffffffffffda RBX: 00007f050b165b40 RCX: 000000000045bcca [ 696.082918][T25748] RDX: 00007f050b165ae0 RSI: 00000000200000c0 RDI: 00007f050b165b00 [ 696.082927][T25748] RBP: 0000000000000001 R08: 00007f050b165b40 R09: 00007f050b165ae0 [ 696.082943][T25748] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 13:24:47 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x7000000, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 696.092735][T25748] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0xc000000, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) 13:24:48 executing program 1 (fault-call:0 fault-nth:65): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:48 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x8000000, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x40000000, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) 13:24:48 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:48 executing program 5: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in=@local, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000000)=0xe8) ioprio_set$uid(0x3, r1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) getcwd(&(0x7f0000000080)=""/82, 0x52) 13:24:48 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x8060000, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 696.808223][T25783] hfs: can't find a HFS filesystem on dev loop3 [ 696.845878][T25788] FAULT_INJECTION: forcing a failure. [ 696.845878][T25788] name failslab, interval 1, probability 0, space 0, times 0 13:24:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x7ffff000, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) [ 696.892461][T25783] hfs: can't find a HFS filesystem on dev loop3 13:24:48 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 697.013661][T25788] CPU: 0 PID: 25788 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 697.021724][T25788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 697.031795][T25788] Call Trace: [ 697.035250][T25788] dump_stack+0x172/0x1f0 [ 697.039610][T25788] should_fail.cold+0xa/0x15 [ 697.044229][T25788] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 697.050064][T25788] ? ___might_sleep+0x163/0x280 [ 697.054944][T25788] __should_failslab+0x121/0x190 [ 697.059902][T25788] should_failslab+0x9/0x14 [ 697.064415][T25788] __kmalloc_track_caller+0x2d5/0x740 [ 697.069803][T25788] ? vfs_parse_fs_string+0xe8/0x170 [ 697.075019][T25788] kmemdup_nul+0x31/0xa0 [ 697.079290][T25788] vfs_parse_fs_string+0xe8/0x170 [ 697.084329][T25788] ? vfs_parse_fs_param+0x540/0x540 [ 697.084356][T25788] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 697.084372][T25788] ? alloc_fs_context+0x400/0x690 [ 697.084399][T25788] do_mount+0x700/0x1c00 [ 697.084420][T25788] ? copy_mount_string+0x40/0x40 [ 697.110128][T25788] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 697.116413][T25788] ? copy_mount_options+0x280/0x3a0 [ 697.121640][T25788] ksys_mount+0xdb/0x150 [ 697.121662][T25788] __x64_sys_mount+0xbe/0x150 [ 697.121684][T25788] do_syscall_64+0xfd/0x680 [ 697.121706][T25788] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 697.121719][T25788] RIP: 0033:0x45bcca 13:24:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0xd0010100, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) 13:24:48 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000080)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x5) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r3 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r3, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 13:24:48 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0xb000000, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:48 executing program 5: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in=@local, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000000)=0xe8) ioprio_set$uid(0x3, r1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) getcwd(&(0x7f0000000080)=""/82, 0x52) [ 697.121734][T25788] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 697.121742][T25788] RSP: 002b:00007f050b165a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 697.121755][T25788] RAX: ffffffffffffffda RBX: 00007f050b165b40 RCX: 000000000045bcca [ 697.121763][T25788] RDX: 00007f050b165ae0 RSI: 00000000200000c0 RDI: 00007f050b165b00 [ 697.121771][T25788] RBP: 0000000000000001 R08: 00007f050b165b40 R09: 00007f050b165ae0 [ 697.121778][T25788] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 697.121787][T25788] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 [ 697.284650][T25803] hfs: can't find a HFS filesystem on dev loop3 13:24:48 executing program 1 (fault-call:0 fault-nth:66): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:48 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0xd000000, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0xeffdffff, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) 13:24:48 executing program 5: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in=@local, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000000)=0xe8) ioprio_set$uid(0x3, r1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) getcwd(&(0x7f0000000080)=""/82, 0x52) [ 697.384852][T25803] hfs: can't find a HFS filesystem on dev loop3 13:24:48 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x28000000, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:48 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfsP', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0xf5ffffff, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) [ 697.519833][T25823] FAULT_INJECTION: forcing a failure. [ 697.519833][T25823] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 697.533118][T25823] CPU: 0 PID: 25823 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 697.541142][T25823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 697.551231][T25823] Call Trace: [ 697.551272][T25823] dump_stack+0x172/0x1f0 [ 697.551295][T25823] should_fail.cold+0xa/0x15 [ 697.551315][T25823] ? btrfs_mount_root+0x12b/0x1220 [ 697.551337][T25823] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 697.551361][T25823] ? mark_held_locks+0xf0/0xf0 [ 697.551388][T25823] should_fail_alloc_page+0x50/0x60 [ 697.551416][T25823] __alloc_pages_nodemask+0x1a1/0x8d0 [ 697.589899][T25823] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 697.595573][T25823] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 697.601317][T25823] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 697.606992][T25823] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 697.613277][T25823] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 697.619123][T25823] cache_grow_begin+0x9d/0x650 [ 697.623928][T25823] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 697.630208][T25823] kmem_cache_alloc_trace+0x67c/0x750 [ 697.635599][T25823] ? kasan_kmalloc+0x9/0x10 [ 697.640130][T25823] btrfs_mount_root+0x174/0x1220 [ 697.645100][T25823] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 697.651471][T25823] ? btrfs_decode_error+0x70/0x70 [ 697.656536][T25823] ? rcu_read_lock_sched_held+0x110/0x130 [ 697.662281][T25823] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 697.668550][T25823] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 697.674822][T25823] ? vfs_parse_fs_string+0x111/0x170 [ 697.680136][T25823] ? vfs_parse_fs_string+0x111/0x170 [ 697.685453][T25823] ? rcu_read_lock_sched_held+0x110/0x130 [ 697.691203][T25823] ? kfree+0x1f7/0x220 [ 697.695301][T25823] ? vfs_parse_fs_string+0x116/0x170 [ 697.700605][T25823] ? vfs_parse_fs_param+0x540/0x540 [ 697.705828][T25823] ? btrfs_decode_error+0x70/0x70 [ 697.710876][T25823] legacy_get_tree+0x108/0x220 [ 697.715668][T25823] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 697.721931][T25823] vfs_get_tree+0x8e/0x390 [ 697.726364][T25823] fc_mount+0x17/0xc0 [ 697.730449][T25823] vfs_kern_mount.part.0+0xd8/0xf0 [ 697.735573][T25823] vfs_kern_mount+0x40/0x60 [ 697.740103][T25823] btrfs_mount+0x2b4/0x15e2 [ 697.744624][T25823] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 697.750271][T25823] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 697.756526][T25823] ? should_fail+0x1de/0x852 [ 697.761136][T25823] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 697.766972][T25823] ? btrfs_remount+0x11f0/0x11f0 [ 697.771933][T25823] ? rcu_read_lock_sched_held+0x110/0x130 [ 697.777667][T25823] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 697.783917][T25823] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 697.790179][T25823] ? vfs_parse_fs_string+0x111/0x170 [ 697.795480][T25823] ? vfs_parse_fs_string+0x111/0x170 [ 697.800784][T25823] ? rcu_read_lock_sched_held+0x110/0x130 [ 697.806520][T25823] ? kfree+0x1f7/0x220 [ 697.810606][T25823] ? vfs_parse_fs_string+0x116/0x170 [ 697.815904][T25823] ? vfs_parse_fs_param+0x540/0x540 [ 697.821121][T25823] ? btrfs_remount+0x11f0/0x11f0 [ 697.826077][T25823] legacy_get_tree+0x108/0x220 [ 697.830860][T25823] ? legacy_get_tree+0x108/0x220 [ 697.835816][T25823] ? legacy_parse_monolithic+0x11f/0x180 [ 697.841470][T25823] vfs_get_tree+0x8e/0x390 [ 697.845908][T25823] do_mount+0x138c/0x1c00 [ 697.850271][T25823] ? copy_mount_string+0x40/0x40 [ 697.855229][T25823] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 697.855247][T25823] ? copy_mount_options+0x280/0x3a0 [ 697.855270][T25823] ksys_mount+0xdb/0x150 [ 697.870935][T25823] __x64_sys_mount+0xbe/0x150 [ 697.870959][T25823] do_syscall_64+0xfd/0x680 [ 697.870985][T25823] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 697.886042][T25823] RIP: 0033:0x45bcca [ 697.889940][T25823] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 697.889950][T25823] RSP: 002b:00007f050b165a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 13:24:49 executing program 5: ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb3, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in=@local, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000000)=0xe8) ioprio_set$uid(0x3, r1, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) getcwd(&(0x7f0000000080)=""/82, 0x52) 13:24:49 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x29000000, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:49 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)=0x81) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 13:24:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0xff030000, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) 13:24:49 executing program 4: r0 = syz_open_dev$media(&(0x7f00000005c0)='/dev/media#\x00', 0xff, 0x400) r1 = creat(&(0x7f00000006c0)='./file0\x00', 0xd3) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000640)=r1, 0x1) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r3, 0x40045532, &(0x7f0000000080)) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000600), 0x0) r5 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) r6 = dup2(r5, r4) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x30, r7, 0x0, 0x70bd2b, 0x25dfdbff, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x7, 0x8, 0x6, 0x40}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x4000) sync() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r6, 0xc0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x0, 0x8}, 0x0, 0x0, &(0x7f0000000340)={0x5, 0x1, 0x8, 0x8000}, &(0x7f0000000380), 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x4}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000580)=r8, 0x4) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, &(0x7f00000002c0)={0x1b9}, &(0x7f0000000200), 0x0) r9 = getpid() syz_open_procfs$namespace(r9, &(0x7f0000000700)='ns/pid\x00') ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r6, 0xc0305615, &(0x7f0000000600)={0x0, {0x41, 0x4}}) syz_open_dev$amidi(&(0x7f0000000680)='/dev/amidi#\x00', 0x1, 0x2) [ 697.889963][T25823] RAX: ffffffffffffffda RBX: 00007f050b165b40 RCX: 000000000045bcca [ 697.889972][T25823] RDX: 00007f050b165ae0 RSI: 00000000200000c0 RDI: 00007f050b165b00 [ 697.889981][T25823] RBP: 0000000000000001 R08: 00007f050b165b40 R09: 00007f050b165ae0 [ 697.889989][T25823] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 697.889997][T25823] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:49 executing program 1 (fault-call:0 fault-nth:67): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:49 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x2b000000, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0xfffffdef, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) 13:24:49 executing program 5: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 13:24:49 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfsM', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:49 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x2c000000, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:49 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x400000, 0x0) accept$ax25(r0, &(0x7f0000000240)={{}, [@netrom, @default, @remote, @remote, @default, @bcast, @netrom, @netrom]}, &(0x7f0000000100)=0x48) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) openat$cgroup_ro(r0, &(0x7f00000001c0)='memory.stat\x00', 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000080)=0xa2f) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r3 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x10000) dup2(r3, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 13:24:49 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0xffffff7f, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) [ 698.302680][T25863] FAULT_INJECTION: forcing a failure. [ 698.302680][T25863] name failslab, interval 1, probability 0, space 0, times 0 13:24:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x39) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) setsockopt$inet6_int(r1, 0x29, 0x7, &(0x7f0000000200)=0x10000, 0x4) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 13:24:49 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x2f000000, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 698.409683][T25863] CPU: 0 PID: 25863 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 698.417745][T25863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 698.427831][T25863] Call Trace: [ 698.431151][T25863] dump_stack+0x172/0x1f0 [ 698.435514][T25863] should_fail.cold+0xa/0x15 [ 698.435535][T25863] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 698.435561][T25863] ? ___might_sleep+0x163/0x280 [ 698.450895][T25863] __should_failslab+0x121/0x190 [ 698.455855][T25863] should_failslab+0x9/0x14 [ 698.460377][T25863] kmem_cache_alloc_trace+0x2ce/0x750 [ 698.465766][T25863] ? kasan_kmalloc+0x9/0x10 [ 698.470291][T25863] ? __kmalloc_node+0x4e/0x70 [ 698.474999][T25863] btrfs_mount_root+0x174/0x1220 [ 698.479959][T25863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 698.479983][T25863] ? btrfs_decode_error+0x70/0x70 [ 698.480001][T25863] ? rcu_read_lock_sched_held+0x110/0x130 [ 698.480013][T25863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 698.480027][T25863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 698.480044][T25863] ? vfs_parse_fs_string+0x111/0x170 [ 698.480058][T25863] ? vfs_parse_fs_string+0x111/0x170 [ 698.480079][T25863] ? rcu_read_lock_sched_held+0x110/0x130 [ 698.525905][T25863] ? kfree+0x1f7/0x220 [ 698.530018][T25863] ? vfs_parse_fs_string+0x116/0x170 [ 698.535350][T25863] ? vfs_parse_fs_param+0x540/0x540 [ 698.540640][T25863] ? btrfs_decode_error+0x70/0x70 [ 698.545707][T25863] legacy_get_tree+0x108/0x220 [ 698.550509][T25863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 13:24:50 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x3c000000, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 698.556776][T25863] vfs_get_tree+0x8e/0x390 [ 698.561225][T25863] fc_mount+0x17/0xc0 [ 698.565330][T25863] vfs_kern_mount.part.0+0xd8/0xf0 [ 698.570478][T25863] vfs_kern_mount+0x40/0x60 [ 698.575031][T25863] btrfs_mount+0x2b4/0x15e2 [ 698.579557][T25863] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 698.585248][T25863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 698.585278][T25863] ? should_fail+0x1de/0x852 [ 698.585306][T25863] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 698.603060][T25863] ? btrfs_remount+0x11f0/0x11f0 [ 698.608095][T25863] ? rcu_read_lock_sched_held+0x110/0x130 [ 698.613839][T25863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 698.620097][T25863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 698.620119][T25863] ? vfs_parse_fs_string+0x111/0x170 [ 698.620136][T25863] ? vfs_parse_fs_string+0x111/0x170 [ 698.620155][T25863] ? rcu_read_lock_sched_held+0x110/0x130 [ 698.620178][T25863] ? kfree+0x1f7/0x220 [ 698.620193][T25863] ? vfs_parse_fs_string+0x116/0x170 [ 698.620207][T25863] ? vfs_parse_fs_param+0x540/0x540 [ 698.620227][T25863] ? btrfs_remount+0x11f0/0x11f0 [ 698.620240][T25863] legacy_get_tree+0x108/0x220 [ 698.620253][T25863] ? legacy_get_tree+0x108/0x220 [ 698.620267][T25863] ? legacy_parse_monolithic+0x11f/0x180 [ 698.620286][T25863] vfs_get_tree+0x8e/0x390 [ 698.620305][T25863] do_mount+0x138c/0x1c00 [ 698.620326][T25863] ? copy_mount_string+0x40/0x40 [ 698.647028][T25863] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 698.647050][T25863] ? copy_mount_options+0x280/0x3a0 [ 698.647071][T25863] ksys_mount+0xdb/0x150 [ 698.647090][T25863] __x64_sys_mount+0xbe/0x150 [ 698.647111][T25863] do_syscall_64+0xfd/0x680 [ 698.647133][T25863] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 698.647146][T25863] RIP: 0033:0x45bcca [ 698.647175][T25863] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 698.662627][T25863] RSP: 002b:00007f050b165a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 13:24:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0xfffffff5, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) [ 698.662647][T25863] RAX: ffffffffffffffda RBX: 00007f050b165b40 RCX: 000000000045bcca [ 698.662656][T25863] RDX: 00007f050b165ae0 RSI: 00000000200000c0 RDI: 00007f050b165b00 [ 698.662666][T25863] RBP: 0000000000000001 R08: 00007f050b165b40 R09: 00007f050b165ae0 [ 698.662674][T25863] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 698.662683][T25863] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:50 executing program 1 (fault-call:0 fault-nth:68): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:50 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x40000000, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:50 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x48800, 0x0) 13:24:50 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfsT', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x7ffffffff000, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) 13:24:50 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x43050000, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 699.046439][T25901] FAULT_INJECTION: forcing a failure. [ 699.046439][T25901] name failslab, interval 1, probability 0, space 0, times 0 [ 699.091467][T25901] CPU: 1 PID: 25901 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 699.099830][T25901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 699.109911][T25901] Call Trace: [ 699.113252][T25901] dump_stack+0x172/0x1f0 [ 699.117636][T25901] should_fail.cold+0xa/0x15 [ 699.122279][T25901] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 699.128121][T25901] ? ___might_sleep+0x163/0x280 [ 699.133011][T25901] __should_failslab+0x121/0x190 [ 699.137985][T25901] should_failslab+0x9/0x14 [ 699.142521][T25901] kmem_cache_alloc_trace+0x2ce/0x750 [ 699.147931][T25901] ? lockdep_init_map+0x1be/0x6d0 [ 699.153004][T25901] legacy_init_fs_context+0x48/0xe0 [ 699.158244][T25901] ? generic_parse_monolithic+0x200/0x200 [ 699.163991][T25901] alloc_fs_context+0x3a7/0x690 [ 699.168870][T25901] fs_context_for_mount+0x25/0x30 [ 699.173966][T25901] vfs_kern_mount.part.0+0x28/0xf0 [ 699.179306][T25901] vfs_kern_mount+0x40/0x60 [ 699.183849][T25901] btrfs_mount+0x2b4/0x15e2 [ 699.188381][T25901] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 699.194036][T25901] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 699.200303][T25901] ? should_fail+0x1de/0x852 [ 699.204922][T25901] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 699.210764][T25901] ? btrfs_remount+0x11f0/0x11f0 [ 699.215736][T25901] ? rcu_read_lock_sched_held+0x110/0x130 [ 699.221485][T25901] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 699.227766][T25901] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 699.234054][T25901] ? vfs_parse_fs_string+0x111/0x170 [ 699.239406][T25901] ? vfs_parse_fs_string+0x111/0x170 [ 699.244751][T25901] ? rcu_read_lock_sched_held+0x110/0x130 [ 699.250508][T25901] ? kfree+0x1f7/0x220 [ 699.254621][T25901] ? vfs_parse_fs_string+0x116/0x170 [ 699.259981][T25901] ? vfs_parse_fs_param+0x540/0x540 [ 699.265333][T25901] ? btrfs_remount+0x11f0/0x11f0 [ 699.270320][T25901] legacy_get_tree+0x108/0x220 [ 699.275219][T25901] ? legacy_get_tree+0x108/0x220 [ 699.281789][T25901] ? legacy_parse_monolithic+0x11f/0x180 [ 699.287459][T25901] vfs_get_tree+0x8e/0x390 [ 699.291915][T25901] do_mount+0x138c/0x1c00 [ 699.296304][T25901] ? copy_mount_string+0x40/0x40 [ 699.301292][T25901] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 699.307575][T25901] ? copy_mount_options+0x280/0x3a0 [ 699.312825][T25901] ksys_mount+0xdb/0x150 [ 699.317114][T25901] __x64_sys_mount+0xbe/0x150 [ 699.321866][T25901] do_syscall_64+0xfd/0x680 [ 699.326420][T25901] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 699.332356][T25901] RIP: 0033:0x45bcca [ 699.336287][T25901] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 699.355928][T25901] RSP: 002b:00007f050b165a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 699.364376][T25901] RAX: ffffffffffffffda RBX: 00007f050b165b40 RCX: 000000000045bcca [ 699.372385][T25901] RDX: 00007f050b165ae0 RSI: 00000000200000c0 RDI: 00007f050b165b00 [ 699.380383][T25901] RBP: 0000000000000001 R08: 00007f050b165b40 R09: 00007f050b165ae0 13:24:50 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000080)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r3 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r3, r2) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x83, 0x8, [0x8001, 0xc, 0x1, 0x1, 0x6, 0x0, 0x9, 0x7]}, &(0x7f00000001c0)=0x18) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000240)=@assoc_value={r4, 0x3}, &(0x7f0000000280)=0x8) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r3, 0xc0045516, &(0x7f00000002c0)=0xfff) socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) 13:24:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) 13:24:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x4000000000000, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) 13:24:50 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x50000000, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 699.389846][T25901] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 699.398023][T25901] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:51 executing program 1 (fault-call:0 fault-nth:69): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:51 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfsS', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:51 executing program 5: setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in=@broadcast, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='bond_slave_0\x00', 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 13:24:51 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x58000000, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:51 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x60000000, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:51 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 699.674530][T25926] FAULT_INJECTION: forcing a failure. [ 699.674530][T25926] name failslab, interval 1, probability 0, space 0, times 0 [ 699.725176][T25926] CPU: 0 PID: 25926 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 699.733234][T25926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 699.743310][T25926] Call Trace: [ 699.746650][T25926] dump_stack+0x172/0x1f0 [ 699.751018][T25926] should_fail.cold+0xa/0x15 [ 699.755651][T25926] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 699.761489][T25926] ? ___might_sleep+0x163/0x280 [ 699.766456][T25926] __should_failslab+0x121/0x190 [ 699.771417][T25926] should_failslab+0x9/0x14 [ 699.775939][T25926] kmem_cache_alloc_trace+0x2ce/0x750 [ 699.781331][T25926] ? lockdep_init_map+0x1be/0x6d0 [ 699.786387][T25926] legacy_init_fs_context+0x48/0xe0 [ 699.791604][T25926] ? generic_parse_monolithic+0x200/0x200 [ 699.797339][T25926] alloc_fs_context+0x3a7/0x690 [ 699.802220][T25926] fs_context_for_mount+0x25/0x30 [ 699.807261][T25926] vfs_kern_mount.part.0+0x28/0xf0 [ 699.812396][T25926] vfs_kern_mount+0x40/0x60 [ 699.816920][T25926] btrfs_mount+0x2b4/0x15e2 [ 699.821454][T25926] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 699.827110][T25926] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 699.833380][T25926] ? should_fail+0x1de/0x852 [ 699.838218][T25926] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 699.844061][T25926] ? btrfs_remount+0x11f0/0x11f0 [ 699.849030][T25926] ? rcu_read_lock_sched_held+0x110/0x130 [ 699.855131][T25926] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 699.861400][T25926] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 699.867662][T25926] ? vfs_parse_fs_string+0x111/0x170 [ 699.872958][T25926] ? vfs_parse_fs_string+0x111/0x170 [ 699.878265][T25926] ? rcu_read_lock_sched_held+0x110/0x130 [ 699.884003][T25926] ? kfree+0x1f7/0x220 [ 699.888090][T25926] ? vfs_parse_fs_string+0x116/0x170 [ 699.893384][T25926] ? vfs_parse_fs_param+0x540/0x540 [ 699.898593][T25926] ? btrfs_remount+0x11f0/0x11f0 [ 699.903546][T25926] legacy_get_tree+0x108/0x220 [ 699.908320][T25926] ? legacy_get_tree+0x108/0x220 [ 699.913355][T25926] ? legacy_parse_monolithic+0x11f/0x180 [ 699.919001][T25926] vfs_get_tree+0x8e/0x390 [ 699.923434][T25926] do_mount+0x138c/0x1c00 [ 699.927785][T25926] ? copy_mount_string+0x40/0x40 [ 699.932732][T25926] ? copy_mount_options+0x208/0x3a0 [ 699.938022][T25926] ? copy_mount_options+0x198/0x3a0 [ 699.943235][T25926] ? __sanitizer_cov_trace_pc+0x8/0x50 [ 699.948714][T25926] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 699.954979][T25926] ? copy_mount_options+0x280/0x3a0 [ 699.960203][T25926] ksys_mount+0xdb/0x150 [ 699.964464][T25926] __x64_sys_mount+0xbe/0x150 [ 699.969160][T25926] do_syscall_64+0xfd/0x680 [ 699.973686][T25926] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 699.979586][T25926] RIP: 0033:0x45bcca [ 699.983495][T25926] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 700.003124][T25926] RSP: 002b:00007f050b165a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 700.011572][T25926] RAX: ffffffffffffffda RBX: 00007f050b165b40 RCX: 000000000045bcca 13:24:51 executing program 5: setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in=@broadcast, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='bond_slave_0\x00', 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) [ 700.019571][T25926] RDX: 00007f050b165ae0 RSI: 00000000200000c0 RDI: 00007f050b165b00 [ 700.027571][T25926] RBP: 0000000000000001 R08: 00007f050b165b40 R09: 00007f050b165ae0 [ 700.035568][T25926] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 700.043558][T25926] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:51 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x800e0000, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:51 executing program 1 (fault-call:0 fault-nth:70): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:51 executing program 5: setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in=@broadcast, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='bond_slave_0\x00', 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) [ 700.334752][T25947] FAULT_INJECTION: forcing a failure. [ 700.334752][T25947] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 700.348015][T25947] CPU: 1 PID: 25947 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 700.355998][T25947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 700.366066][T25947] Call Trace: [ 700.369389][T25947] dump_stack+0x172/0x1f0 [ 700.373748][T25947] should_fail.cold+0xa/0x15 [ 700.378373][T25947] ? btrfs_mount_root+0x12b/0x1220 [ 700.383511][T25947] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 700.389335][T25947] ? mark_held_locks+0xf0/0xf0 [ 700.394130][T25947] should_fail_alloc_page+0x50/0x60 [ 700.399430][T25947] __alloc_pages_nodemask+0x1a1/0x8d0 [ 700.404811][T25947] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 700.410458][T25947] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 700.416196][T25947] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 700.421867][T25947] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.428164][T25947] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 700.434015][T25947] cache_grow_begin+0x9d/0x650 [ 700.438818][T25947] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 700.445183][T25947] kmem_cache_alloc_trace+0x67c/0x750 [ 700.450773][T25947] ? kasan_kmalloc+0x9/0x10 [ 700.455320][T25947] btrfs_mount_root+0x174/0x1220 [ 700.460298][T25947] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.466562][T25947] ? btrfs_decode_error+0x70/0x70 [ 700.471602][T25947] ? rcu_read_lock_sched_held+0x110/0x130 [ 700.477332][T25947] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.483581][T25947] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.489841][T25947] ? vfs_parse_fs_string+0x111/0x170 [ 700.495141][T25947] ? vfs_parse_fs_string+0x111/0x170 [ 700.500439][T25947] ? rcu_read_lock_sched_held+0x110/0x130 [ 700.506313][T25947] ? kfree+0x1f7/0x220 [ 700.510401][T25947] ? vfs_parse_fs_string+0x116/0x170 [ 700.515729][T25947] ? vfs_parse_fs_param+0x540/0x540 [ 700.520940][T25947] ? btrfs_decode_error+0x70/0x70 [ 700.525973][T25947] legacy_get_tree+0x108/0x220 [ 700.530758][T25947] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.537017][T25947] vfs_get_tree+0x8e/0x390 [ 700.541447][T25947] fc_mount+0x17/0xc0 [ 700.545441][T25947] vfs_kern_mount.part.0+0xd8/0xf0 [ 700.550566][T25947] vfs_kern_mount+0x40/0x60 [ 700.555086][T25947] btrfs_mount+0x2b4/0x15e2 [ 700.559599][T25947] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 700.565244][T25947] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.571506][T25947] ? should_fail+0x1de/0x852 [ 700.576113][T25947] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 700.581941][T25947] ? btrfs_remount+0x11f0/0x11f0 [ 700.586905][T25947] ? rcu_read_lock_sched_held+0x110/0x130 [ 700.592640][T25947] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.598901][T25947] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.605163][T25947] ? vfs_parse_fs_string+0x111/0x170 [ 700.610469][T25947] ? vfs_parse_fs_string+0x111/0x170 [ 700.615943][T25947] ? rcu_read_lock_sched_held+0x110/0x130 [ 700.621683][T25947] ? kfree+0x1f7/0x220 [ 700.625775][T25947] ? vfs_parse_fs_string+0x116/0x170 [ 700.631078][T25947] ? vfs_parse_fs_param+0x540/0x540 [ 700.636295][T25947] ? btrfs_remount+0x11f0/0x11f0 [ 700.641251][T25947] legacy_get_tree+0x108/0x220 [ 700.646034][T25947] ? legacy_get_tree+0x108/0x220 [ 700.650993][T25947] ? legacy_parse_monolithic+0x11f/0x180 [ 700.656646][T25947] vfs_get_tree+0x8e/0x390 [ 700.661092][T25947] do_mount+0x138c/0x1c00 [ 700.665537][T25947] ? copy_mount_string+0x40/0x40 [ 700.670505][T25947] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 700.676760][T25947] ? copy_mount_options+0x280/0x3a0 [ 700.681983][T25947] ksys_mount+0xdb/0x150 [ 700.686245][T25947] __x64_sys_mount+0xbe/0x150 [ 700.690949][T25947] do_syscall_64+0xfd/0x680 [ 700.695475][T25947] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 700.701383][T25947] RIP: 0033:0x45bcca [ 700.705290][T25947] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 700.724914][T25947] RSP: 002b:00007f050b165a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 13:24:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0xf0ff7f00000000, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) 13:24:52 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:52 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) ioctl$KDMKTONE(r1, 0x4b30, 0x1000) bind$alg(r1, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes)\x00'}, 0x58) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r3, 0x4040534e, &(0x7f0000000240)={0x2c, @time={r4, r5+10000000}, 0x6, {0xccd, 0x1}, 0x2, 0x1, 0x11}) 13:24:52 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x80350000, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:52 executing program 5: setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in=@broadcast, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='bond_slave_0\x00', 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) [ 700.733362][T25947] RAX: ffffffffffffffda RBX: 00007f050b165b40 RCX: 000000000045bcca [ 700.741360][T25947] RDX: 00007f050b165ae0 RSI: 00000000200000c0 RDI: 00007f050b165b00 [ 700.749454][T25947] RBP: 0000000000000001 R08: 00007f050b165b40 R09: 00007f050b165ae0 [ 700.757443][T25947] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 700.765430][T25947] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:52 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0, 0x2011, r0, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000080)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r3 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r3, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 13:24:52 executing program 5: setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in=@broadcast, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 13:24:52 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x81000000, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 700.874579][T25958] hfs: can't find a HFS filesystem on dev loop3 13:24:52 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) write$capi20_data(r0, &(0x7f0000000240)={{0x10, 0x2, 0x1, 0x82, 0x2, 0x1000}, 0x6b, "043c2d3ea746e4735694d7b05879bfeec1e35004fff23c13baf3a2e892f47da19286400369379d6fb080bd765ee2f03c357e2cb0d24a04b37bc7f2178b041879191971964b4229a36b0bd214c20a481133380e3787fd2bbbbe88d47d1de6168f29979350bcf80bd258b703"}, 0x7d) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000080)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r3 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r3, r2) ioctl$VIDIOC_DBG_G_CHIP_INFO(r3, 0xc0c85666, &(0x7f00000002c0)={{0x1, @addr=0x80000000}, "fb162fb0bac16bcaf41e654a9ca0b4a1ae138eed1843ae68bda33c0f810b44d9", 0x3}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x20000, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x9, 0xffffffffffffff27, 0x8000, 0x0, 0x9, 0x2, 0x3e, 0xa1, 0x294, 0x40, 0xf7, 0x3, 0x9, 0x38, 0x2, 0x5, 0x400, 0x69c14859}, [{0x7, 0x3, 0x3d11732e, 0xbb00, 0x9, 0x3, 0x3, 0x1f}, {0x6474e551, 0x2, 0xfff, 0x100000001, 0x6, 0x1000, 0x1, 0x10001}], "5708833769a48dafd9fd7e0492cfba5bc6e2a0006edd03033635694af2ef197725e802e529523130119e033a3316aedf4246adf0d80a204038fbc95896fe4dddaae4fb57ebb8e48a3fcf3875ad71b7c9ad6fe6d10a491dae5c394b1a9211ba885c4dc56a60e783ed4ff148ef507a0bbe72702c775e8822a72d3374f38c7df599592d5f4c21e15e7b52494b7176eed7041be2039167374a9c79c63dbecb2ba53bfdf04653dea457823b1449e2bdfc0940487ce79f", [[], [], [], [], [], [], [], [], [], []]}, 0xb64) socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 13:24:52 executing program 1 (fault-call:0 fault-nth:71): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:52 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:52 executing program 5: setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in=@broadcast, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) [ 701.227449][T25972] FAULT_INJECTION: forcing a failure. [ 701.227449][T25972] name failslab, interval 1, probability 0, space 0, times 0 [ 701.280200][T25977] hfs: can't find a HFS filesystem on dev loop3 [ 701.309889][T25972] CPU: 1 PID: 25972 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 701.317947][T25972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 701.328040][T25972] Call Trace: [ 701.331392][T25972] dump_stack+0x172/0x1f0 [ 701.335778][T25972] should_fail.cold+0xa/0x15 [ 701.340518][T25972] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 701.346370][T25972] ? ___might_sleep+0x163/0x280 [ 701.351265][T25972] __should_failslab+0x121/0x190 [ 701.356246][T25972] should_failslab+0x9/0x14 [ 701.360787][T25972] kmem_cache_alloc_node_trace+0x26d/0x720 [ 701.366627][T25972] ? vfs_get_tree+0x8e/0x390 [ 701.371255][T25972] ? do_mount+0x138c/0x1c00 [ 701.375795][T25972] ? ksys_mount+0xdb/0x150 [ 701.380246][T25972] ? __x64_sys_mount+0xbe/0x150 [ 701.385135][T25972] ? do_syscall_64+0xfd/0x680 [ 701.391346][T25972] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 701.397454][T25972] __kmalloc_node+0x3d/0x70 [ 701.401995][T25972] kvmalloc_node+0xbd/0x100 [ 701.406536][T25972] btrfs_mount_root+0x12b/0x1220 [ 701.411522][T25972] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 701.417800][T25972] ? btrfs_decode_error+0x70/0x70 [ 701.423032][T25972] ? rcu_read_lock_sched_held+0x110/0x130 [ 701.428938][T25972] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 701.435216][T25972] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 701.441504][T25972] ? vfs_parse_fs_string+0x111/0x170 [ 701.446842][T25972] ? vfs_parse_fs_string+0x111/0x170 [ 701.452184][T25972] ? rcu_read_lock_sched_held+0x110/0x130 [ 701.457944][T25972] ? kfree+0x1f7/0x220 [ 701.462047][T25972] ? vfs_parse_fs_string+0x116/0x170 [ 701.467364][T25972] ? vfs_parse_fs_param+0x540/0x540 [ 701.472613][T25972] ? btrfs_decode_error+0x70/0x70 [ 701.477687][T25972] legacy_get_tree+0x108/0x220 [ 701.482499][T25972] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 701.488775][T25972] vfs_get_tree+0x8e/0x390 [ 701.493217][T25972] fc_mount+0x17/0xc0 [ 701.497240][T25972] vfs_kern_mount.part.0+0xd8/0xf0 [ 701.502402][T25972] vfs_kern_mount+0x40/0x60 [ 701.506941][T25972] btrfs_mount+0x2b4/0x15e2 [ 701.511470][T25972] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 701.517133][T25972] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 701.523414][T25972] ? should_fail+0x1de/0x852 [ 701.528042][T25972] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 701.533890][T25972] ? btrfs_remount+0x11f0/0x11f0 [ 701.538872][T25972] ? rcu_read_lock_sched_held+0x110/0x130 [ 701.544619][T25972] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 701.550902][T25972] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 701.557192][T25972] ? vfs_parse_fs_string+0x111/0x170 [ 701.562533][T25972] ? vfs_parse_fs_string+0x111/0x170 [ 701.567861][T25972] ? rcu_read_lock_sched_held+0x110/0x130 [ 701.573614][T25972] ? kfree+0x1f7/0x220 [ 701.577726][T25972] ? vfs_parse_fs_string+0x116/0x170 [ 701.583046][T25972] ? vfs_parse_fs_param+0x540/0x540 [ 701.588285][T25972] ? btrfs_remount+0x11f0/0x11f0 [ 701.593269][T25972] legacy_get_tree+0x108/0x220 [ 701.598061][T25972] ? legacy_get_tree+0x108/0x220 [ 701.603020][T25972] ? legacy_parse_monolithic+0x11f/0x180 [ 701.608689][T25972] vfs_get_tree+0x8e/0x390 [ 701.613134][T25972] do_mount+0x138c/0x1c00 [ 701.617496][T25972] ? copy_mount_string+0x40/0x40 [ 701.622465][T25972] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 701.628731][T25972] ? copy_mount_options+0x280/0x3a0 [ 701.633971][T25972] ksys_mount+0xdb/0x150 [ 701.638251][T25972] __x64_sys_mount+0xbe/0x150 [ 701.642963][T25972] do_syscall_64+0xfd/0x680 [ 701.647494][T25972] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 701.653409][T25972] RIP: 0033:0x45bcca [ 701.657331][T25972] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 701.676959][T25972] RSP: 002b:00007f050b165a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 701.685405][T25972] RAX: ffffffffffffffda RBX: 00007f050b165b40 RCX: 000000000045bcca [ 701.693407][T25972] RDX: 00007f050b165ae0 RSI: 00000000200000c0 RDI: 00007f050b165b00 [ 701.701401][T25972] RBP: 0000000000000001 R08: 00007f050b165b40 R09: 00007f050b165ae0 [ 701.709397][T25972] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 701.717472][T25972] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0xf0ffffff7f0000, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) 13:24:53 executing program 5: setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in=@broadcast, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 13:24:53 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x86ddffff, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:53 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:53 executing program 1 (fault-call:0 fault-nth:72): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:53 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 13:24:53 executing program 5: setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in=@broadcast, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, 0xe8) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='bond_slave_0\x00', 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 13:24:53 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x88470000, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 701.964736][T25995] FAULT_INJECTION: forcing a failure. [ 701.964736][T25995] name failslab, interval 1, probability 0, space 0, times 0 [ 701.999725][T25997] hfs: can't find a HFS filesystem on dev loop3 [ 702.000079][T25995] CPU: 0 PID: 25995 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 702.015350][T25995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 702.025447][T25995] Call Trace: [ 702.028793][T25995] dump_stack+0x172/0x1f0 [ 702.033178][T25995] should_fail.cold+0xa/0x15 [ 702.037816][T25995] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 702.043700][T25995] ? ___might_sleep+0x163/0x280 [ 702.048625][T25995] __should_failslab+0x121/0x190 [ 702.053635][T25995] should_failslab+0x9/0x14 [ 702.058221][T25995] kmem_cache_alloc_node_trace+0x26d/0x720 [ 702.064267][T25995] ? vfs_get_tree+0x8e/0x390 [ 702.068894][T25995] ? do_mount+0x138c/0x1c00 [ 702.073438][T25995] ? ksys_mount+0xdb/0x150 [ 702.077898][T25995] ? __x64_sys_mount+0xbe/0x150 [ 702.082790][T25995] ? do_syscall_64+0xfd/0x680 [ 702.087498][T25995] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 702.093602][T25995] __kmalloc_node+0x3d/0x70 [ 702.098156][T25995] kvmalloc_node+0xbd/0x100 [ 702.102711][T25995] btrfs_mount_root+0x12b/0x1220 [ 702.107701][T25995] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 13:24:53 executing program 5: setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in=@broadcast, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, 0xe8) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='bond_slave_0\x00', 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 13:24:53 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000240)='/dev/snd/controlC#\x00', 0x2, 0xfffffffffffffffb) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000080)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r3 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x3f, 0x7, 0xffffffffffffffff, 0x7, 0x0, 0x6, 0x2000, 0xa, 0x5, 0x5854, 0x101, 0x9, 0x7, 0xffff, 0xb6, 0x4, 0x0, 0x40, 0x5, 0x6, 0x1, 0x3, 0x5, 0x1, 0x0, 0x8000, 0x6, 0x2, 0x0, 0x2, 0x90, 0x2, 0x4, 0x2, 0x8000, 0x9, 0x0, 0x3, 0x4, @perf_bp={&(0x7f00000001c0), 0x1}, 0x4000, 0x4, 0x200, 0x7, 0xcb2, 0x0, 0x800}, 0xffffffffffffffff, 0x10, r0, 0x1) dup2(r1, r0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$VHOST_SET_VRING_BASE(r3, 0x4008af12, &(0x7f0000000040)={0x0, 0x5}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) ioctl$TUNGETFEATURES(r3, 0x800454cf, &(0x7f0000000100)) readahead(r4, 0xf5, 0x406) [ 702.113994][T25995] ? btrfs_decode_error+0x70/0x70 [ 702.119059][T25995] ? rcu_read_lock_sched_held+0x110/0x130 [ 702.124828][T25995] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 702.131216][T25995] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 702.137506][T25995] ? vfs_parse_fs_string+0x111/0x170 [ 702.142835][T25995] ? vfs_parse_fs_string+0x111/0x170 [ 702.149159][T25995] ? rcu_read_lock_sched_held+0x110/0x130 [ 702.154928][T25995] ? kfree+0x1f7/0x220 [ 702.159040][T25995] ? vfs_parse_fs_string+0x116/0x170 13:24:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x100000000000000, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) [ 702.164373][T25995] ? vfs_parse_fs_param+0x540/0x540 [ 702.169614][T25995] ? btrfs_decode_error+0x70/0x70 [ 702.174689][T25995] legacy_get_tree+0x108/0x220 [ 702.179499][T25995] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 702.185791][T25995] vfs_get_tree+0x8e/0x390 [ 702.190262][T25995] fc_mount+0x17/0xc0 [ 702.194376][T25995] vfs_kern_mount.part.0+0xd8/0xf0 [ 702.199541][T25995] vfs_kern_mount+0x40/0x60 [ 702.204085][T25995] btrfs_mount+0x2b4/0x15e2 [ 702.208630][T25995] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 702.214301][T25995] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 702.220579][T25995] ? should_fail+0x1de/0x852 [ 702.225217][T25995] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 702.231083][T25995] ? btrfs_remount+0x11f0/0x11f0 [ 702.236079][T25995] ? rcu_read_lock_sched_held+0x110/0x130 [ 702.241843][T25995] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 702.248131][T25995] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 13:24:53 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x88480000, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 702.261303][T25995] ? vfs_parse_fs_string+0x111/0x170 [ 702.266613][T25995] ? vfs_parse_fs_string+0x111/0x170 [ 702.271928][T25995] ? rcu_read_lock_sched_held+0x110/0x130 [ 702.277666][T25995] ? kfree+0x1f7/0x220 [ 702.282220][T25995] ? vfs_parse_fs_string+0x116/0x170 [ 702.287527][T25995] ? vfs_parse_fs_param+0x540/0x540 [ 702.292765][T25995] ? btrfs_remount+0x11f0/0x11f0 [ 702.297725][T25995] legacy_get_tree+0x108/0x220 [ 702.302521][T25995] ? legacy_get_tree+0x108/0x220 [ 702.307501][T25995] ? legacy_parse_monolithic+0x11f/0x180 [ 702.313187][T25995] vfs_get_tree+0x8e/0x390 [ 702.317651][T25995] do_mount+0x138c/0x1c00 [ 702.322042][T25995] ? copy_mount_string+0x40/0x40 [ 702.327031][T25995] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 702.333324][T25995] ? copy_mount_options+0x280/0x3a0 [ 702.338574][T25995] ksys_mount+0xdb/0x150 [ 702.342868][T25995] __x64_sys_mount+0xbe/0x150 [ 702.347604][T25995] do_syscall_64+0xfd/0x680 [ 702.352155][T25995] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 702.358093][T25995] RIP: 0033:0x45bcca [ 702.362036][T25995] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 702.381668][T25995] RSP: 002b:00007f050b165a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 702.390118][T25995] RAX: ffffffffffffffda RBX: 00007f050b165b40 RCX: 000000000045bcca [ 702.398122][T25995] RDX: 00007f050b165ae0 RSI: 00000000200000c0 RDI: 00007f050b165b00 [ 702.406146][T25995] RBP: 0000000000000001 R08: 00007f050b165b40 R09: 00007f050b165ae0 [ 702.415640][T25995] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 702.423644][T25995] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:54 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:54 executing program 5: setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in=@broadcast, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, 0xe8) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='bond_slave_0\x00', 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 13:24:54 executing program 1 (fault-call:0 fault-nth:73): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:54 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x88640000, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 702.707427][T26017] hfs: can't find a HFS filesystem on dev loop3 [ 702.718195][T26020] FAULT_INJECTION: forcing a failure. [ 702.718195][T26020] name failslab, interval 1, probability 0, space 0, times 0 [ 702.732750][T26020] CPU: 1 PID: 26020 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 702.741046][T26020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 702.751138][T26020] Call Trace: [ 702.754482][T26020] dump_stack+0x172/0x1f0 [ 702.758858][T26020] should_fail.cold+0xa/0x15 [ 702.763491][T26020] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 702.769345][T26020] ? ___might_sleep+0x163/0x280 [ 702.774238][T26020] __should_failslab+0x121/0x190 [ 702.779235][T26020] should_failslab+0x9/0x14 [ 702.783772][T26020] kmem_cache_alloc_trace+0x2ce/0x750 [ 702.789176][T26020] ? kasan_kmalloc+0x9/0x10 [ 702.793730][T26020] btrfs_mount_root+0x1d0/0x1220 [ 702.798717][T26020] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 702.805006][T26020] ? btrfs_decode_error+0x70/0x70 [ 702.810072][T26020] ? rcu_read_lock_sched_held+0x110/0x130 [ 702.815849][T26020] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 702.822233][T26020] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 702.828517][T26020] ? vfs_parse_fs_string+0x111/0x170 [ 702.833839][T26020] ? vfs_parse_fs_string+0x111/0x170 [ 702.839428][T26020] ? rcu_read_lock_sched_held+0x110/0x130 [ 702.845186][T26020] ? kfree+0x1f7/0x220 [ 702.849307][T26020] ? vfs_parse_fs_string+0x116/0x170 [ 702.854634][T26020] ? vfs_parse_fs_param+0x540/0x540 [ 702.859877][T26020] ? btrfs_decode_error+0x70/0x70 [ 702.864951][T26020] legacy_get_tree+0x108/0x220 [ 702.869754][T26020] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 702.876040][T26020] vfs_get_tree+0x8e/0x390 [ 702.880527][T26020] fc_mount+0x17/0xc0 [ 702.884558][T26020] vfs_kern_mount.part.0+0xd8/0xf0 [ 702.889731][T26020] vfs_kern_mount+0x40/0x60 [ 702.894287][T26020] btrfs_mount+0x2b4/0x15e2 [ 702.898830][T26020] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 702.904506][T26020] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 702.910793][T26020] ? should_fail+0x1de/0x852 [ 702.915435][T26020] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 702.921301][T26020] ? btrfs_remount+0x11f0/0x11f0 [ 702.926324][T26020] ? rcu_read_lock_sched_held+0x110/0x130 [ 702.932093][T26020] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 702.938392][T26020] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 702.944949][T26020] ? vfs_parse_fs_string+0x111/0x170 [ 702.950292][T26020] ? vfs_parse_fs_string+0x111/0x170 [ 702.955638][T26020] ? rcu_read_lock_sched_held+0x110/0x130 [ 702.961413][T26020] ? kfree+0x1f7/0x220 [ 702.965533][T26020] ? vfs_parse_fs_string+0x116/0x170 [ 702.970866][T26020] ? vfs_parse_fs_param+0x540/0x540 [ 702.976117][T26020] ? btrfs_remount+0x11f0/0x11f0 [ 702.981100][T26020] legacy_get_tree+0x108/0x220 [ 702.985914][T26020] ? legacy_get_tree+0x108/0x220 [ 702.990901][T26020] ? legacy_parse_monolithic+0x11f/0x180 [ 702.996584][T26020] vfs_get_tree+0x8e/0x390 [ 703.001070][T26020] do_mount+0x138c/0x1c00 [ 703.005472][T26020] ? copy_mount_string+0x40/0x40 [ 703.010481][T26020] ? copy_mount_options+0x1fb/0x3a0 [ 703.015759][T26020] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 703.022054][T26020] ? copy_mount_options+0x280/0x3a0 [ 703.027307][T26020] ksys_mount+0xdb/0x150 [ 703.031608][T26020] __x64_sys_mount+0xbe/0x150 [ 703.036327][T26020] do_syscall_64+0xfd/0x680 [ 703.040869][T26020] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 703.046794][T26020] RIP: 0033:0x45bcca [ 703.050724][T26020] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 703.070531][T26020] RSP: 002b:00007f050b165a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 703.079006][T26020] RAX: ffffffffffffffda RBX: 00007f050b165b40 RCX: 000000000045bcca [ 703.087014][T26020] RDX: 00007f050b165ae0 RSI: 00000000200000c0 RDI: 00007f050b165b00 [ 703.095020][T26020] RBP: 0000000000000001 R08: 00007f050b165b40 R09: 00007f050b165ae0 13:24:54 executing program 5: r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='bond_slave_0\x00', 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) [ 703.103025][T26020] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 703.111048][T26020] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x200000000000000, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) 13:24:54 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x88a8ffff, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:54 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000080)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) ioctl$VIDIOC_G_EDID(r0, 0xc0285628, &(0x7f00000001c0)={0x0, 0x6, 0x0, [], &(0x7f0000000100)}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0xfffffffffffffffc, 0x0}}, 0x20) r3 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) r4 = dup2(r3, r2) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r5, 0x800455d1, &(0x7f0000000040)) ioctl$KDMKTONE(r4, 0x4b30, 0x200) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 13:24:54 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:54 executing program 1 (fault-call:0 fault-nth:74): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:54 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x88caffff, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:54 executing program 5: r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='bond_slave_0\x00', 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) [ 703.431972][T26039] hfs: can't find a HFS filesystem on dev loop3 [ 703.446704][T26043] FAULT_INJECTION: forcing a failure. [ 703.446704][T26043] name failslab, interval 1, probability 0, space 0, times 0 13:24:54 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x89060000, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 703.478468][T26043] CPU: 0 PID: 26043 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 703.486714][T26043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 703.497523][T26043] Call Trace: [ 703.501644][T26043] dump_stack+0x172/0x1f0 [ 703.506113][T26043] should_fail.cold+0xa/0x15 [ 703.510732][T26043] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 703.516571][T26043] ? ___might_sleep+0x163/0x280 [ 703.521442][T26043] __should_failslab+0x121/0x190 [ 703.526429][T26043] should_failslab+0x9/0x14 [ 703.530950][T26043] kmem_cache_alloc+0x2af/0x6f0 [ 703.535833][T26043] ? fc_mount+0x17/0xc0 [ 703.540013][T26043] ? vfs_kern_mount.part.0+0xd8/0xf0 [ 703.545317][T26043] ? vfs_kern_mount+0x40/0x60 [ 703.550041][T26043] ? btrfs_mount+0x2b4/0x15e2 [ 703.554729][T26043] ? legacy_get_tree+0x108/0x220 [ 703.559693][T26043] ? vfs_get_tree+0x8e/0x390 [ 703.564325][T26043] ? do_mount+0x138c/0x1c00 [ 703.568885][T26043] ? ksys_mount+0xdb/0x150 [ 703.573333][T26043] getname_kernel+0x53/0x370 [ 703.578045][T26043] kern_path+0x20/0x40 [ 703.582142][T26043] lookup_bdev.part.0+0x7b/0x1b0 [ 703.587104][T26043] ? blkdev_open+0x290/0x290 [ 703.591818][T26043] ? lock_downgrade+0x880/0x880 [ 703.596702][T26043] blkdev_get_by_path+0x81/0x130 [ 703.601672][T26043] btrfs_scan_one_device+0xd3/0x720 [ 703.606891][T26043] ? kfree+0x170/0x220 [ 703.610985][T26043] ? device_list_add+0x14d0/0x14d0 [ 703.616116][T26043] ? trace_hardirqs_on+0x50/0x220 [ 703.621184][T26043] ? btrfs_mount_root+0xb36/0x1220 [ 703.626328][T26043] btrfs_mount_root+0x718/0x1220 [ 703.631312][T26043] ? btrfs_decode_error+0x70/0x70 [ 703.636369][T26043] ? rcu_read_lock_sched_held+0x110/0x130 [ 703.642119][T26043] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 703.648394][T26043] ? vfs_parse_fs_string+0x111/0x170 [ 703.653698][T26043] ? vfs_parse_fs_string+0x111/0x170 [ 703.659006][T26043] ? rcu_read_lock_sched_held+0x110/0x130 [ 703.664742][T26043] ? kfree+0x1f7/0x220 [ 703.668833][T26043] ? vfs_parse_fs_string+0x116/0x170 [ 703.674135][T26043] ? vfs_parse_fs_param+0x540/0x540 [ 703.679357][T26043] ? btrfs_decode_error+0x70/0x70 [ 703.685096][T26043] legacy_get_tree+0x108/0x220 [ 703.689884][T26043] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 703.696141][T26043] vfs_get_tree+0x8e/0x390 [ 703.700591][T26043] fc_mount+0x17/0xc0 [ 703.704587][T26043] vfs_kern_mount.part.0+0xd8/0xf0 [ 703.709723][T26043] vfs_kern_mount+0x40/0x60 [ 703.714249][T26043] btrfs_mount+0x2b4/0x15e2 [ 703.718773][T26043] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 703.724424][T26043] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 13:24:55 executing program 5: r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='bond_slave_0\x00', 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) [ 703.730682][T26043] ? should_fail+0x1de/0x852 [ 703.735299][T26043] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 703.741133][T26043] ? btrfs_remount+0x11f0/0x11f0 [ 703.746099][T26043] ? rcu_read_lock_sched_held+0x110/0x130 [ 703.751836][T26043] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 703.758099][T26043] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 703.764367][T26043] ? vfs_parse_fs_string+0x111/0x170 [ 703.769668][T26043] ? vfs_parse_fs_string+0x111/0x170 [ 703.774981][T26043] ? rcu_read_lock_sched_held+0x110/0x130 [ 703.780720][T26043] ? kfree+0x1f7/0x220 [ 703.784819][T26043] ? vfs_parse_fs_string+0x116/0x170 [ 703.790129][T26043] ? vfs_parse_fs_param+0x540/0x540 [ 703.795359][T26043] ? btrfs_remount+0x11f0/0x11f0 [ 703.800318][T26043] legacy_get_tree+0x108/0x220 [ 703.805111][T26043] ? legacy_get_tree+0x108/0x220 [ 703.810077][T26043] ? legacy_parse_monolithic+0x11f/0x180 [ 703.815734][T26043] vfs_get_tree+0x8e/0x390 [ 703.820189][T26043] do_mount+0x138c/0x1c00 [ 703.824554][T26043] ? copy_mount_string+0x40/0x40 [ 703.829516][T26043] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 703.835773][T26043] ? copy_mount_options+0x280/0x3a0 [ 703.840996][T26043] ksys_mount+0xdb/0x150 [ 703.845258][T26043] __x64_sys_mount+0xbe/0x150 [ 703.849956][T26043] do_syscall_64+0xfd/0x680 [ 703.854484][T26043] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 703.860391][T26043] RIP: 0033:0x45bcca [ 703.864299][T26043] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 13:24:55 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x90@\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 703.883919][T26043] RSP: 002b:00007f050b165a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 703.892354][T26043] RAX: ffffffffffffffda RBX: 00007f050b165b40 RCX: 000000000045bcca [ 703.900351][T26043] RDX: 00007f050b165ae0 RSI: 00000000200000c0 RDI: 00007f050b165b00 [ 703.908343][T26043] RBP: 0000000000000001 R08: 00007f050b165b40 R09: 00007f050b165ae0 [ 703.916338][T26043] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 703.924333][T26043] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:55 executing program 1 (fault-call:0 fault-nth:75): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 704.001104][T26039] hfs: can't find a HFS filesystem on dev loop3 13:24:55 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x89ffffff, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:55 executing program 5: setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='bond_slave_0\x00', 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 13:24:55 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\xc0', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:55 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)) time(&(0x7f0000000040)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$P9_RLINK(r1, &(0x7f0000000100)={0x7, 0x47, 0x1}, 0x7) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 13:24:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0xc00000000000000, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) 13:24:55 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x8dffffff, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:55 executing program 5: setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='bond_slave_0\x00', 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) [ 704.233151][T26064] FAULT_INJECTION: forcing a failure. [ 704.233151][T26064] name failslab, interval 1, probability 0, space 0, times 0 [ 704.282896][T26064] CPU: 1 PID: 26064 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 704.290944][T26064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 704.301955][T26064] Call Trace: [ 704.305287][T26064] dump_stack+0x172/0x1f0 [ 704.318345][T26064] should_fail.cold+0xa/0x15 [ 704.322986][T26064] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 704.328833][T26064] ? ___might_sleep+0x163/0x280 [ 704.333728][T26064] __should_failslab+0x121/0x190 [ 704.338733][T26064] should_failslab+0x9/0x14 [ 704.343283][T26064] kmem_cache_alloc_trace+0x2ce/0x750 [ 704.348701][T26064] ? kasan_kmalloc+0x9/0x10 [ 704.353241][T26064] ? __kmalloc_node+0x4e/0x70 [ 704.357961][T26064] btrfs_mount_root+0x174/0x1220 [ 704.362950][T26064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 704.369242][T26064] ? btrfs_decode_error+0x70/0x70 [ 704.374315][T26064] ? rcu_read_lock_sched_held+0x110/0x130 [ 704.380081][T26064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 704.386360][T26064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 704.392646][T26064] ? vfs_parse_fs_string+0x111/0x170 [ 704.397970][T26064] ? vfs_parse_fs_string+0x111/0x170 [ 704.403288][T26064] ? rcu_read_lock_sched_held+0x110/0x130 [ 704.409028][T26064] ? kfree+0x1f7/0x220 [ 704.413206][T26064] ? vfs_parse_fs_string+0x116/0x170 [ 704.418509][T26064] ? vfs_parse_fs_param+0x540/0x540 [ 704.423734][T26064] ? btrfs_decode_error+0x70/0x70 [ 704.428779][T26064] legacy_get_tree+0x108/0x220 [ 704.433560][T26064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 704.439809][T26064] vfs_get_tree+0x8e/0x390 [ 704.439830][T26064] fc_mount+0x17/0xc0 [ 704.439844][T26064] vfs_kern_mount.part.0+0xd8/0xf0 [ 704.439859][T26064] vfs_kern_mount+0x40/0x60 [ 704.439880][T26064] btrfs_mount+0x2b4/0x15e2 [ 704.439900][T26064] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 704.448307][T26064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 704.474393][T26064] ? should_fail+0x1de/0x852 [ 704.479073][T26064] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 704.484909][T26064] ? btrfs_remount+0x11f0/0x11f0 [ 704.489880][T26064] ? rcu_read_lock_sched_held+0x110/0x130 [ 704.495621][T26064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 704.501887][T26064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 704.508157][T26064] ? vfs_parse_fs_string+0x111/0x170 [ 704.513467][T26064] ? vfs_parse_fs_string+0x111/0x170 [ 704.518777][T26064] ? rcu_read_lock_sched_held+0x110/0x130 [ 704.524521][T26064] ? kfree+0x1f7/0x220 [ 704.528609][T26064] ? vfs_parse_fs_string+0x116/0x170 [ 704.533917][T26064] ? vfs_parse_fs_param+0x540/0x540 [ 704.539137][T26064] ? btrfs_remount+0x11f0/0x11f0 [ 704.544095][T26064] legacy_get_tree+0x108/0x220 [ 704.548879][T26064] ? legacy_get_tree+0x108/0x220 [ 704.553834][T26064] ? legacy_parse_monolithic+0x11f/0x180 [ 704.553856][T26064] vfs_get_tree+0x8e/0x390 [ 704.553875][T26064] do_mount+0x138c/0x1c00 [ 704.553895][T26064] ? copy_mount_string+0x40/0x40 [ 704.568264][T26064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 704.568284][T26064] ? copy_mount_options+0x280/0x3a0 [ 704.568304][T26064] ksys_mount+0xdb/0x150 [ 704.588912][T26064] __x64_sys_mount+0xbe/0x150 [ 704.593622][T26064] do_syscall_64+0xfd/0x680 [ 704.598160][T26064] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 704.604068][T26064] RIP: 0033:0x45bcca [ 704.607978][T26064] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 13:24:55 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0xf5ffffff, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:56 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0xfc000000, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:56 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0xfe800000, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 704.627600][T26064] RSP: 002b:00007f050b165a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 704.636032][T26064] RAX: ffffffffffffffda RBX: 00007f050b165b40 RCX: 000000000045bcca [ 704.644029][T26064] RDX: 00007f050b165ae0 RSI: 00000000200000c0 RDI: 00007f050b165b00 [ 704.652032][T26064] RBP: 0000000000000001 R08: 00007f050b165b40 R09: 00007f050b165ae0 [ 704.660033][T26064] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 704.668030][T26064] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:56 executing program 5: setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='bond_slave_0\x00', 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 13:24:56 executing program 1 (fault-call:0 fault-nth:76): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:56 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0xfec00000, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:56 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000080)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r3 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r3, r2) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000240)={0x0, 0x200, 0x0, 0x401, 0x1, 0x3, 0xfffffffffffffffa, 0x7, {0x0, @in6={{0xa, 0x4e23, 0x18000000000, @ipv4={[], [], @empty}, 0x8000}}, 0xcfb6, 0x7, 0x4, 0x8}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r4, 0x84, 0x73, &(0x7f00000001c0)={r5, 0xcb, 0x30, 0xffffffffffff39ee, 0x2}, &(0x7f0000000300)=0x18) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 13:24:56 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:56 executing program 5: setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in=@broadcast, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='bond_slave_0\x00', 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) [ 705.006483][T26097] FAULT_INJECTION: forcing a failure. [ 705.006483][T26097] name failslab, interval 1, probability 0, space 0, times 0 [ 705.039753][T26097] CPU: 0 PID: 26097 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 705.047850][T26097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 705.047889][T26097] Call Trace: [ 705.047927][T26097] dump_stack+0x172/0x1f0 [ 705.047958][T26097] should_fail.cold+0xa/0x15 [ 705.047988][T26097] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 705.076153][T26097] ? ___might_sleep+0x163/0x280 [ 705.081050][T26097] __should_failslab+0x121/0x190 [ 705.086026][T26097] should_failslab+0x9/0x14 [ 705.090547][T26097] __kmalloc_track_caller+0x2d5/0x740 [ 705.090565][T26097] ? btrfs_mount_root+0x1d0/0x1220 [ 705.090581][T26097] ? rcu_read_lock_sched_held+0x110/0x130 [ 705.090598][T26097] ? btrfs_mount_root+0x2b8/0x1220 [ 705.090619][T26097] kstrdup+0x3a/0x70 [ 705.090637][T26097] btrfs_mount_root+0x2b8/0x1220 [ 705.090657][T26097] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 705.090675][T26097] ? btrfs_decode_error+0x70/0x70 [ 705.090697][T26097] ? rcu_read_lock_sched_held+0x110/0x130 [ 705.118713][T26101] hfs: can't find a HFS filesystem on dev loop3 [ 705.120866][T26097] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 705.120886][T26097] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 705.120905][T26097] ? vfs_parse_fs_string+0x111/0x170 [ 705.120919][T26097] ? vfs_parse_fs_string+0x111/0x170 [ 705.120934][T26097] ? rcu_read_lock_sched_held+0x110/0x130 [ 705.120948][T26097] ? kfree+0x1f7/0x220 [ 705.120964][T26097] ? vfs_parse_fs_string+0x116/0x170 [ 705.120977][T26097] ? vfs_parse_fs_param+0x540/0x540 [ 705.120994][T26097] ? btrfs_decode_error+0x70/0x70 [ 705.121017][T26097] legacy_get_tree+0x108/0x220 [ 705.197802][T26097] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 705.204094][T26097] vfs_get_tree+0x8e/0x390 [ 705.208620][T26097] fc_mount+0x17/0xc0 [ 705.212645][T26097] vfs_kern_mount.part.0+0xd8/0xf0 [ 705.217804][T26097] vfs_kern_mount+0x40/0x60 [ 705.222530][T26097] btrfs_mount+0x2b4/0x15e2 [ 705.227069][T26097] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 705.232828][T26097] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 705.239118][T26097] ? should_fail+0x1de/0x852 [ 705.243760][T26097] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 705.249659][T26097] ? btrfs_remount+0x11f0/0x11f0 [ 705.254664][T26097] ? rcu_read_lock_sched_held+0x110/0x130 [ 705.260425][T26097] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 705.266709][T26097] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 705.273000][T26097] ? vfs_parse_fs_string+0x111/0x170 [ 705.278336][T26097] ? vfs_parse_fs_string+0x111/0x170 [ 705.285177][T26097] ? rcu_read_lock_sched_held+0x110/0x130 [ 705.290941][T26097] ? kfree+0x1f7/0x220 [ 705.295050][T26097] ? vfs_parse_fs_string+0x116/0x170 [ 705.300374][T26097] ? vfs_parse_fs_param+0x540/0x540 [ 705.305610][T26097] ? btrfs_remount+0x11f0/0x11f0 [ 705.310573][T26097] legacy_get_tree+0x108/0x220 [ 705.315366][T26097] ? legacy_get_tree+0x108/0x220 [ 705.320343][T26097] ? legacy_parse_monolithic+0x11f/0x180 [ 705.326016][T26097] vfs_get_tree+0x8e/0x390 [ 705.330473][T26097] do_mount+0x138c/0x1c00 [ 705.334852][T26097] ? copy_mount_string+0x40/0x40 [ 705.340910][T26097] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 705.347211][T26097] ? copy_mount_options+0x280/0x3a0 [ 705.352464][T26097] ksys_mount+0xdb/0x150 [ 705.356756][T26097] __x64_sys_mount+0xbe/0x150 [ 705.361476][T26097] do_syscall_64+0xfd/0x680 [ 705.366009][T26097] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 705.371925][T26097] RIP: 0033:0x45bcca [ 705.375837][T26097] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 705.396132][T26097] RSP: 002b:00007f050b165a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 13:24:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x4000000000000000, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) 13:24:56 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0xff000000, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:56 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)=0xdffffffffffffffc) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r2, r1) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 13:24:56 executing program 5: setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in=@broadcast, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='bond_slave_0\x00', 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) [ 705.404583][T26097] RAX: ffffffffffffffda RBX: 00007f050b165b40 RCX: 000000000045bcca [ 705.412574][T26097] RDX: 00007f050b165ae0 RSI: 00000000200000c0 RDI: 00007f050b165b00 [ 705.420571][T26097] RBP: 0000000000000001 R08: 00007f050b165b40 R09: 00007f050b165ae0 [ 705.428562][T26097] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 705.436552][T26097] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:57 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0xffffa888, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:57 executing program 1 (fault-call:0 fault-nth:77): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 705.552238][T26101] hfs: can't find a HFS filesystem on dev loop3 13:24:57 executing program 5: setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in=@broadcast, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000000)='bond_slave_0\x00', 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 13:24:57 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x0f', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:57 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0xffffca88, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:57 executing program 5: setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in=@broadcast, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) [ 705.789939][T26123] FAULT_INJECTION: forcing a failure. [ 705.789939][T26123] name failslab, interval 1, probability 0, space 0, times 0 [ 705.836929][T26123] CPU: 0 PID: 26123 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 705.844981][T26123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 705.855085][T26123] Call Trace: [ 705.858435][T26123] dump_stack+0x172/0x1f0 [ 705.862816][T26123] should_fail.cold+0xa/0x15 [ 705.867446][T26123] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 705.873280][T26123] ? ___might_sleep+0x163/0x280 [ 705.878164][T26123] __should_failslab+0x121/0x190 [ 705.883138][T26123] should_failslab+0x9/0x14 [ 705.887662][T26123] __kmalloc+0x2d9/0x740 [ 705.891928][T26123] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 705.898202][T26123] ? d_absolute_path+0x11b/0x170 [ 705.903158][T26123] ? __d_path+0x140/0x140 [ 705.907520][T26123] ? tomoyo_encode2.part.0+0xf5/0x400 [ 705.912918][T26123] tomoyo_encode2.part.0+0xf5/0x400 [ 705.918139][T26123] tomoyo_encode+0x2b/0x50 [ 705.922579][T26123] tomoyo_realpath_from_path+0x1d3/0x7a0 [ 705.928271][T26123] tomoyo_path_number_perm+0x1dd/0x520 [ 705.933744][T26123] ? tomoyo_path_number_perm+0x193/0x520 [ 705.939395][T26123] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 705.945217][T26123] ? save_stack+0x5c/0x90 [ 705.949550][T26123] ? save_stack+0x23/0x90 [ 705.953890][T26123] ? __kasan_slab_free+0x102/0x150 [ 705.959008][T26123] ? kasan_slab_free+0xe/0x10 [ 705.963704][T26123] ? __fget+0x35a/0x550 [ 705.967895][T26123] ? __fget+0x381/0x550 [ 705.972067][T26123] ? ksys_dup3+0x3e0/0x3e0 [ 705.976508][T26123] tomoyo_file_ioctl+0x23/0x30 [ 705.981318][T26123] security_file_ioctl+0x77/0xc0 13:24:57 executing program 5: setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in=@broadcast, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) [ 705.986272][T26123] ksys_ioctl+0x57/0xd0 [ 705.990444][T26123] __x64_sys_ioctl+0x73/0xb0 [ 705.995060][T26123] do_syscall_64+0xfd/0x680 [ 705.999611][T26123] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 706.005519][T26123] RIP: 0033:0x4590e7 [ 706.009429][T26123] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 706.029052][T26123] RSP: 002b:00007f050b165a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 13:24:57 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0xffffdd86, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 706.037481][T26123] RAX: ffffffffffffffda RBX: 00007f050b165b40 RCX: 00000000004590e7 [ 706.037491][T26123] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 706.037501][T26123] RBP: 0000000000000001 R08: 00007f050b165b40 R09: 00007f050b165ae0 [ 706.037510][T26123] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 706.037519][T26123] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 [ 706.129429][T26123] ERROR: Out of memory at tomoyo_realpath_from_path. 13:24:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0x8000000000000000, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) 13:24:57 executing program 5: setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in=@broadcast, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 13:24:58 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000080)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000100), &(0x7f00000001c0)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r3 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r3, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000040), 0x4) 13:24:58 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0xfffff000, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:58 executing program 1 (fault-call:0 fault-nth:78): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:58 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:58 executing program 5: setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in=@broadcast, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='bond_slave_0\x00', 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 13:24:58 executing program 5: setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in=@broadcast, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='bond_slave_0\x00', 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) [ 706.659083][T26150] FAULT_INJECTION: forcing a failure. [ 706.659083][T26150] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 706.672376][T26150] CPU: 1 PID: 26150 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 706.680372][T26150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 706.690442][T26150] Call Trace: [ 706.694017][T26150] dump_stack+0x172/0x1f0 [ 706.698388][T26150] should_fail.cold+0xa/0x15 [ 706.703001][T26150] ? btrfs_mount_root+0x12b/0x1220 [ 706.708167][T26150] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 706.713989][T26150] ? mark_held_locks+0xf0/0xf0 [ 706.718811][T26150] should_fail_alloc_page+0x50/0x60 [ 706.724025][T26150] __alloc_pages_nodemask+0x1a1/0x8d0 [ 706.729409][T26150] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 706.735060][T26150] ? __alloc_pages_slowpath+0x28f0/0x28f0 [ 706.740828][T26150] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 706.746482][T26150] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 706.752747][T26150] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 706.758747][T26150] cache_grow_begin+0x9d/0x650 [ 706.763523][T26150] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 706.769821][T26150] kmem_cache_alloc_trace+0x67c/0x750 [ 706.775205][T26150] ? kasan_kmalloc+0x9/0x10 [ 706.779737][T26150] btrfs_mount_root+0x174/0x1220 [ 706.784696][T26150] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 706.790988][T26150] ? btrfs_decode_error+0x70/0x70 [ 706.796028][T26150] ? rcu_read_lock_sched_held+0x110/0x130 [ 706.801761][T26150] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 706.808012][T26150] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 706.814269][T26150] ? vfs_parse_fs_string+0x111/0x170 [ 706.819574][T26150] ? vfs_parse_fs_string+0x111/0x170 [ 706.824878][T26150] ? rcu_read_lock_sched_held+0x110/0x130 [ 706.830608][T26150] ? kfree+0x1f7/0x220 [ 706.834778][T26150] ? vfs_parse_fs_string+0x116/0x170 [ 706.840078][T26150] ? vfs_parse_fs_param+0x540/0x540 [ 706.845296][T26150] ? btrfs_decode_error+0x70/0x70 [ 706.850330][T26150] legacy_get_tree+0x108/0x220 [ 706.855111][T26150] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 706.861363][T26150] vfs_get_tree+0x8e/0x390 [ 706.865798][T26150] fc_mount+0x17/0xc0 [ 706.869792][T26150] vfs_kern_mount.part.0+0xd8/0xf0 [ 706.874922][T26150] vfs_kern_mount+0x40/0x60 [ 706.879441][T26150] btrfs_mount+0x2b4/0x15e2 [ 706.883959][T26150] ? trace_hardirqs_on_caller+0x6a/0x220 [ 706.889617][T26150] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 706.895096][T26150] ? btrfs_remount+0x11f0/0x11f0 [ 706.900163][T26150] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 706.906503][T26150] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 706.912759][T26150] ? vfs_parse_fs_string+0x111/0x170 [ 706.918058][T26150] ? vfs_parse_fs_string+0x111/0x170 [ 706.923361][T26150] ? rcu_read_lock_sched_held+0x110/0x130 [ 706.929090][T26150] ? kfree+0x1f7/0x220 [ 706.933174][T26150] ? vfs_parse_fs_string+0x116/0x170 [ 706.938471][T26150] ? vfs_parse_fs_param+0x540/0x540 [ 706.943692][T26150] ? btrfs_remount+0x11f0/0x11f0 [ 706.948656][T26150] legacy_get_tree+0x108/0x220 [ 706.953458][T26150] ? legacy_get_tree+0x108/0x220 [ 706.958434][T26150] ? legacy_parse_monolithic+0x11f/0x180 [ 706.964157][T26150] vfs_get_tree+0x8e/0x390 [ 706.968855][T26150] do_mount+0x138c/0x1c00 [ 706.973215][T26150] ? copy_mount_string+0x40/0x40 [ 706.978178][T26150] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 706.984441][T26150] ? copy_mount_options+0x280/0x3a0 [ 706.989656][T26150] ksys_mount+0xdb/0x150 [ 706.993934][T26150] __x64_sys_mount+0xbe/0x150 [ 706.998629][T26150] do_syscall_64+0xfd/0x680 [ 707.003189][T26150] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 707.009097][T26150] RIP: 0033:0x45bcca [ 707.013008][T26150] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 707.032636][T26150] RSP: 002b:00007f050b165a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 707.041082][T26150] RAX: ffffffffffffffda RBX: 00007f050b165b40 RCX: 000000000045bcca [ 707.049085][T26150] RDX: 00007f050b165ae0 RSI: 00000000200000c0 RDI: 00007f050b165b00 [ 707.057065][T26150] RBP: 0000000000000001 R08: 00007f050b165b40 R09: 00007f050b165ae0 [ 707.065050][T26150] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 707.073033][T26150] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 13:24:58 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x4000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000300)={0x81, 0x3, 0x1, 0x3f, &(0x7f0000000240)=[{}, {}, {}]}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000080)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r3 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r3, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 13:24:58 executing program 5: setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in=@broadcast, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='bond_slave_0\x00', 0x10) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2, 0x0, 0x29, 0x2}, 0x1c2) 13:24:58 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0xffffff89, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 707.114220][T26154] hfs: can't find a HFS filesystem on dev loop3 13:24:58 executing program 5: setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in=@broadcast, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='bond_slave_0\x00', 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, 0x0, 0x0) [ 707.253431][T26154] hfs: can't find a HFS filesystem on dev loop3 13:24:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0xd001010000000000, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) 13:24:58 executing program 1 (fault-call:0 fault-nth:79): syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000240)="8da4363a00000000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:24:58 executing program 5: setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in=@broadcast, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='bond_slave_0\x00', 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, 0x0, 0x0) 13:24:58 executing program 3: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:24:58 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0xffffff8d, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 707.419106][T26173] FAULT_INJECTION: forcing a failure. [ 707.419106][T26173] name failslab, interval 1, probability 0, space 0, times 0 [ 707.459117][T26173] CPU: 0 PID: 26173 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 707.467288][T26173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 707.477381][T26173] Call Trace: [ 707.480702][T26173] dump_stack+0x172/0x1f0 [ 707.485075][T26173] should_fail.cold+0xa/0x15 [ 707.489784][T26173] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 707.495789][T26173] ? ___might_sleep+0x163/0x280 [ 707.500661][T26173] __should_failslab+0x121/0x190 [ 707.505622][T26173] should_failslab+0x9/0x14 [ 707.510147][T26173] __kmalloc+0x2d9/0x740 [ 707.514420][T26173] ? close_fs_devices.part.0+0x219/0x790 [ 707.520074][T26173] close_fs_devices.part.0+0x219/0x790 [ 707.525576][T26173] btrfs_close_devices+0xa0/0x200 [ 707.530627][T26173] btrfs_mount_root+0xf0c/0x1220 [ 707.535585][T26173] ? btrfs_decode_error+0x70/0x70 [ 707.540656][T26173] ? rcu_read_lock_sched_held+0x110/0x130 [ 707.546397][T26173] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 707.552659][T26173] ? vfs_parse_fs_string+0x111/0x170 [ 707.557958][T26173] ? vfs_parse_fs_string+0x111/0x170 [ 707.563259][T26173] ? rcu_read_lock_sched_held+0x110/0x130 [ 707.568998][T26173] ? kfree+0x1f7/0x220 [ 707.573123][T26173] ? vfs_parse_fs_string+0x116/0x170 [ 707.578426][T26173] ? vfs_parse_fs_param+0x540/0x540 [ 707.583645][T26173] ? btrfs_decode_error+0x70/0x70 [ 707.588684][T26173] legacy_get_tree+0x108/0x220 [ 707.593526][T26173] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 707.599795][T26173] vfs_get_tree+0x8e/0x390 [ 707.604329][T26173] fc_mount+0x17/0xc0 [ 707.608364][T26173] vfs_kern_mount.part.0+0xd8/0xf0 [ 707.613525][T26173] vfs_kern_mount+0x40/0x60 [ 707.618087][T26173] btrfs_mount+0x2b4/0x15e2 [ 707.622675][T26173] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 707.628528][T26173] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 707.634803][T26173] ? should_fail+0x1de/0x852 [ 707.639445][T26173] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 707.645296][T26173] ? btrfs_remount+0x11f0/0x11f0 [ 707.650273][T26173] ? rcu_read_lock_sched_held+0x110/0x130 [ 707.656064][T26173] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 707.662338][T26173] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 707.668609][T26173] ? vfs_parse_fs_string+0x111/0x170 [ 707.673947][T26173] ? vfs_parse_fs_string+0x111/0x170 [ 707.679266][T26173] ? rcu_read_lock_sched_held+0x110/0x130 [ 707.685017][T26173] ? kfree+0x1f7/0x220 [ 707.689119][T26173] ? vfs_parse_fs_string+0x116/0x170 [ 707.694446][T26173] ? vfs_parse_fs_param+0x540/0x540 [ 707.699765][T26173] ? btrfs_remount+0x11f0/0x11f0 [ 707.704740][T26173] legacy_get_tree+0x108/0x220 [ 707.709531][T26173] ? legacy_get_tree+0x108/0x220 [ 707.714500][T26173] ? legacy_parse_monolithic+0x11f/0x180 [ 707.720187][T26173] vfs_get_tree+0x8e/0x390 [ 707.724647][T26173] do_mount+0x138c/0x1c00 [ 707.729010][T26173] ? copy_mount_string+0x40/0x40 [ 707.733982][T26173] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 707.740252][T26173] ? _copy_from_user+0xdd/0x150 [ 707.745129][T26173] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 707.751404][T26173] ? copy_mount_options+0x280/0x3a0 [ 707.756637][T26173] ksys_mount+0xdb/0x150 [ 707.760916][T26173] __x64_sys_mount+0xbe/0x150 [ 707.765628][T26173] do_syscall_64+0xfd/0x680 [ 707.770164][T26173] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 707.776091][T26173] RIP: 0033:0x45bcca [ 707.780311][T26173] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 707.799942][T26173] RSP: 002b:00007f050b165a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 707.808393][T26173] RAX: ffffffffffffffda RBX: 00007f050b165b40 RCX: 000000000045bcca [ 707.816402][T26173] RDX: 00007f050b165ae0 RSI: 00000000200000c0 RDI: 00007f050b165b00 [ 707.824407][T26173] RBP: 0000000000000001 R08: 00007f050b165b40 R09: 00007f050b165ae0 13:24:59 executing program 5: setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in=@broadcast, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='bond_slave_0\x00', 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, 0x0, 0x0) 13:24:59 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0xfffffff5, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) [ 707.832406][T26173] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 707.840399][T26173] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 [ 707.860107][T26173] ------------[ cut here ]------------ [ 707.865627][T26173] kernel BUG at fs/btrfs/volumes.c:1275! [ 707.877584][T26173] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 707.879780][ T8815] kobject: 'loop3' (00000000318ee1a7): kobject_uevent_env [ 707.883696][T26173] CPU: 0 PID: 26173 Comm: syz-executor.1 Not tainted 5.2.0-rc3+ #20 [ 707.883705][T26173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 707.883739][T26173] RIP: 0010:close_fs_devices.part.0+0x5c0/0x790 [ 707.896868][ T8815] kobject: 'loop3' (00000000318ee1a7): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 707.898851][T26173] Code: 00 48 8b 45 c0 c7 80 20 01 00 00 00 00 00 00 48 83 c4 48 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 f7 4f c4 fe 0f 0b e8 f0 4f c4 fe <0f> 0b e8 e9 4f c4 fe 0f 0b e9 16 ff ff ff e8 dd 4f c4 fe 0f 0b e9 [ 707.898860][T26173] RSP: 0018:ffff888059c7f7a0 EFLAGS: 00010246 [ 707.941508][ T3879] kobject: 'loop5' (00000000f6953125): kobject_uevent_env [ 707.944907][T26173] RAX: 0000000000040000 RBX: 0000000000000000 RCX: ffffc90007ff2000 [ 707.944917][T26173] RDX: 0000000000040000 RSI: ffffffff82ac56c0 RDI: 0000000000000286 [ 707.944926][T26173] RBP: ffff888059c7f810 R08: ffff8880816fa440 R09: ffffed1015d06be0 [ 707.944935][T26173] R10: ffffed1015d06bdf R11: ffff8880ae835efb R12: ffff88809f770d50 [ 707.944944][T26173] R13: dffffc0000000000 R14: ffff88809973e480 R15: ffff8880a041db40 [ 707.944965][T26173] FS: 00007f050b166700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 707.962352][ T3879] kobject: 'loop5' (00000000f6953125): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 707.966183][T26173] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 707.966193][T26173] CR2: 00007ffda173e6f8 CR3: 000000008d759000 CR4: 00000000001406f0 [ 707.966205][T26173] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 707.966213][T26173] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 707.966226][T26173] Call Trace: [ 707.979013][T26185] kobject: 'loop3' (00000000318ee1a7): kobject_uevent_env [ 707.982289][T26173] btrfs_close_devices+0xa0/0x200 [ 707.982310][T26173] btrfs_mount_root+0xf0c/0x1220 [ 707.982329][T26173] ? btrfs_decode_error+0x70/0x70 [ 707.982346][T26173] ? rcu_read_lock_sched_held+0x110/0x130 [ 707.982363][T26173] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 707.982389][T26173] ? vfs_parse_fs_string+0x111/0x170 [ 707.992632][ T3879] kobject: 'loop2' (0000000082b46fda): kobject_uevent_env [ 707.998383][T26173] ? vfs_parse_fs_string+0x111/0x170 [ 707.998402][T26173] ? rcu_read_lock_sched_held+0x110/0x130 [ 707.998415][T26173] ? kfree+0x1f7/0x220 [ 707.998439][T26173] ? vfs_parse_fs_string+0x116/0x170 [ 708.008514][T26185] kobject: 'loop3' (00000000318ee1a7): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 708.017542][T26173] ? vfs_parse_fs_param+0x540/0x540 [ 708.017562][T26173] ? btrfs_decode_error+0x70/0x70 [ 708.017574][T26173] legacy_get_tree+0x108/0x220 [ 708.017590][T26173] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 708.017605][T26173] vfs_get_tree+0x8e/0x390 [ 708.017619][T26173] fc_mount+0x17/0xc0 [ 708.017632][T26173] vfs_kern_mount.part.0+0xd8/0xf0 [ 708.017644][T26173] vfs_kern_mount+0x40/0x60 [ 708.017656][T26173] btrfs_mount+0x2b4/0x15e2 [ 708.017669][T26173] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 708.017682][T26173] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 708.017707][T26173] ? should_fail+0x1de/0x852 [ 708.025227][ T3879] kobject: 'loop2' (0000000082b46fda): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 708.032272][T26173] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 708.032292][T26173] ? btrfs_remount+0x11f0/0x11f0 [ 708.032311][T26173] ? rcu_read_lock_sched_held+0x110/0x130 [ 708.032326][T26173] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 708.032347][T26173] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 708.046185][T26185] hfs: can't find a HFS filesystem on dev loop3 [ 708.048301][T26173] ? vfs_parse_fs_string+0x111/0x170 [ 708.048317][T26173] ? vfs_parse_fs_string+0x111/0x170 [ 708.048335][T26173] ? rcu_read_lock_sched_held+0x110/0x130 [ 708.048358][T26173] ? kfree+0x1f7/0x220 [ 708.054628][ T3879] kobject: 'loop3' (00000000318ee1a7): kobject_uevent_env [ 708.058768][T26173] ? vfs_parse_fs_string+0x116/0x170 [ 708.058784][T26173] ? vfs_parse_fs_param+0x540/0x540 [ 708.058804][T26173] ? btrfs_remount+0x11f0/0x11f0 [ 708.058825][T26173] legacy_get_tree+0x108/0x220 [ 708.064636][ T3879] kobject: 'loop3' (00000000318ee1a7): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 708.068815][T26173] ? legacy_get_tree+0x108/0x220 [ 708.068830][T26173] ? legacy_parse_monolithic+0x11f/0x180 [ 708.068845][T26173] vfs_get_tree+0x8e/0x390 [ 708.068862][T26173] do_mount+0x138c/0x1c00 [ 708.068886][T26173] ? copy_mount_string+0x40/0x40 [ 708.317080][T26173] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 708.323350][T26173] ? _copy_from_user+0xdd/0x150 [ 708.328222][T26173] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 708.334485][T26173] ? copy_mount_options+0x280/0x3a0 [ 708.339885][T26173] ksys_mount+0xdb/0x150 [ 708.344151][T26173] __x64_sys_mount+0xbe/0x150 [ 708.348853][T26173] do_syscall_64+0xfd/0x680 [ 708.353410][T26173] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 708.359311][T26173] RIP: 0033:0x45bcca [ 708.363222][T26173] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 13:24:59 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000011c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r1, 0x40045532, &(0x7f0000000080)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x8105, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) r3 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) getsockopt$inet_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000240)=""/183, &(0x7f0000000040)=0xb7) dup2(r3, r2) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') socket$inet_tcp(0x2, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 13:24:59 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0xf0ffffffffffff, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:24:59 executing program 5: setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in=@broadcast, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='bond_slave_0\x00', 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x0, 0x0, 0x29, 0x2}, 0x1c2) [ 708.382933][T26173] RSP: 002b:00007f050b165a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 708.391380][T26173] RAX: ffffffffffffffda RBX: 00007f050b165b40 RCX: 000000000045bcca [ 708.399401][T26173] RDX: 00007f050b165ae0 RSI: 00000000200000c0 RDI: 00007f050b165b00 [ 708.407474][T26173] RBP: 0000000000000001 R08: 00007f050b165b40 R09: 00007f050b165ae0 [ 708.415467][T26173] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 708.423447][T26173] R13: 00000000004c7ef6 R14: 00000000004de458 R15: 0000000000000003 [ 708.431447][T26173] Modules linked in: 13:24:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000140)="a3", 0x1}], 0x1) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8)=[{0x8000000, 0xeffdffff00000000, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) [ 708.470658][T26185] kobject: 'loop3' (00000000318ee1a7): kobject_uevent_env [ 708.477991][T26173] ---[ end trace 28c4afa7f304d1a4 ]--- [ 708.478076][T26185] kobject: 'loop3' (00000000318ee1a7): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 708.483801][T26173] RIP: 0010:close_fs_devices.part.0+0x5c0/0x790 [ 708.503321][T26173] Code: 00 48 8b 45 c0 c7 80 20 01 00 00 00 00 00 00 48 83 c4 48 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 f7 4f c4 fe 0f 0b e8 f0 4f c4 fe <0f> 0b e8 e9 4f c4 fe 0f 0b e9 16 ff ff ff e8 dd 4f c4 fe 0f 0b e9 [ 708.505949][ T3879] kobject: 'loop1' (000000004726392e): kobject_uevent_env [ 708.529748][T26173] RSP: 0018:ffff888059c7f7a0 EFLAGS: 00010246 [ 708.536619][T26185] kobject: 'loop3' (00000000318ee1a7): kobject_uevent_env [ 708.546370][T26185] kobject: 'loop3' (00000000318ee1a7): fill_kobj_path: path = '/devices/virtual/block/loop3' 13:25:00 executing program 2: syz_emit_ethernet(0x66, &(0x7f0000000000)={@random="01ba3c201a7c", @empty, [], {@ipv6={0x86dd, {0x100000000000000, 0x6, "02290f", 0x30, 0x29, 0x0, @ipv4, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f]}}}}}}}}, 0x0) 13:25:00 executing program 5: setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001000)={{{@in=@broadcast, @in6=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@dev}}, 0xe8) r0 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='bond_slave_0\x00', 0x10) setsockopt$netlink_NETLINK_RX_RING(r0, 0x29, 0x6, &(0x7f0000000ff0)={0x0, 0x0, 0x29, 0x2}, 0x1c2) [ 708.565639][T26173] RAX: 0000000000040000 RBX: 0000000000000000 RCX: ffffc90007ff2000 [ 708.590047][T26173] RDX: 0000000000040000 RSI: ffffffff82ac56c0 RDI: 0000000000000286 [ 708.604357][ T3879] kobject: 'loop1' (000000004726392e): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 708.612286][T26173] RBP: ffff888059c7f810 R08: ffff8880816fa440 R09: ffffed1015d06be0 [ 708.632614][ T3879] kobject: 'loop3' (00000000318ee1a7): kobject_uevent_env [ 708.634411][T26173] R10: ffffed1015d06bdf R11: ffff8880ae835efb R12: ffff88809f770d50 [ 708.644747][ T3879] kobject: 'loop3' (00000000318ee1a7): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 708.652028][T26173] R13: dffffc0000000000 R14: ffff88809973e480 R15: ffff8880a041db40 [ 708.670740][T26173] FS: 00007f050b166700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 708.676296][ T3879] kobject: 'loop4' (0000000083643f18): kobject_uevent_env [ 708.682201][T26173] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 708.692652][ T3879] kobject: 'loop4' (0000000083643f18): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 708.693924][T26173] CR2: 0000000020236fc8 CR3: 000000008d759000 CR4: 00000000001406f0 [ 708.714760][T26173] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 708.717661][ T3879] kobject: 'loop5' (00000000f6953125): kobject_uevent_env [ 708.722935][T26173] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 708.722952][T26173] Kernel panic - not syncing: Fatal exception [ 708.734724][ T3879] kobject: 'loop5' (00000000f6953125): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 708.739137][T26173] Kernel Offset: disabled [ 708.768716][T26173] Rebooting in 86400 seconds..