ed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1", 0xb9, 0x10000}], 0x0, 0x0) 13:16:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf0") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:16:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775db7b2803b4f0a1258b675d26b0952fb6e5b3b60ced5c54dbb72955f0dd8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000001000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)={{}, "d1"}, 0x21) recvmmsg(r1, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)}}], 0x1, 0x0, 0x0) 13:16:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1", 0xbd, 0x10000}], 0x0, 0x0) 13:16:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775db7b2803b4f0a1258b675d26b0952fb6e5b3b60ced5c54dbb72955f0dd8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000001000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)={{}, "d1"}, 0x21) recvmmsg(r1, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 13:16:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf0") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:16:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1", 0xb9, 0x10000}], 0x0, 0x0) 13:16:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775db7b2803b4f0a1258b675d26b0952fb6e5b3b60ced5c54dbb72955f0dd8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000001000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)={{}, "d1"}, 0x21) recvmmsg(r1, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 13:16:55 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}], 0x3, 0x103, &(0x7f00000078c0)) 13:16:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf0") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:16:55 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775db7b2803b4f0a1258b675d26b0952fb6e5b3b60ced5c54dbb72955f0dd8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000001000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000080)={{}, "d1"}, 0x21) recvmmsg(r1, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 13:16:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe}], 0x0, 0x0) 13:16:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1", 0xb9, 0x10000}], 0x0, 0x0) 13:16:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:16:55 executing program 2: clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x2ab, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) prctl$PR_SET_MM(0x23, 0xb, &(0x7f0000ffd000/0x3000)=nil) socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = dup2(r1, r1) sendmsg$NBD_CMD_CONNECT(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[]}}, 0x0) [ 501.854732][ T9187] validate_nla: 10 callbacks suppressed [ 501.854738][ T9187] netlink: 'syz-executor.3': attribute type 33 has an invalid length. 13:16:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:16:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe}], 0x0, 0x0) [ 501.987572][ T9203] tty_tiocsserial: 'syz-executor.2' is using deprecated serial flags (with no effect): 00000200 13:16:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x2, 0x0) setsockopt(r0, 0x107, 0x1, &(0x7f0000d52ff0)="0f0000000300060000071a80000001cc", 0x10) 13:16:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:16:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6", 0xbc, 0x10000}], 0x0, 0x0) [ 502.116618][ T9230] device bond_slave_0 entered promiscuous mode [ 502.122969][ T9230] device bond_slave_1 entered promiscuous mode [ 502.165457][ T9221] device bond_slave_0 left promiscuous mode [ 502.171457][ T9221] device bond_slave_1 left promiscuous mode [ 502.202203][ T9230] device bond_slave_0 entered promiscuous mode [ 502.208834][ T9230] device bond_slave_1 entered promiscuous mode [ 502.219863][ T9221] device bond_slave_0 left promiscuous mode [ 502.225874][ T9221] device bond_slave_1 left promiscuous mode 13:16:56 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{0x0, 0x0, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:16:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, 0x0, 0x0) 13:16:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe}], 0x0, 0x0) 13:16:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="f95b0f34"], 0x4}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140), 0xc}], 0x100000000000005a}}], 0x1, 0x0) clone(0x20100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="7e499fe412b31c5c5fd21dacb7b35ad29999e5deb90bd622b9f4a177373afcbc3b5bf61816d9162b65cccc061c938047d9953b277929034509c7ecfe9659f8afccc983090dfe92f8ec65fcc8e262ebca23136f1c21122803ab2e3a7c209f2ad15c3383db595c65172b70c954c01b5e237f81f433dd9e31ea8a7dc73435827acff83babd2e943473102300841ecb2e78bd261b870452493a3426094b0069c694ad0529c2b03aed0f5c1927e54ac8d1dd0b6e1bd8307", @ANYBLOB="9f338885b87b558d8aedcbb605ebcfca9ba7a5b7f64c56499a89d8f1e87738c76c0200e40e766646ab97324804ca3e423ded7d092f03b7f9b3f7cb5fa335e4b7a5c3f7aebc430d1066af11fe4ee902229a792f619822d0e2e6a09847df14ed780a6663f29a0000000000"], 0x0, 0x11f}, 0x20) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r1, 0x30) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 13:16:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6", 0xbc, 0x10000}], 0x0, 0x0) 13:16:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, 0x0, 0x0) [ 502.779245][ T9273] ptrace attach of "/root/syz-executor.2"[9269] was attempted by "/root/syz-executor.2"[9273] 13:16:56 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") recvfrom(r1, &(0x7f0000000200)=""/241, 0xf1, 0x20, &(0x7f0000000300)=@nfc={0x27, 0x0, 0x2, 0x1}, 0x80) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000380)={0xff, {{0x2, 0x4e23, @multicast2}}}, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000000)={@dev}, 0x20) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000540)={'gre0\x00', 0x4000}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000180)={'bond_slave_0\x00', {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xf}}}) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000600)=ANY=[@ANYBLOB="62726f757465000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000000582703d7", @ANYPTR=&(0x7f00000005c0)=ANY=[@ANYBLOB='\x00'/16], @ANYBLOB='\x00'/56], 0xa8) r3 = accept4(r1, &(0x7f0000000440)=@rc, &(0x7f00000004c0)=0x80, 0x80800) connect$bt_rfcomm(r3, &(0x7f0000000500)={0x1f, {0x7fffffff, 0x8dd, 0x4, 0xe265, 0x81}, 0x10001}, 0xa) mmap$xdp(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2, 0x4000010, r2, 0xa0186ef4f651b99) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f00000001c0)={@dev, 0x2}, 0x20) close(r0) ioctl$sock_inet6_tcp_SIOCATMARK(r3, 0x8905, &(0x7f0000000580)) r4 = accept(r0, &(0x7f0000000040)=@tipc, &(0x7f00000000c0)=0x80) getsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f0000000100), &(0x7f0000000140)=0x4) 13:16:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, 0x0, 0x0) 13:16:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x25}, {0x80000006}]}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000000)=0x32, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r1, &(0x7f0000004e00)=[{{0x0, 0x0, 0x0}}], 0x1c3, 0x0) 13:16:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6", 0xbc, 0x10000}], 0x0, 0x0) [ 503.120845][ C1] net_ratelimit: 10 callbacks suppressed [ 503.120852][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 503.134644][ C1] protocol 88fb is buggy, dev hsr_slave_1 13:16:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 13:16:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 13:16:57 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{0x0, 0x0, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:16:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 13:16:57 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000001c0)={0x0, 0x9, [@empty, @dev, @broadcast, @remote, @empty, @broadcast, @empty, @remote, @broadcast]}) 13:16:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1", 0xbd, 0x10000}], 0x0, 0x0) 13:16:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 13:16:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 13:16:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") recvfrom(r1, &(0x7f0000000200)=""/241, 0xf1, 0x20, &(0x7f0000000300)=@nfc={0x27, 0x0, 0x2, 0x1}, 0x80) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000380)={0xff, {{0x2, 0x4e23, @multicast2}}}, 0x88) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000000)={@dev}, 0x20) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000540)={'gre0\x00', 0x4000}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000180)={'bond_slave_0\x00', {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xf}}}) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000600)=ANY=[@ANYBLOB="62726f757465000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000000582703d7", @ANYPTR=&(0x7f00000005c0)=ANY=[@ANYBLOB='\x00'/16], @ANYBLOB='\x00'/56], 0xa8) r3 = accept4(r1, &(0x7f0000000440)=@rc, &(0x7f00000004c0)=0x80, 0x80800) connect$bt_rfcomm(r3, &(0x7f0000000500)={0x1f, {0x7fffffff, 0x8dd, 0x4, 0xe265, 0x81}, 0x10001}, 0xa) mmap$xdp(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2, 0x4000010, r2, 0xa0186ef4f651b99) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f00000001c0)={@dev, 0x2}, 0x20) close(r0) ioctl$sock_inet6_tcp_SIOCATMARK(r3, 0x8905, &(0x7f0000000580)) r4 = accept(r0, &(0x7f0000000040)=@tipc, &(0x7f00000000c0)=0x80) getsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f0000000100), &(0x7f0000000140)=0x4) 13:16:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1", 0xbd, 0x10000}], 0x0, 0x0) 13:16:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1", 0xb9, 0x10000}], 0x0, 0x0) 13:16:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 13:16:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:16:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6", 0xbc, 0x10000}], 0x0, 0x0) 13:16:58 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{0x0, 0x0, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:16:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:16:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1", 0xbd, 0x10000}], 0x0, 0x0) 13:16:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6", 0xa7, 0x10000}], 0x0, 0x0) 13:16:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:16:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 13:16:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6", 0xa7, 0x10000}], 0x0, 0x0) 13:16:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe}], 0x0, 0x0) [ 504.709951][ T9392] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 13:16:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118", 0x8f, 0x10000}], 0x0, 0x0) 13:16:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 13:16:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe}], 0x0, 0x0) 13:16:58 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775db7b2803b4f0a1258b675d26b0952fb6e5b3b60ced5c54dbb72955f0dd8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000001000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000080)={{}, "d1"}, 0x21) recvmmsg(r1, &(0x7f0000004580)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000001340)=""/239, 0xef}], 0x1}}], 0x40000000000015c, 0x0, 0x0) [ 504.897309][ T9411] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 13:16:59 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, 0x0}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:16:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff", 0x5f, 0x10000}], 0x0, 0x0) 13:16:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe}], 0x0, 0x0) 13:16:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 13:16:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6", 0xa7, 0x10000}], 0x0, 0x0) 13:16:59 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 505.376772][ T9432] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 13:16:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_CARRIER={0x8}]}, 0x28}}, 0x0) 13:16:59 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 505.486492][ T9445] netlink: 'syz-executor.2': attribute type 33 has an invalid length. [ 505.501242][ T9445] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:16:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff", 0x5f, 0x10000}], 0x0, 0x0) 13:16:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6", 0xa7, 0x10000}], 0x0, 0x0) [ 505.622170][ T9451] netlink: 'syz-executor.2': attribute type 33 has an invalid length. [ 505.641427][ T9451] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 505.693088][ T9456] netlink: 'syz-executor.3': attribute type 33 has an invalid length. 13:16:59 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:16:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_CARRIER={0x8}]}, 0x28}}, 0x0) [ 505.837593][ T9468] netlink: 'syz-executor.2': attribute type 33 has an invalid length. [ 505.877769][ T9468] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 505.913525][ T9473] netlink: 'syz-executor.3': attribute type 33 has an invalid length. 13:17:00 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, 0x0}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff", 0x5f, 0x10000}], 0x0, 0x0) 13:17:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff", 0x5f, 0x10000}], 0x0, 0x0) 13:17:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_CARRIER={0x8}]}, 0x28}}, 0x0) 13:17:00 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 506.296126][ T9489] netlink: 'syz-executor.3': attribute type 33 has an invalid length. 13:17:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 13:17:00 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 13:17:00 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 13:17:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff", 0x5f, 0x10000}], 0x0, 0x0) 13:17:00 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 506.548641][ T9501] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 506.664634][ T9517] netlink: 'syz-executor.2': attribute type 33 has an invalid length. [ 506.682269][ T9512] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop1 [ 506.704808][ T9517] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 506.748152][ T9515] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop1 new:/dev/loop5 13:17:00 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, 0x0}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:00 executing program 2: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 13:17:00 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x101200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sysinfo(&(0x7f0000000340)=""/22) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 13:17:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x20000000021) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr="041db16c1d2704766b0ed1428b88f753", 0x100000001}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e20, @local}, 0x10) r5 = fspick(r3, &(0x7f0000000180)='./file0\x00', 0x374c87a89e7957df) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) setsockopt$inet_dccp_int(r2, 0x21, 0xa, &(0x7f0000000140)=0x8d95, 0x4) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f0000b97000)={0x1, &(0x7f000048fff0)=[{0x6}]}, 0x10) getsockopt$sock_buf(r8, 0x1, 0x1a, 0x0, &(0x7f0000000000)) r9 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r9, 0x1, 0x1a, &(0x7f0000b97000)={0x1, &(0x7f000048fff0)=[{0x6}]}, 0x10) getsockopt$sock_buf(r9, 0x1, 0x1a, 0x0, &(0x7f0000000000)) ppoll(&(0x7f0000000280)=[{r8, 0x2a00}, {r9, 0x1000}], 0x2, &(0x7f00000002c0), &(0x7f0000000300)={0xffffffffffffffc0}, 0x8) bind$inet(r7, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r6, 0x0, r7, 0x0, 0x10005, 0x0) setsockopt$inet_dccp_int(r6, 0x21, 0xa, &(0x7f0000000140)=0x8d95, 0x4) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000100)={0x0, 0x80000, r6}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000140)={0x0, r10, 0x8}) fsetxattr$security_selinux(r0, &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='u:object_r:app_data_file:s0:c512,c768\x00', 0x26, 0x0) syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x8, 0x300000) fcntl$setownex(r5, 0xf, &(0x7f00000001c0)={0x3, 0xffffffffffffffff}) 13:17:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff", 0x5f, 0x10000}], 0x0, 0x0) 13:17:01 executing program 2: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff", 0x5f, 0x10000}], 0x0, 0x0) 13:17:01 executing program 2: socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 507.262504][ T9531] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 13:17:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) [ 507.318735][ T9535] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop1 13:17:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 13:17:01 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a", 0x30, 0x10000}], 0x0, 0x0) 13:17:01 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}], 0x1}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 13:17:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 13:17:01 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x101200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sysinfo(&(0x7f0000000340)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001000)}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0x2, 0x2) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f0000000380)={&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000440)=""/216, 0xd8}) socket$inet(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 13:17:01 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff", 0x5f, 0x10000}], 0x0, 0x0) 13:17:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x20000000021) getgid() socket$alg(0x26, 0x5, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x100000001}, 0x1c) r2 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x200, 0x40) ioctl$TCSETXW(r2, 0x5435, &(0x7f00000000c0)={0x0, 0x4, [0xffffffff, 0x7, 0x8, 0x101, 0x20], 0x8}) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) 13:17:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 13:17:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 13:17:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x6, 0x200020000000021) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x100000001}, 0x1c) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4840}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000228bd7000fedbdf250e0000001c00010008000b007369700000080008008c0000000800040000000040080004000200"/58], 0x40}, 0x1, 0x0, 0x0, 0x40}, 0x24000040) sendto$inet6(r1, 0x0, 0x0, 0x20040000, 0x0, 0xe5) r3 = syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x100000000, 0x800) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b97000)={0x1, &(0x7f000048fff0)=[{0x6}]}, 0x10) getsockopt$sock_buf(r4, 0x1, 0x1a, 0x0, &(0x7f0000000000)) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000b97000)={0x1, &(0x7f000048fff0)=[{0x6}]}, 0x10) getsockopt$sock_buf(r5, 0x1, 0x1a, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000000240)={'veth1\x00', {0x2, 0x4e21, @local}}) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r4, 0x40106614, &(0x7f0000000200)) ioctl$ASHMEM_GET_SIZE(r3, 0x7704, 0x0) 13:17:02 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff", 0x5f, 0x10000}], 0x0, 0x0) [ 508.164979][ T9587] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop1 13:17:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 13:17:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) [ 508.218611][ T9584] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 13:17:02 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}], 0x1}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 13:17:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x101200, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 13:17:02 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x101200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 13:17:02 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff", 0x5f, 0x10000}], 0x0, 0x0) 13:17:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 13:17:02 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff", 0x5f, 0x10000}], 0x0, 0x0) 13:17:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 508.958103][ T9635] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop1 13:17:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x101200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sysinfo(&(0x7f0000000340)=""/22) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 13:17:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x100000, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b97000)={0x1, &(0x7f000048fff0)=[{0x6}]}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x1a, 0x0, &(0x7f0000000000)) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f00000000c0)='bdev]securityuser+\x00', 0x0, r2) ioctl(r0, 0xfffffffffffffffd, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r3 = socket$inet6(0xa, 0x2, 0x100000001) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x100000001}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = creat(&(0x7f0000000100)='./file0\x00', 0x2) setsockopt$RDS_FREE_MR(r4, 0x114, 0x3, &(0x7f0000000140)={{0x2, 0x8}, 0x8}, 0x10) [ 509.043999][ T9632] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 509.062165][ T9652] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop5 13:17:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 509.294884][ T9672] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop1 13:17:03 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}], 0x1}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:03 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff", 0x5f, 0x10000}], 0x0, 0x0) 13:17:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x20000000021) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x100000001}, 0x1c) r2 = dup3(0xffffffffffffffff, r1, 0x180000) write$P9_RSTAT(r2, &(0x7f0000000080)={0x57, 0x7d, 0x1, {0x0, 0x50, 0x1f, 0xfffffffffffff001, {0x8, 0x0, 0x1}, 0x4a020000, 0x864, 0x9, 0x7fffffff, 0x12, 'em1)[\xa4GPLlovmnet0-', 0x7, '@wlan0@', 0x4, 'eth1'}}, 0x57) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 13:17:03 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x101200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sysinfo(&(0x7f0000000340)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001000)}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0x2, 0x2) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f0000000380)={&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000440)=""/216, 0xd8}) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)}, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0xc}) syz_genetlink_get_family_id$team(0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 13:17:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 13:17:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x101200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sysinfo(&(0x7f0000000340)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001000)}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0x2, 0x2) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f0000000380)={&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000440)=""/216, 0xd8}) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)}, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0xc}) syz_genetlink_get_family_id$team(0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 13:17:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 509.716446][ T9697] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 13:17:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff", 0x5f, 0x10000}], 0x0, 0x0) [ 509.786165][ T9706] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop1 13:17:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x20000000021) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0) sendto$llc(r2, &(0x7f00000000c0)="76df246a6d0406570e018276b716235cf193ed869f6b665e1e75174897b44a3b49ecd21f045e2ef1d14f2f4976dbae31286f7ea3b63677f091b9eb419249ecd160596408faec837e1d1e646659e68f73b5a9236b46a8dd1a073c40a7ae0c4f9dda9ae742d7e254ff", 0x68, 0x1, &(0x7f0000000140)={0x1a, 0x3, 0x100000000, 0x81, 0x2, 0xff}, 0x10) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x100000001}, 0x1c) prctl$PR_SET_ENDIAN(0x14, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 13:17:03 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 509.843236][ T9716] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 509.856729][ T9715] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 13:17:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x101200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sysinfo(&(0x7f0000000340)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001000)}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0x2, 0x2) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f0000000380)={&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000440)=""/216, 0xd8}) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)}, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0xc}) syz_genetlink_get_family_id$team(0x0) syz_open_dev$mice(&(0x7f00000003c0)='/dev/input/mice\x00', 0x0, 0x2) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 13:17:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") close(r0) r1 = socket$inet6(0xa, 0x3, 0x20000000021) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x100000001}, 0xfffffffffffffd8a) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) [ 509.960673][ T9727] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 510.155141][ T9739] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop1 13:17:04 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {0x0}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_CARRIER={0x8}]}, 0x28}}, 0x0) 13:17:04 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x101200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sysinfo(&(0x7f0000000340)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001000)}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0x2, 0x2) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f0000000380)={&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000440)=""/216, 0xd8}) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)}, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0xc}) syz_genetlink_get_family_id$team(0x0) r4 = syz_open_dev$mice(&(0x7f00000003c0)='/dev/input/mice\x00', 0x0, 0x2) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x2d, &(0x7f0000000540)={0x200, {{0xa, 0x4e24, 0x3d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3}}}, 0x88) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 13:17:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff", 0x5f, 0x10000}], 0x0, 0x0) 13:17:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x101, &(0x7f00000000c0)="11dca5057095346916da0000000000000000002000000000") r1 = socket$inet6(0xa, 0x3, 0x20000000021) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x100000001}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 13:17:04 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x101200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sysinfo(&(0x7f0000000340)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001000)}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0x2, 0x2) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f0000000380)={&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000440)=""/216, 0xd8}) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)}, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0xc}) syz_genetlink_get_family_id$team(0x0) syz_open_dev$mice(&(0x7f00000003c0)='/dev/input/mice\x00', 0x0, 0x2) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 13:17:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_CARRIER={0x8}]}, 0x28}}, 0x0) [ 510.529287][ T9756] netlink: 'syz-executor.2': attribute type 33 has an invalid length. 13:17:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff", 0x5f, 0x10000}], 0x0, 0x0) 13:17:04 executing program 4: write$FUSE_DIRENT(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0xfffffffffffffff5, 0x2, [{0x5, 0x7}]}, 0x28) r0 = socket$inet6(0xa, 0x3, 0x20000000021) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r0, &(0x7f0000000000), 0xff77, 0x2000000, 0x0, 0x4d97) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000000)=@sack_info={r3, 0x0, 0xffff}, 0xc) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000000c0)={r3}, &(0x7f0000000100)=0xc) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r5 = socket$inet6(0xa, 0x3, 0x20000000021) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x100000001}, 0x1c) sendto$inet6(r5, 0x0, 0x0, 0x0, 0x0, 0x0) 13:17:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_CARRIER={0x8}]}, 0x28}}, 0x0) [ 510.645499][ T9771] netlink: 'syz-executor.2': attribute type 33 has an invalid length. 13:17:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x20000000021) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x100000001}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) [ 510.709402][ T9769] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop1 [ 510.740145][ T9781] netlink: 'syz-executor.2': attribute type 33 has an invalid length. 13:17:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x101200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sysinfo(&(0x7f0000000340)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001000)}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0x2, 0x2) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f0000000380)={&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000440)=""/216, 0xd8}) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)}, 0x0) socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 510.842528][ T9753] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 510.868808][ T9783] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop3 new:/dev/loop5 [ 510.994250][ T9791] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 13:17:05 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {0x0}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x20000000021) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x8}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 13:17:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff", 0x5f, 0x10000}], 0x0, 0x0) 13:17:05 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x101200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sysinfo(&(0x7f0000000340)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001000)}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0x2, 0x2) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f0000000380)={&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000440)=""/216, 0xd8}) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)}, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0xc}) syz_genetlink_get_family_id$team(0x0) r4 = syz_open_dev$mice(&(0x7f00000003c0)='/dev/input/mice\x00', 0x0, 0x2) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x2d, &(0x7f0000000540)={0x200, {{0xa, 0x4e24, 0x3d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3}}}, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000300)) accept$packet(r0, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002040)=0xfffffffffffffcfd) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 13:17:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x101200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sysinfo(&(0x7f0000000340)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001000)}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0x2, 0x2) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f0000000380)={&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000440)=""/216, 0xd8}) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)}, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0xc}) syz_genetlink_get_family_id$team(0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 13:17:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x101200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sysinfo(&(0x7f0000000340)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001000)}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0x2, 0x2) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f0000000380)={&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000440)=""/216, 0xd8}) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)}, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0xc}) syz_genetlink_get_family_id$team(0x0) r4 = syz_open_dev$mice(&(0x7f00000003c0)='/dev/input/mice\x00', 0x0, 0x2) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x2d, &(0x7f0000000540)={0x200, {{0xa, 0x4e24, 0x3d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3}}}, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000300)) accept$packet(r0, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002040)=0xfffffffffffffcfd) getsockopt$inet_pktinfo(r3, 0x0, 0x8, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002480)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 13:17:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0xffffffffffffffff, &(0x7f00000000c0)="119eab6ddca5055e0bcb590000e400"/26) r1 = socket$inet6(0xa, 0x3, 0x20000000021) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x100000001}, 0x1c) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000100)='/dev/capi20\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r3, r2, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000800, 0x0, 0x3c9) 13:17:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x20000000021) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b97000)={0x0, &(0x7f000048fff0)}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x1a, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000000c0)) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x100000001}, 0x1c) creat(&(0x7f0000000100)='./file0\x00', 0x7a) socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 13:17:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff", 0x5f, 0x10000}], 0x0, 0x0) [ 511.597604][ T9814] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop1 13:17:05 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = socket$inet6(0xa, 0x3, 0x20000000021) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x100000001}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 13:17:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x20000000021) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x100000001}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x9, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000000c0)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@empty}}, &(0x7f00000001c0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) write$P9_RGETATTR(r2, &(0x7f0000000280)={0xa0, 0x19, 0x1, {0x2004, {0x40, 0x4}, 0x4, r3, r4, 0x4, 0x2, 0x9, 0x7, 0x5, 0x5, 0x93fe, 0x100, 0x1000, 0x5, 0x4, 0x6cf, 0xbbbd, 0x5, 0x80000000}}, 0xa0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r6 = socket$inet_udp(0x2, 0x2, 0x0) close(r6) bind$inet(r6, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r6, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r5, 0x0, r6, 0x0, 0x10005, 0x0) setsockopt$inet_dccp_int(r5, 0x21, 0xa, &(0x7f0000000140)=0x8d95, 0x4) ioctl$VIDIOC_G_CTRL(r5, 0xc008561b, &(0x7f0000000340)={0x9, 0x6}) [ 511.653569][ T9811] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 511.675325][ T9813] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 [ 511.764750][ T9844] BTRFS warning (device ): duplicate device fsid:devid for fff6f2a2-2997-48ae-b81e-1b00920efd9a:0 old:/dev/loop2 new:/dev/loop5 13:17:05 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x101200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sysinfo(&(0x7f0000000340)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001000)}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0x2, 0x2) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f0000000380)={&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000440)=""/216, 0xd8}) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)}, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0xc}) syz_genetlink_get_family_id$team(0x0) r4 = syz_open_dev$mice(&(0x7f00000003c0)='/dev/input/mice\x00', 0x0, 0x2) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x2d, &(0x7f0000000540)={0x200, {{0xa, 0x4e24, 0x3d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3}}}, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000300)) accept$packet(r0, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002040)=0xfffffffffffffcfd) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 511.984781][ T9859] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop1 13:17:06 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {0x0}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x20000000021) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x100000001}, 0x1c) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000100)='/dev/capi20\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r3, r2, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x40, 0x0, 0xffffffffffffff56) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000080)={0x100000000, 0x943, 0x4, 0x3f, 0x1, [{0x7ff, 0x5, 0x2, 0x0, 0x0, 0x1}]}) 13:17:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff", 0x5f, 0x10000}], 0x0, 0x0) 13:17:06 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x101200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sysinfo(&(0x7f0000000340)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001000)}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0x2, 0x2) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f0000000380)={&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000440)=""/216, 0xd8}) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)}, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0xc}) syz_genetlink_get_family_id$team(0x0) r4 = syz_open_dev$mice(&(0x7f00000003c0)='/dev/input/mice\x00', 0x0, 0x2) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x2d, &(0x7f0000000540)={0x200, {{0xa, 0x4e24, 0x3d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3}}}, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000300)) accept$packet(r0, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002040)=0xfffffffffffffcfd) getsockopt$inet_pktinfo(r3, 0x0, 0x8, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002480)) accept4(0xffffffffffffffff, &(0x7f0000002a40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002ac0)=0x80, 0x80800) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000400)='/dev/video35\x00', 0x2, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 13:17:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x101200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sysinfo(&(0x7f0000000340)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001000)}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0x2, 0x2) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f0000000380)={&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000440)=""/216, 0xd8}) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)}, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0xc}) syz_genetlink_get_family_id$team(0x0) r4 = syz_open_dev$mice(&(0x7f00000003c0)='/dev/input/mice\x00', 0x0, 0x2) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x2d, &(0x7f0000000540)={0x200, {{0xa, 0x4e24, 0x3d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3}}}, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000300)) accept$packet(r0, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002040)=0xfffffffffffffcfd) getsockopt$inet_pktinfo(r3, 0x0, 0x8, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002480)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 13:17:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x101200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sysinfo(&(0x7f0000000340)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001000)}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0x2, 0x2) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f0000000380)={&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000440)=""/216, 0xd8}) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)}, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0xc}) syz_genetlink_get_family_id$team(0x0) r4 = syz_open_dev$mice(&(0x7f00000003c0)='/dev/input/mice\x00', 0x0, 0x2) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x2d, &(0x7f0000000540)={0x200, {{0xa, 0x4e24, 0x3d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3}}}, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000300)) accept$packet(r0, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002040)=0xfffffffffffffcfd) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 13:17:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x20000000021) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x100000001}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000100)='/dev/capi20\x00', 0x0, 0x0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000001380)='/proc/capi/capi20ncci\x00', 0xa00, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r3, 0x40505331, &(0x7f00000013c0)={{0x8}, {0x40, 0x400}, 0x100000000, 0x2, 0x6}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r4, r2, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) setsockopt$RDS_GET_MR_FOR_DEST(r5, 0x114, 0x7, &(0x7f00000012c0)={@generic={0x4, "a4aa2df39d3f99254f10c70803cfaf2d262b1f200e789908ce819f41900ffbe5f5460d694b7141af9f457e31fd610992e7ec78facb54a85721b37d55ffe1f1e93f005b168cbf4f0dc0c4bfbc9d6c39809af82308ea92a6f0092182a9d31b941005a64f05ff9bed1c2cec64ce89b6978da470b30847fe027bb99fc8bd9445"}, {&(0x7f00000002c0)=""/4096, 0x1000}, &(0x7f0000000200), 0x8}, 0xa0) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) bind$inet(r7, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r6, 0x0, r7, 0x0, 0x10005, 0x0) setsockopt$inet_dccp_int(r6, 0x21, 0xa, &(0x7f0000000140)=0x8d95, 0x4) getsockname$packet(r6, &(0x7f0000000080)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r10) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000100)={{{@in=@broadcast, @in=@loopback, 0x4e24, 0x0, 0x4e24, 0x20, 0xa, 0xf0, 0xa0, 0x33, r8, r10}, {0x5, 0x4222, 0x5ab, 0xcc6, 0x2, 0x20, 0x2, 0x100}, {0x352, 0x7fff, 0x8f, 0x4}, 0x3, 0x6e6bb2, 0x0, 0x2452811c50b29c30, 0x6, 0x2}, {{@in=@local, 0x4d4, 0x6c}, 0xa, @in6=@local, 0x3500, 0x3, 0x1, 0x1, 0x0, 0x3, 0x3f}}, 0xe8) 13:17:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff", 0x5f, 0x10000}], 0x0, 0x0) [ 512.393720][ T9888] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop1 13:17:06 executing program 4: sendto$inet(0xffffffffffffffff, &(0x7f0000000080)="9124d9", 0x3, 0x8000, &(0x7f00000000c0)={0x2, 0x4e24, @local}, 0x10) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = socket$inet(0x2, 0x80000, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f00000001c0)={'filter\x00', 0x0, 0x4, 0x0, [], 0x5, &(0x7f0000000100)=[{}, {}, {}, {}, {}], &(0x7f0000000180)}, &(0x7f0000000240)=0x78) r1 = socket$inet6(0xa, 0x3, 0x20000000021) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x100000001}, 0x1c) sendto$inet6(r1, 0x0, 0x3c7, 0x0, 0x0, 0x130) [ 512.526158][ T9890] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 13:17:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x101200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sysinfo(&(0x7f0000000340)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001000)}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0x2, 0x2) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f0000000380)={&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000440)=""/216, 0xd8}) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)}, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0xc}) syz_genetlink_get_family_id$team(0x0) r4 = syz_open_dev$mice(&(0x7f00000003c0)='/dev/input/mice\x00', 0x0, 0x2) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x2d, &(0x7f0000000540)={0x200, {{0xa, 0x4e24, 0x3d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3}}}, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000300)) accept$packet(r0, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002040)=0xfffffffffffffcfd) getsockopt$inet_pktinfo(r3, 0x0, 0x8, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002480)) accept4(0xffffffffffffffff, &(0x7f0000002a40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002ac0)=0x80, 0x80800) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000400)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 13:17:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff", 0x5f, 0x10000}], 0x0, 0x0) 13:17:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x3, 0x20000000021) openat$misdntimer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mISDNtimer\x00', 0x400, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4e23, @multicast2}], 0x10) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x100000001}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) [ 512.682280][ T9876] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 512.896096][ T9933] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop1 13:17:06 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f00000076c0)=""/135, 0x87}], 0x1}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff", 0x5f, 0x10000}], 0x0, 0x0) 13:17:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x101200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sysinfo(&(0x7f0000000340)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001000)}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0x2, 0x2) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f0000000380)={&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000440)=""/216, 0xd8}) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)}, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0xc}) syz_genetlink_get_family_id$team(0x0) r4 = syz_open_dev$mice(&(0x7f00000003c0)='/dev/input/mice\x00', 0x0, 0x2) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x2d, &(0x7f0000000540)={0x200, {{0xa, 0x4e24, 0x3d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3}}}, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000300)) accept$packet(r0, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002040)=0xfffffffffffffcfd) getsockopt$inet_pktinfo(r3, 0x0, 0x8, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002480)) accept4(0xffffffffffffffff, &(0x7f0000002a40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002ac0)=0x80, 0x80800) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000400)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 13:17:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x20000000021) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x3, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x100000001}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 13:17:06 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x101200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sysinfo(&(0x7f0000000340)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001000)}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0x2, 0x2) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f0000000380)={&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000440)=""/216, 0xd8}) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)}, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0xc}) syz_genetlink_get_family_id$team(0x0) r4 = syz_open_dev$mice(&(0x7f00000003c0)='/dev/input/mice\x00', 0x0, 0x2) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x2d, &(0x7f0000000540)={0x200, {{0xa, 0x4e24, 0x3d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3}}}, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000300)) accept$packet(r0, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002040)=0xfffffffffffffcfd) getsockopt$inet_pktinfo(r3, 0x0, 0x8, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002480)) accept4(0xffffffffffffffff, &(0x7f0000002a40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002ac0)=0x80, 0x80800) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000400)='/dev/video35\x00', 0x2, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 13:17:07 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x101200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sysinfo(&(0x7f0000000340)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001000)}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0x2, 0x2) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f0000000380)={&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000440)=""/216, 0xd8}) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)}, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0xc}) syz_genetlink_get_family_id$team(0x0) r4 = syz_open_dev$mice(&(0x7f00000003c0)='/dev/input/mice\x00', 0x0, 0x2) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x2d, &(0x7f0000000540)={0x200, {{0xa, 0x4e24, 0x3d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3}}}, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000300)) accept$packet(r0, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002040)=0xfffffffffffffcfd) getsockopt$inet_pktinfo(r3, 0x0, 0x8, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002480)) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 13:17:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x20000000021) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x100000001}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 13:17:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff", 0x5f, 0x10000}], 0x0, 0x0) 13:17:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x20000000021) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x100000001}, 0x1c) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) bind$inet(r5, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r4, 0x0, r5, 0x0, 0x10005, 0x0) setsockopt$inet_dccp_int(r4, 0x21, 0xa, &(0x7f0000000140)=0x8d95, 0x4) accept4$x25(r4, &(0x7f0000000280)={0x9, @remote}, &(0x7f00000002c0)=0x12, 0x80800) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) bind$inet(r7, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r6, 0x0, r7, 0x0, 0x10005, 0x0) setsockopt$inet_dccp_int(r6, 0x21, 0xa, &(0x7f0000000140)=0x8d95, 0x4) setsockopt$RDS_FREE_MR(r6, 0x114, 0x3, &(0x7f0000000180)={{0x7fffffff, 0x8}, 0x22}, 0x10) close(r3) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x1c4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r3, 0x0, 0x10005, 0x0) setsockopt$inet_dccp_int(r2, 0x21, 0x43ccfe5fc014dd60, &(0x7f0000000300)=0x400, 0xfffffffffffffe3c) ioctl$VIDIOC_QBUF(r2, 0xc058560f, &(0x7f00000000c0)={0xfffffffffffffffa, 0x2, 0x4, 0x54b1e13e4d3f7c5d, {0x0, 0x7530}, {0x5, 0xd, 0x8, 0xffff, 0x8e65, 0x8, "5e66a999"}, 0x80000001, 0x0, @planes=&(0x7f0000000080)={0x1, 0x1, @mem_offset=0x6, 0x401}, 0x4}) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x43, &(0x7f00000001c0)={'IDLETIMER\x00'}, &(0x7f0000000200)=0x1e) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) [ 513.299204][ T9950] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 13:17:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff", 0x5f, 0x10000}], 0x0, 0x0) 13:17:07 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x101200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sysinfo(&(0x7f0000000340)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001000)}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0x2, 0x2) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f0000000380)={&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000440)=""/216, 0xd8}) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)}, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0xc}) syz_genetlink_get_family_id$team(0x0) r4 = syz_open_dev$mice(&(0x7f00000003c0)='/dev/input/mice\x00', 0x0, 0x2) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x2d, &(0x7f0000000540)={0x200, {{0xa, 0x4e24, 0x3d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3}}}, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000300)) accept$packet(r0, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002040)=0xfffffffffffffcfd) getsockopt$inet_pktinfo(r3, 0x0, 0x8, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002480)) accept4(0xffffffffffffffff, &(0x7f0000002a40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002ac0)=0x80, 0x80800) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 513.523323][ T9949] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 13:17:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', 0x0, 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff", 0x5f, 0x10000}], 0x0, 0x0) [ 513.569409][ T9975] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop1 [ 513.811399][ T9993] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 13:17:07 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f00000076c0)=""/135, 0x87}], 0x1}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:07 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x101200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sysinfo(&(0x7f0000000340)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001000)}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0x2, 0x2) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f0000000380)={&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000440)=""/216, 0xd8}) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)}, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0xc}) syz_genetlink_get_family_id$team(0x0) r4 = syz_open_dev$mice(&(0x7f00000003c0)='/dev/input/mice\x00', 0x0, 0x2) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x2d, &(0x7f0000000540)={0x200, {{0xa, 0x4e24, 0x3d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3}}}, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000300)) accept$packet(r0, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002040)=0xfffffffffffffcfd) getsockopt$inet_pktinfo(r3, 0x0, 0x8, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002480)) accept4(0xffffffffffffffff, &(0x7f0000002a40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002ac0)=0x80, 0x80800) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000400)='/dev/video35\x00', 0x2, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 13:17:07 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x101200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sysinfo(&(0x7f0000000340)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001000)}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0x2, 0x2) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f0000000380)={&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000440)=""/216, 0xd8}) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)}, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0xc}) syz_genetlink_get_family_id$team(0x0) r4 = syz_open_dev$mice(&(0x7f00000003c0)='/dev/input/mice\x00', 0x0, 0x2) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x2d, &(0x7f0000000540)={0x200, {{0xa, 0x4e24, 0x3d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3}}}, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000300)) accept$packet(r0, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002040)=0xfffffffffffffcfd) getsockopt$inet_pktinfo(r3, 0x0, 0x8, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002480)) accept4(0xffffffffffffffff, &(0x7f0000002a40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002ac0)=0x80, 0x80800) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000400)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 13:17:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 13:17:07 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x101200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sysinfo(&(0x7f0000000340)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001000)}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0x2, 0x2) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f0000000380)={&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000440)=""/216, 0xd8}) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)}, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0xc}) syz_genetlink_get_family_id$team(0x0) r4 = syz_open_dev$mice(&(0x7f00000003c0)='/dev/input/mice\x00', 0x0, 0x2) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x2d, &(0x7f0000000540)={0x200, {{0xa, 0x4e24, 0x3d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3}}}, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000300)) accept$packet(r0, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002040)=0xfffffffffffffcfd) getsockopt$inet_pktinfo(r3, 0x0, 0x8, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002480)) accept4(0xffffffffffffffff, &(0x7f0000002a40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002ac0)=0x80, 0x80800) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000400)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_tcp_int(r3, 0x6, 0xc, &(0x7f0000000200), &(0x7f0000000240)=0x4) ioctl$RTC_PLL_SET(r0, 0x40207012, &(0x7f00000000c0)={0x1, 0x2, 0xfd17, 0x6, 0x1, 0x6, 0x85f}) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 13:17:07 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x101200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sysinfo(&(0x7f0000000340)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001000)}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0x2, 0x2) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f0000000380)={&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000440)=""/216, 0xd8}) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)}, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0xc}) syz_genetlink_get_family_id$team(0x0) r4 = syz_open_dev$mice(&(0x7f00000003c0)='/dev/input/mice\x00', 0x0, 0x2) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x2d, &(0x7f0000000540)={0x200, {{0xa, 0x4e24, 0x3d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3}}}, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000300)) accept$packet(r0, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002040)=0xfffffffffffffcfd) getsockopt$inet_pktinfo(r3, 0x0, 0x8, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002480)) accept4(0xffffffffffffffff, &(0x7f0000002a40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002ac0)=0x80, 0x80800) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000400)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_tcp_int(r3, 0x6, 0xc, &(0x7f0000000200), &(0x7f0000000240)=0x4) ioctl$RTC_PLL_SET(r0, 0x40207012, &(0x7f00000000c0)={0x1, 0x2, 0xfd17, 0x6, 0x1, 0x6, 0x85f}) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 13:17:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 514.089209][T10013] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 [ 514.218065][T10012] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop1 13:17:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x101200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sysinfo(&(0x7f0000000340)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001000)}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0x2, 0x2) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f0000000380)={&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000440)=""/216, 0xd8}) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)}, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0xc}) syz_genetlink_get_family_id$team(0x0) r4 = syz_open_dev$mice(&(0x7f00000003c0)='/dev/input/mice\x00', 0x0, 0x2) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x2d, &(0x7f0000000540)={0x200, {{0xa, 0x4e24, 0x3d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3}}}, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000300)) accept$packet(r0, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002040)=0xfffffffffffffcfd) getsockopt$inet_pktinfo(r3, 0x0, 0x8, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002480)) accept4(0xffffffffffffffff, &(0x7f0000002a40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002ac0)=0x80, 0x80800) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000400)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) getsockopt$inet_tcp_int(r3, 0x6, 0xc, &(0x7f0000000200), &(0x7f0000000240)=0x4) ioctl$RTC_PLL_SET(r0, 0x40207012, &(0x7f00000000c0)={0x1, 0x2, 0xfd17, 0x6, 0x1, 0x6, 0x85f}) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f0000003240)={0x0, @initdev, @dev}, 0x0) accept$packet(0xffffffffffffffff, &(0x7f00000032c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) [ 514.370209][T10020] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop2 13:17:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x101200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sysinfo(&(0x7f0000000340)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001000)}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0x2, 0x2) ioctl$MON_IOCX_GETX(r1, 0x4018920a, &(0x7f0000000380)={&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000440)=""/216, 0xd8}) r2 = socket$inet(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)}, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r3, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0xc}) syz_genetlink_get_family_id$team(0x0) r4 = syz_open_dev$mice(&(0x7f00000003c0)='/dev/input/mice\x00', 0x0, 0x2) setsockopt$inet6_MCAST_LEAVE_GROUP(r4, 0x29, 0x2d, &(0x7f0000000540)={0x200, {{0xa, 0x4e24, 0x3d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3}}}, 0x88) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000300)) accept$packet(r0, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002040)=0xfffffffffffffcfd) getsockopt$inet_pktinfo(r3, 0x0, 0x8, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002480)) accept4(0xffffffffffffffff, &(0x7f0000002a40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002ac0)=0x80, 0x80800) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000400)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d222e327051656d5e06b12b82e56df26ca46e82370471ff9160dc744a91b6143501147d37652e872bd21e5c0d2c30e3167eaaba6046dcc4f76c8fc8722deed133434bfd993a7118aa3737c06dcfed4f4aa89015e5fd0f46d646e9e6174d55b6747cf3aced992ac53e209f785b37293e1ff1f2e8c6e1a6", 0xbe, 0x10000}], 0x0, 0x0) 13:17:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 514.442379][T10038] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop4 [ 514.486419][T10049] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop3 13:17:08 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) read$alg(r3, &(0x7f0000000180)=""/4096, 0x1000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x71, &(0x7f0000000140)={r4}, 0x8) 13:17:08 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) read$alg(r3, &(0x7f0000000180)=""/4096, 0x1000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x71, &(0x7f0000000140)={r4}, 0x8) 13:17:08 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f00000076c0)=""/135, 0x87}], 0x1}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=ANY=[@ANYBLOB="6d616e676c65005ccac80dddf83e6c56027f0159f94b46da9fa2a172acd9ec22dcaa00000000000000000000000000000000000000000000000000001f0000800600d9caedacea2d21d62fbcbe03972487a6003051"], 0x1) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 13:17:08 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r1, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x2, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x71, &(0x7f0000000140)={r4}, 0x8) [ 514.827454][T10057] BTRFS: device fsid fff6f2a2-2997-48ae-b81e-1b00920efd9a devid 0 transid 6804206012475780642 /dev/loop1 13:17:08 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=ANY=[@ANYBLOB="6d616e676c65005ccac80dddf83e6c56027f0159f94b46da9fa2a172acd9ec22dcaa00000000000000000000000000000000000000000000000000001f0000800600d9caedacea2d21d62fbcbe03972487a6003051"], 0x1) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 13:17:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 13:17:08 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) read$alg(r3, &(0x7f0000000180)=""/4096, 0x1000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x71, &(0x7f0000000140)={r4}, 0x8) 13:17:08 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r1, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x2, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x71, &(0x7f0000000140)={r4}, 0x8) 13:17:08 executing program 4: clone(0x8000000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0xd, 0x4, 0x4, 0x36, 0x0, r0, 0x0, [0x305f, 0xa, 0x300, 0x1800, 0x6000000]}, 0x3c) 13:17:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 13:17:09 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x1, 0x7e, 0x1, 0x7}, 0x3c) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0xd, 0x4, 0x4, 0x36, 0x0, r0, 0x0, [0x305f, 0xa, 0x300, 0x1800, 0x6000000]}, 0x3c) 13:17:09 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r1, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x2, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x71, &(0x7f0000000140)={r4}, 0x8) 13:17:09 executing program 2: socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) read$alg(r2, &(0x7f0000000180)=""/4096, 0x1000) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) 13:17:09 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{0x0}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:09 executing program 4 (fault-call:1 fault-nth:0): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:09 executing program 3: socket$inet6_sctp(0xa, 0x5, 0x84) r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x2, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) 13:17:09 executing program 2: socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) socket$inet6_sctp(0xa, 0x5, 0x84) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) 13:17:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 13:17:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) [ 515.689075][T10133] FAULT_INJECTION: forcing a failure. [ 515.689075][T10133] name failslab, interval 1, probability 0, space 0, times 0 [ 515.714712][T10133] CPU: 1 PID: 10133 Comm: syz-executor.4 Not tainted 5.3.0-rc7+ #0 [ 515.722635][T10133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 515.732701][T10133] Call Trace: [ 515.736030][T10133] dump_stack+0x1d8/0x2f8 [ 515.740384][T10133] should_fail+0x555/0x770 [ 515.744888][T10133] __should_failslab+0x11a/0x160 [ 515.749839][T10133] should_failslab+0x9/0x20 [ 515.754519][T10133] kmem_cache_alloc_node+0x65/0x280 [ 515.754532][T10133] ? __alloc_skb+0x9f/0x500 [ 515.754543][T10133] __alloc_skb+0x9f/0x500 [ 515.754558][T10133] netlink_sendmsg+0x756/0xc50 [ 515.754575][T10133] ? netlink_getsockopt+0x9f0/0x9f0 [ 515.764261][T10133] ___sys_sendmsg+0x60d/0x910 [ 515.764275][T10133] ? rcu_lock_release+0xd/0x30 [ 515.764288][T10133] ? rcu_lock_release+0x26/0x30 [ 515.764296][T10133] ? __fget+0x4e6/0x510 [ 515.764308][T10133] ? __fdget+0x17c/0x200 [ 515.764317][T10133] __x64_sys_sendmsg+0x17c/0x200 [ 515.764340][T10133] do_syscall_64+0xfe/0x140 [ 515.810961][T10133] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 515.816842][T10133] RIP: 0033:0x459879 13:17:09 executing program 2: socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) socket$inet6_sctp(0xa, 0x5, 0x84) read$alg(0xffffffffffffffff, &(0x7f0000000180)=""/4096, 0x1000) 13:17:09 executing program 3: socket$inet6_sctp(0xa, 0x5, 0x84) r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x2, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) socket$inet6_sctp(0xa, 0x5, 0x84) 13:17:09 executing program 4 (fault-call:1 fault-nth:1): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 515.820721][T10133] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 515.840428][T10133] RSP: 002b:00007f96aad1ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 515.848933][T10133] RAX: ffffffffffffffda RBX: 00007f96aad1ac90 RCX: 0000000000459879 [ 515.856889][T10133] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 515.864868][T10133] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 515.873169][T10133] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f96aad1b6d4 [ 515.881237][T10133] R13: 00000000004c77b1 R14: 00000000004dd000 R15: 0000000000000004 13:17:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 13:17:09 executing program 1 (fault-call:3 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:09 executing program 2: socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) socket$inet6_sctp(0xa, 0x5, 0x84) read$alg(0xffffffffffffffff, &(0x7f0000000180)=""/4096, 0x1000) [ 516.039560][T10153] FAULT_INJECTION: forcing a failure. [ 516.039560][T10153] name failslab, interval 1, probability 0, space 0, times 0 [ 516.096448][T10160] FAULT_INJECTION: forcing a failure. [ 516.096448][T10160] name failslab, interval 1, probability 0, space 0, times 0 [ 516.109656][T10153] CPU: 0 PID: 10153 Comm: syz-executor.4 Not tainted 5.3.0-rc7+ #0 [ 516.117560][T10153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 516.117565][T10153] Call Trace: [ 516.117583][T10153] dump_stack+0x1d8/0x2f8 [ 516.117597][T10153] should_fail+0x555/0x770 [ 516.117613][T10153] __should_failslab+0x11a/0x160 [ 516.144611][T10153] should_failslab+0x9/0x20 [ 516.149232][T10153] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 516.154981][T10153] ? __kmalloc_node_track_caller+0x3c/0x60 [ 516.154991][T10153] __kmalloc_node_track_caller+0x3c/0x60 [ 516.155001][T10153] ? netlink_sendmsg+0x756/0xc50 [ 516.155011][T10153] __alloc_skb+0xe8/0x500 [ 516.155021][T10153] netlink_sendmsg+0x756/0xc50 [ 516.155034][T10153] ? netlink_getsockopt+0x9f0/0x9f0 [ 516.155041][T10153] ___sys_sendmsg+0x60d/0x910 [ 516.155054][T10153] ? rcu_lock_release+0xd/0x30 [ 516.155068][T10153] ? rcu_lock_release+0x26/0x30 [ 516.155074][T10153] ? __fget+0x4e6/0x510 [ 516.155088][T10153] ? __fdget+0x17c/0x200 [ 516.208444][T10153] __x64_sys_sendmsg+0x17c/0x200 [ 516.213399][T10153] do_syscall_64+0xfe/0x140 [ 516.217922][T10153] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 516.223822][T10153] RIP: 0033:0x459879 [ 516.227707][T10153] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 516.247819][T10153] RSP: 002b:00007f96aad1ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 516.256234][T10153] RAX: ffffffffffffffda RBX: 00007f96aad1ac90 RCX: 0000000000459879 [ 516.264208][T10153] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 516.272440][T10153] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 516.280440][T10153] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f96aad1b6d4 [ 516.288721][T10153] R13: 00000000004c77b1 R14: 00000000004dd000 R15: 0000000000000004 [ 516.300792][T10160] CPU: 0 PID: 10160 Comm: syz-executor.1 Not tainted 5.3.0-rc7+ #0 [ 516.308740][T10160] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 516.318893][T10160] Call Trace: [ 516.322185][T10160] dump_stack+0x1d8/0x2f8 [ 516.326608][T10160] should_fail+0x555/0x770 [ 516.331042][T10160] __should_failslab+0x11a/0x160 [ 516.335978][T10160] should_failslab+0x9/0x20 [ 516.340510][T10160] kmem_cache_alloc_node+0x65/0x280 [ 516.346105][T10160] ? __alloc_skb+0x9f/0x500 [ 516.350755][T10160] __alloc_skb+0x9f/0x500 [ 516.355086][T10160] netlink_sendmsg+0x756/0xc50 [ 516.359995][T10160] ? netlink_getsockopt+0x9f0/0x9f0 [ 516.365193][T10160] ___sys_sendmsg+0x60d/0x910 [ 516.370095][T10160] ? rcu_lock_release+0xd/0x30 [ 516.375313][T10160] ? rcu_lock_release+0x26/0x30 [ 516.380163][T10160] ? __fget+0x4e6/0x510 [ 516.384335][T10160] ? __fdget+0x17c/0x200 [ 516.388562][T10160] __x64_sys_sendmsg+0x17c/0x200 [ 516.393482][T10160] do_syscall_64+0xfe/0x140 [ 516.397965][T10160] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 516.403848][T10160] RIP: 0033:0x459879 [ 516.407734][T10160] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 516.427622][T10160] RSP: 002b:00007fdea3e88c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 516.436224][T10160] RAX: ffffffffffffffda RBX: 00007fdea3e88c90 RCX: 0000000000459879 [ 516.444181][T10160] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 516.452146][T10160] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 516.460112][T10160] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdea3e896d4 [ 516.468074][T10160] R13: 00000000004c77b1 R14: 00000000004dd000 R15: 0000000000000005 13:17:10 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{0x0}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:10 executing program 3: socket$inet6_sctp(0xa, 0x5, 0x84) r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x2, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) 13:17:10 executing program 2: socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) socket$inet6_sctp(0xa, 0x5, 0x84) read$alg(0xffffffffffffffff, &(0x7f0000000180)=""/4096, 0x1000) 13:17:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 13:17:10 executing program 4 (fault-call:1 fault-nth:2): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:10 executing program 1 (fault-call:3 fault-nth:1): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 516.556790][T10177] FAULT_INJECTION: forcing a failure. [ 516.556790][T10177] name failslab, interval 1, probability 0, space 0, times 0 [ 516.600618][T10185] FAULT_INJECTION: forcing a failure. [ 516.600618][T10185] name failslab, interval 1, probability 0, space 0, times 0 [ 516.607272][T10177] CPU: 1 PID: 10177 Comm: syz-executor.4 Not tainted 5.3.0-rc7+ #0 [ 516.623122][T10177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 516.633296][T10177] Call Trace: [ 516.636590][T10177] dump_stack+0x1d8/0x2f8 [ 516.640928][T10177] should_fail+0x555/0x770 [ 516.645354][T10177] __should_failslab+0x11a/0x160 [ 516.650289][T10177] ? skb_clone+0x1cc/0x380 [ 516.654714][T10177] should_failslab+0x9/0x20 [ 516.659324][T10177] kmem_cache_alloc+0x56/0x2e0 [ 516.664105][T10177] skb_clone+0x1cc/0x380 [ 516.668380][T10177] netlink_deliver_tap+0x4bd/0x880 [ 516.673507][T10177] netlink_unicast+0x75d/0x900 [ 516.678271][T10177] netlink_sendmsg+0x993/0xc50 [ 516.683278][T10177] ? netlink_getsockopt+0x9f0/0x9f0 [ 516.689437][T10177] ___sys_sendmsg+0x60d/0x910 [ 516.694125][T10177] ? rcu_lock_release+0xd/0x30 [ 516.699060][T10177] ? rcu_lock_release+0x26/0x30 [ 516.704227][T10177] ? __fget+0x4e6/0x510 [ 516.708378][T10177] ? __fdget+0x17c/0x200 [ 516.712633][T10177] __x64_sys_sendmsg+0x17c/0x200 [ 516.717587][T10177] do_syscall_64+0xfe/0x140 [ 516.722086][T10177] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 516.727963][T10177] RIP: 0033:0x459879 [ 516.731841][T10177] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 516.751559][T10177] RSP: 002b:00007f96aad1ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 516.759970][T10177] RAX: ffffffffffffffda RBX: 00007f96aad1ac90 RCX: 0000000000459879 [ 516.768043][T10177] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 516.776020][T10177] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 516.784006][T10177] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f96aad1b6d4 [ 516.791979][T10177] R13: 00000000004c77b1 R14: 00000000004dd000 R15: 0000000000000004 [ 516.800119][T10185] CPU: 0 PID: 10185 Comm: syz-executor.1 Not tainted 5.3.0-rc7+ #0 [ 516.801784][T10177] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 516.808015][T10185] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 516.808019][T10185] Call Trace: [ 516.808040][T10185] dump_stack+0x1d8/0x2f8 [ 516.808054][T10185] should_fail+0x555/0x770 [ 516.808066][T10185] __should_failslab+0x11a/0x160 [ 516.808084][T10185] should_failslab+0x9/0x20 [ 516.817168][T10177] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 516.826602][T10185] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 516.826610][T10185] ? __kmalloc_node_track_caller+0x3c/0x60 [ 516.826620][T10185] __kmalloc_node_track_caller+0x3c/0x60 [ 516.826630][T10185] ? netlink_sendmsg+0x756/0xc50 [ 516.826640][T10185] __alloc_skb+0xe8/0x500 [ 516.826651][T10185] netlink_sendmsg+0x756/0xc50 [ 516.826663][T10185] ? netlink_getsockopt+0x9f0/0x9f0 [ 516.826670][T10185] ___sys_sendmsg+0x60d/0x910 [ 516.826682][T10185] ? rcu_lock_release+0xd/0x30 [ 516.826694][T10185] ? rcu_lock_release+0x26/0x30 [ 516.826702][T10185] ? __fget+0x4e6/0x510 [ 516.826716][T10185] ? __fdget+0x17c/0x200 [ 516.923974][T10185] __x64_sys_sendmsg+0x17c/0x200 [ 516.928913][T10185] do_syscall_64+0xfe/0x140 [ 516.933409][T10185] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 516.939290][T10185] RIP: 0033:0x459879 [ 516.943169][T10185] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 516.963008][T10185] RSP: 002b:00007fdea3e88c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 516.971569][T10185] RAX: ffffffffffffffda RBX: 00007fdea3e88c90 RCX: 0000000000459879 [ 516.979521][T10185] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 516.987623][T10185] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 13:17:10 executing program 3: socket$inet6_sctp(0xa, 0x5, 0x84) r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x2, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") 13:17:10 executing program 2: socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) [ 516.995599][T10185] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdea3e896d4 [ 517.003566][T10185] R13: 00000000004c77b1 R14: 00000000004dd000 R15: 0000000000000005 13:17:10 executing program 1 (fault-call:3 fault-nth:2): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x10000}], 0x0, 0x0) 13:17:11 executing program 4 (fault-call:1 fault-nth:3): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:11 executing program 2: socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) [ 517.142210][T10195] FAULT_INJECTION: forcing a failure. [ 517.142210][T10195] name failslab, interval 1, probability 0, space 0, times 0 [ 517.167900][T10203] FAULT_INJECTION: forcing a failure. [ 517.167900][T10203] name failslab, interval 1, probability 0, space 0, times 0 [ 517.177200][T10195] CPU: 1 PID: 10195 Comm: syz-executor.1 Not tainted 5.3.0-rc7+ #0 [ 517.188408][T10195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 517.188413][T10195] Call Trace: [ 517.188435][T10195] dump_stack+0x1d8/0x2f8 [ 517.188449][T10195] should_fail+0x555/0x770 [ 517.188462][T10195] __should_failslab+0x11a/0x160 [ 517.188475][T10195] ? skb_clone+0x1cc/0x380 [ 517.188486][T10195] should_failslab+0x9/0x20 [ 517.188496][T10195] kmem_cache_alloc+0x56/0x2e0 [ 517.188517][T10195] skb_clone+0x1cc/0x380 [ 517.206199][T10195] netlink_deliver_tap+0x4bd/0x880 [ 517.206217][T10195] netlink_unicast+0x75d/0x900 [ 517.206239][T10195] netlink_sendmsg+0x993/0xc50 [ 517.248509][T10195] ? netlink_getsockopt+0x9f0/0x9f0 [ 517.253726][T10195] ___sys_sendmsg+0x60d/0x910 [ 517.258439][T10195] ? rcu_lock_release+0xd/0x30 [ 517.263229][T10195] ? rcu_lock_release+0x26/0x30 [ 517.268280][T10195] ? __fget+0x4e6/0x510 [ 517.272455][T10195] ? __fdget+0x17c/0x200 [ 517.276714][T10195] __x64_sys_sendmsg+0x17c/0x200 [ 517.281661][T10195] do_syscall_64+0xfe/0x140 [ 517.286309][T10195] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 517.292207][T10195] RIP: 0033:0x459879 [ 517.296103][T10195] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 517.315975][T10195] RSP: 002b:00007fdea3e88c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 517.324396][T10195] RAX: ffffffffffffffda RBX: 00007fdea3e88c90 RCX: 0000000000459879 [ 517.332632][T10195] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 517.340601][T10195] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 517.348577][T10195] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdea3e896d4 [ 517.356551][T10195] R13: 00000000004c77b1 R14: 00000000004dd000 R15: 0000000000000005 [ 517.364586][T10203] CPU: 0 PID: 10203 Comm: syz-executor.4 Not tainted 5.3.0-rc7+ #0 [ 517.372481][T10203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 517.382537][T10203] Call Trace: [ 517.382555][T10203] dump_stack+0x1d8/0x2f8 [ 517.382568][T10203] should_fail+0x555/0x770 [ 517.382582][T10203] __should_failslab+0x11a/0x160 [ 517.382594][T10203] should_failslab+0x9/0x20 [ 517.382603][T10203] kmem_cache_alloc_trace+0x5d/0x2f0 [ 517.382612][T10203] ? rtnl_newlink+0x77/0x1af0 [ 517.382621][T10203] rtnl_newlink+0x77/0x1af0 [ 517.382632][T10203] ? is_bpf_text_address+0x398/0x3b0 [ 517.382642][T10203] ? stack_trace_save+0x150/0x150 [ 517.382651][T10203] ? __kernel_text_address+0x9a/0x110 [ 517.382661][T10203] ? unwind_get_return_address+0x4c/0x90 [ 517.382675][T10203] ? check_preemption_disabled+0x47/0x2a0 [ 517.382693][T10203] ? __kfree_skb+0x118/0x170 [ 517.390413][T10203] ? trace_hardirqs_off+0x74/0x80 [ 517.390423][T10203] ? quarantine_put+0xb7/0x1f0 [ 517.390434][T10203] ? __kfree_skb+0x118/0x170 [ 517.390442][T10203] ? __kasan_slab_free+0x19d/0x1e0 [ 517.390448][T10203] ? __kasan_slab_free+0x12a/0x1e0 [ 517.390455][T10203] ? kasan_slab_free+0xe/0x10 [ 517.390462][T10203] ? kmem_cache_free+0x81/0xf0 [ 517.390475][T10203] ? __kfree_skb+0x118/0x170 [ 517.490230][T10203] ? consume_skb+0x6b/0xb0 [ 517.494646][T10203] ? nlmon_xmit+0xc5/0xf0 [ 517.499161][T10203] ? dev_hard_start_xmit+0x1c1/0x3f0 [ 517.504839][T10203] ? trace_lock_acquire+0x159/0x1d0 [ 517.510542][T10203] ? lock_acquire+0x158/0x250 [ 517.515219][T10203] ? rtnetlink_rcv_msg+0x83c/0xd40 [ 517.520317][T10203] ? __mutex_lock_common+0x513/0x2820 [ 517.525757][T10203] ? rtnetlink_rcv_msg+0x83c/0xd40 [ 517.530988][T10203] ? trace_lock_release+0x135/0x1a0 [ 517.536271][T10203] ? rcu_lock_release+0x9/0x30 [ 517.541144][T10203] ? rtnl_setlink+0x460/0x460 [ 517.545803][T10203] rtnetlink_rcv_msg+0x889/0xd40 [ 517.550730][T10203] ? rcu_lock_release+0xd/0x30 [ 517.555480][T10203] ? rcu_lock_release+0xd/0x30 [ 517.560225][T10203] ? __local_bh_enable_ip+0x13a/0x240 [ 517.565576][T10203] ? check_preemption_disabled+0x47/0x2a0 [ 517.571271][T10203] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 517.576880][T10203] ? local_bh_enable+0x9/0x30 [ 517.581534][T10203] ? trace_hardirqs_on+0x74/0x80 [ 517.586450][T10203] ? __local_bh_enable_ip+0x13a/0x240 [ 517.591816][T10203] ? local_bh_enable+0x1f/0x30 [ 517.596556][T10203] ? rcu_lock_release+0x9/0x30 [ 517.601300][T10203] ? trace_lock_release+0x135/0x1a0 [ 517.606494][T10203] ? rcu_lock_release+0x9/0x30 [ 517.611250][T10203] netlink_rcv_skb+0x19e/0x3d0 [ 517.616021][T10203] ? rtnetlink_bind+0x80/0x80 [ 517.620722][T10203] rtnetlink_rcv+0x1c/0x20 [ 517.626149][T10203] netlink_unicast+0x787/0x900 [ 517.632239][T10203] netlink_sendmsg+0x993/0xc50 [ 517.637102][T10203] ? netlink_getsockopt+0x9f0/0x9f0 [ 517.642300][T10203] ___sys_sendmsg+0x60d/0x910 [ 517.646973][T10203] ? rcu_lock_release+0xd/0x30 [ 517.652233][T10203] ? rcu_lock_release+0x26/0x30 [ 517.657282][T10203] ? __fget+0x4e6/0x510 [ 517.661450][T10203] ? __fdget+0x17c/0x200 [ 517.665713][T10203] __x64_sys_sendmsg+0x17c/0x200 [ 517.670983][T10203] do_syscall_64+0xfe/0x140 [ 517.675474][T10203] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 517.681461][T10203] RIP: 0033:0x459879 [ 517.685568][T10203] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 517.706052][T10203] RSP: 002b:00007f96aad1ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 517.714446][T10203] RAX: ffffffffffffffda RBX: 00007f96aad1ac90 RCX: 0000000000459879 [ 517.723160][T10203] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 517.731223][T10203] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 13:17:11 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{0x0}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:11 executing program 3: socket$inet6_sctp(0xa, 0x5, 0x84) r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x2, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) socket$inet_udplite(0x2, 0x2, 0x88) 13:17:11 executing program 2: socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) [ 517.739199][T10203] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f96aad1b6d4 [ 517.749741][T10203] R13: 00000000004c77b1 R14: 00000000004dd000 R15: 0000000000000004 [ 517.767132][T10195] netlink: 'syz-executor.1': attribute type 33 has an invalid length. 13:17:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140), 0x0, 0x10000}], 0x0, 0x0) 13:17:11 executing program 3: socket$inet6_sctp(0xa, 0x5, 0x84) r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x2, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:11 executing program 2: socket$inet6_sctp(0xa, 0x5, 0x84) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) [ 517.812097][T10195] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:17:11 executing program 4 (fault-call:1 fault-nth:4): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:11 executing program 3: socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$VIDIOC_ENUM_FMT(0xffffffffffffffff, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x2, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:11 executing program 1 (fault-call:3 fault-nth:3): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:11 executing program 2: socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet_udplite(0x2, 0x2, 0x88) unshare(0x24020400) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) read$alg(r0, &(0x7f0000000180)=""/4096, 0x1000) [ 517.940617][T10226] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 517.949255][T10226] FAULT_INJECTION: forcing a failure. [ 517.949255][T10226] name failslab, interval 1, probability 0, space 0, times 0 [ 517.962497][T10226] CPU: 1 PID: 10226 Comm: syz-executor.4 Not tainted 5.3.0-rc7+ #0 [ 517.970384][T10226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 517.980533][T10226] Call Trace: [ 517.980557][T10226] dump_stack+0x1d8/0x2f8 [ 517.980575][T10226] should_fail+0x555/0x770 [ 517.980596][T10226] __should_failslab+0x11a/0x160 [ 517.988195][T10226] should_failslab+0x9/0x20 [ 517.988207][T10226] kmem_cache_alloc_node+0x65/0x280 [ 517.988218][T10226] ? __alloc_skb+0x9f/0x500 [ 517.988227][T10226] __alloc_skb+0x9f/0x500 [ 517.988246][T10226] rtmsg_ifinfo_build_skb+0x7f/0x190 [ 518.021605][T10226] rtmsg_ifinfo+0x77/0x120 [ 518.026014][T10226] netdev_state_change+0x10d/0x190 [ 518.031118][T10226] do_setlink+0x6dc/0x36c0 [ 518.035529][T10226] ? __nla_validate_parse+0x18cf/0x1f50 [ 518.041063][T10226] ? trace_kmalloc+0xbb/0x130 [ 518.045730][T10226] rtnl_newlink+0x1015/0x1af0 [ 518.050400][T10226] ? unwind_get_return_address+0x4c/0x90 [ 518.056044][T10226] ? __mutex_lock_common+0x513/0x2820 [ 518.061410][T10226] ? rtnetlink_rcv_msg+0x83c/0xd40 [ 518.066515][T10226] ? trace_lock_release+0x135/0x1a0 [ 518.071808][T10226] ? rcu_lock_release+0x9/0x30 [ 518.076579][T10226] ? rtnl_setlink+0x460/0x460 [ 518.081275][T10226] rtnetlink_rcv_msg+0x889/0xd40 [ 518.086206][T10226] ? rcu_lock_release+0xd/0x30 [ 518.090985][T10226] ? rcu_lock_release+0xd/0x30 [ 518.095748][T10226] ? __local_bh_enable_ip+0x13a/0x240 [ 518.101115][T10226] ? check_preemption_disabled+0x47/0x2a0 [ 518.106842][T10226] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 518.112495][T10226] ? local_bh_enable+0x9/0x30 [ 518.117166][T10226] ? trace_hardirqs_on+0x74/0x80 [ 518.122094][T10226] ? __local_bh_enable_ip+0x13a/0x240 [ 518.127481][T10226] ? local_bh_enable+0x1f/0x30 [ 518.132249][T10226] ? rcu_lock_release+0x9/0x30 [ 518.137113][T10226] ? trace_lock_release+0x135/0x1a0 [ 518.142310][T10226] ? rcu_lock_release+0x9/0x30 [ 518.147069][T10226] netlink_rcv_skb+0x19e/0x3d0 [ 518.151821][T10226] ? rtnetlink_bind+0x80/0x80 [ 518.156487][T10226] rtnetlink_rcv+0x1c/0x20 [ 518.160889][T10226] netlink_unicast+0x787/0x900 [ 518.165646][T10226] netlink_sendmsg+0x993/0xc50 [ 518.170401][T10226] ? netlink_getsockopt+0x9f0/0x9f0 [ 518.175595][T10226] ___sys_sendmsg+0x60d/0x910 [ 518.180260][T10226] ? rcu_lock_release+0xd/0x30 [ 518.185025][T10226] ? rcu_lock_release+0x26/0x30 [ 518.189862][T10226] ? __fget+0x4e6/0x510 [ 518.194010][T10226] ? __fdget+0x17c/0x200 [ 518.198255][T10226] __x64_sys_sendmsg+0x17c/0x200 [ 518.203201][T10226] do_syscall_64+0xfe/0x140 [ 518.207778][T10226] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 518.213672][T10226] RIP: 0033:0x459879 [ 518.217553][T10226] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 518.237144][T10226] RSP: 002b:00007f96aad1ac78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 518.245542][T10226] RAX: ffffffffffffffda RBX: 00007f96aad1ac90 RCX: 0000000000459879 [ 518.253500][T10226] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 518.261461][T10226] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 518.269418][T10226] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f96aad1b6d4 [ 518.277394][T10226] R13: 00000000004c77b1 R14: 00000000004dd000 R15: 0000000000000004 13:17:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140), 0x0, 0x10000}], 0x0, 0x0) 13:17:12 executing program 3: socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$VIDIOC_ENUM_FMT(0xffffffffffffffff, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x2, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 518.312251][T10226] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 518.341629][T10232] FAULT_INJECTION: forcing a failure. [ 518.341629][T10232] name failslab, interval 1, probability 0, space 0, times 0 [ 518.393252][T10232] CPU: 0 PID: 10232 Comm: syz-executor.1 Not tainted 5.3.0-rc7+ #0 [ 518.401212][T10232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 518.401216][T10232] Call Trace: [ 518.401235][T10232] dump_stack+0x1d8/0x2f8 [ 518.401249][T10232] should_fail+0x555/0x770 [ 518.401262][T10232] __should_failslab+0x11a/0x160 [ 518.401275][T10232] should_failslab+0x9/0x20 [ 518.401287][T10232] kmem_cache_alloc_trace+0x5d/0x2f0 [ 518.401298][T10232] ? rtnl_newlink+0x77/0x1af0 [ 518.401308][T10232] rtnl_newlink+0x77/0x1af0 [ 518.401319][T10232] ? is_bpf_text_address+0x398/0x3b0 [ 518.401328][T10232] ? stack_trace_save+0x150/0x150 [ 518.401337][T10232] ? __kernel_text_address+0x9a/0x110 [ 518.401348][T10232] ? unwind_get_return_address+0x4c/0x90 [ 518.401365][T10232] ? check_preemption_disabled+0x47/0x2a0 [ 518.401379][T10232] ? __kfree_skb+0x118/0x170 [ 518.401389][T10232] ? trace_hardirqs_off+0x74/0x80 [ 518.401396][T10232] ? quarantine_put+0xb7/0x1f0 [ 518.401417][T10232] ? __kfree_skb+0x118/0x170 [ 518.414751][T10232] ? __kasan_slab_free+0x19d/0x1e0 [ 518.498686][T10232] ? __kasan_slab_free+0x12a/0x1e0 [ 518.503805][T10232] ? kasan_slab_free+0xe/0x10 [ 518.508460][T10232] ? kmem_cache_free+0x81/0xf0 [ 518.513365][T10232] ? __kfree_skb+0x118/0x170 [ 518.517951][T10232] ? consume_skb+0x6b/0xb0 [ 518.522350][T10232] ? nlmon_xmit+0xc5/0xf0 [ 518.526661][T10232] ? dev_hard_start_xmit+0x1c1/0x3f0 [ 518.531942][T10232] ? trace_lock_acquire+0x159/0x1d0 [ 518.537128][T10232] ? lock_acquire+0x158/0x250 [ 518.541785][T10232] ? rtnetlink_rcv_msg+0x83c/0xd40 [ 518.546891][T10232] ? __mutex_lock_common+0x513/0x2820 [ 518.552254][T10232] ? rtnetlink_rcv_msg+0x83c/0xd40 [ 518.557358][T10232] ? trace_lock_release+0x135/0x1a0 [ 518.562555][T10232] ? rcu_lock_release+0x9/0x30 [ 518.567314][T10232] ? rtnl_setlink+0x460/0x460 [ 518.571978][T10232] rtnetlink_rcv_msg+0x889/0xd40 [ 518.576903][T10232] ? rcu_lock_release+0xd/0x30 [ 518.581688][T10232] ? rcu_lock_release+0xd/0x30 [ 518.586443][T10232] ? __local_bh_enable_ip+0x13a/0x240 [ 518.591801][T10232] ? check_preemption_disabled+0x47/0x2a0 [ 518.597506][T10232] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 518.603133][T10232] ? local_bh_enable+0x9/0x30 [ 518.607785][T10232] ? trace_hardirqs_on+0x74/0x80 [ 518.612731][T10232] ? __local_bh_enable_ip+0x13a/0x240 [ 518.618104][T10232] ? local_bh_enable+0x1f/0x30 [ 518.622864][T10232] ? rcu_lock_release+0x9/0x30 [ 518.627616][T10232] ? trace_lock_release+0x135/0x1a0 [ 518.632814][T10232] ? rcu_lock_release+0x9/0x30 [ 518.637573][T10232] netlink_rcv_skb+0x19e/0x3d0 [ 518.642323][T10232] ? rtnetlink_bind+0x80/0x80 [ 518.646981][T10232] rtnetlink_rcv+0x1c/0x20 [ 518.651386][T10232] netlink_unicast+0x787/0x900 [ 518.656151][T10232] netlink_sendmsg+0x993/0xc50 [ 518.660898][T10232] ? netlink_getsockopt+0x9f0/0x9f0 [ 518.666098][T10232] ___sys_sendmsg+0x60d/0x910 [ 518.670787][T10232] ? rcu_lock_release+0xd/0x30 [ 518.675544][T10232] ? rcu_lock_release+0x26/0x30 [ 518.680382][T10232] ? __fget+0x4e6/0x510 [ 518.684517][T10232] ? __fdget+0x17c/0x200 [ 518.688759][T10232] __x64_sys_sendmsg+0x17c/0x200 [ 518.693681][T10232] do_syscall_64+0xfe/0x140 [ 518.698166][T10232] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 518.704035][T10232] RIP: 0033:0x459879 [ 518.707918][T10232] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 518.727505][T10232] RSP: 002b:00007fdea3e88c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 518.735913][T10232] RAX: ffffffffffffffda RBX: 00007fdea3e88c90 RCX: 0000000000459879 13:17:12 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0xffffffae, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x6d, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0xff64}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:12 executing program 4 (fault-call:1 fault-nth:5): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:12 executing program 3: socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$VIDIOC_ENUM_FMT(0xffffffffffffffff, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x2, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:12 executing program 2: socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet_udplite(0x2, 0x2, 0x88) unshare(0x24020400) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) read$alg(r0, &(0x7f0000000180)=""/4096, 0x1000) 13:17:12 executing program 1 (fault-call:3 fault-nth:4): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 518.743873][T10232] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 518.751840][T10232] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 518.759802][T10232] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdea3e896d4 [ 518.767756][T10232] R13: 00000000004c77b1 R14: 00000000004dd000 R15: 0000000000000005 13:17:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140), 0x0, 0x10000}], 0x0, 0x0) 13:17:12 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x2, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:12 executing program 2: socket$inet6_sctp(0xa, 0x5, 0x84) socket$inet_udplite(0x2, 0x2, 0x88) unshare(0x24020400) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) read$alg(r0, &(0x7f0000000180)=""/4096, 0x1000) [ 518.907407][T10260] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 518.923730][T10260] FAULT_INJECTION: forcing a failure. [ 518.923730][T10260] name failslab, interval 1, probability 0, space 0, times 0 [ 518.940014][T10260] CPU: 0 PID: 10260 Comm: syz-executor.1 Not tainted 5.3.0-rc7+ #0 [ 518.947930][T10260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 518.957987][T10260] Call Trace: [ 518.961292][T10260] dump_stack+0x1d8/0x2f8 [ 518.965619][T10260] should_fail+0x555/0x770 [ 518.970036][T10260] __should_failslab+0x11a/0x160 [ 518.974966][T10260] should_failslab+0x9/0x20 [ 518.979450][T10260] kmem_cache_alloc_node+0x65/0x280 [ 518.984629][T10260] ? __alloc_skb+0x9f/0x500 [ 518.989135][T10260] __alloc_skb+0x9f/0x500 [ 518.993467][T10260] rtmsg_ifinfo_build_skb+0x7f/0x190 [ 518.998734][T10260] rtmsg_ifinfo+0x77/0x120 [ 519.003127][T10260] netdev_state_change+0x10d/0x190 [ 519.008220][T10260] do_setlink+0x6dc/0x36c0 [ 519.012620][T10260] ? __nla_validate_parse+0x18cf/0x1f50 [ 519.018161][T10260] ? trace_kmalloc+0xbb/0x130 [ 519.022820][T10260] rtnl_newlink+0x1015/0x1af0 [ 519.027497][T10260] ? unwind_get_return_address+0x4c/0x90 [ 519.033139][T10260] ? __mutex_lock_common+0x513/0x2820 [ 519.038492][T10260] ? rtnetlink_rcv_msg+0x83c/0xd40 [ 519.043587][T10260] ? trace_lock_release+0x135/0x1a0 [ 519.048762][T10260] ? rcu_lock_release+0x9/0x30 [ 519.053513][T10260] ? rtnl_setlink+0x460/0x460 [ 519.058170][T10260] rtnetlink_rcv_msg+0x889/0xd40 [ 519.063089][T10260] ? rcu_lock_release+0xd/0x30 [ 519.067851][T10260] ? rcu_lock_release+0xd/0x30 [ 519.072596][T10260] ? __local_bh_enable_ip+0x13a/0x240 [ 519.077948][T10260] ? check_preemption_disabled+0x47/0x2a0 [ 519.083658][T10260] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 519.089270][T10260] ? local_bh_enable+0x9/0x30 [ 519.093942][T10260] ? trace_hardirqs_on+0x74/0x80 [ 519.098859][T10260] ? __local_bh_enable_ip+0x13a/0x240 [ 519.104211][T10260] ? local_bh_enable+0x1f/0x30 [ 519.108950][T10260] ? rcu_lock_release+0x9/0x30 [ 519.113692][T10260] ? trace_lock_release+0x135/0x1a0 [ 519.118877][T10260] ? rcu_lock_release+0x9/0x30 [ 519.123629][T10260] netlink_rcv_skb+0x19e/0x3d0 [ 519.128371][T10260] ? rtnetlink_bind+0x80/0x80 [ 519.133025][T10260] rtnetlink_rcv+0x1c/0x20 [ 519.137415][T10260] netlink_unicast+0x787/0x900 [ 519.142178][T10260] netlink_sendmsg+0x993/0xc50 [ 519.146923][T10260] ? netlink_getsockopt+0x9f0/0x9f0 [ 519.152101][T10260] ___sys_sendmsg+0x60d/0x910 [ 519.156761][T10260] ? rcu_lock_release+0xd/0x30 [ 519.161507][T10260] ? rcu_lock_release+0x26/0x30 [ 519.166339][T10260] ? __fget+0x4e6/0x510 [ 519.170488][T10260] ? __fdget+0x17c/0x200 [ 519.174709][T10260] __x64_sys_sendmsg+0x17c/0x200 [ 519.179628][T10260] do_syscall_64+0xfe/0x140 [ 519.184110][T10260] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 519.189980][T10260] RIP: 0033:0x459879 [ 519.193871][T10260] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 519.213456][T10260] RSP: 002b:00007fdea3e88c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 519.221845][T10260] RAX: ffffffffffffffda RBX: 00007fdea3e88c90 RCX: 0000000000459879 [ 519.229808][T10260] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 519.237760][T10260] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 519.245829][T10260] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdea3e896d4 13:17:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 519.253791][T10260] R13: 00000000004c77b1 R14: 00000000004dd000 R15: 0000000000000005 [ 519.263048][T10260] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:17:13 executing program 1 (fault-call:3 fault-nth:5): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 519.305800][T10269] netlink: 'syz-executor.4': attribute type 33 has an invalid length. 13:17:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a", 0x30, 0x10000}], 0x0, 0x0) 13:17:13 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x2, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 519.361731][T10269] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 519.394070][T10278] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 519.403835][T10278] FAULT_INJECTION: forcing a failure. [ 519.403835][T10278] name failslab, interval 1, probability 0, space 0, times 0 [ 519.417243][T10278] CPU: 1 PID: 10278 Comm: syz-executor.1 Not tainted 5.3.0-rc7+ #0 [ 519.425144][T10278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 519.425149][T10278] Call Trace: [ 519.425167][T10278] dump_stack+0x1d8/0x2f8 [ 519.425189][T10278] should_fail+0x555/0x770 [ 519.438557][T10278] __should_failslab+0x11a/0x160 [ 519.438571][T10278] should_failslab+0x9/0x20 [ 519.438581][T10278] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 519.438599][T10278] ? __kmalloc_node_track_caller+0x3c/0x60 [ 519.468228][T10278] __kmalloc_node_track_caller+0x3c/0x60 [ 519.473859][T10278] ? rtmsg_ifinfo_build_skb+0x7f/0x190 [ 519.479878][T10278] __alloc_skb+0xe8/0x500 [ 519.484191][T10278] rtmsg_ifinfo_build_skb+0x7f/0x190 [ 519.489463][T10278] rtmsg_ifinfo+0x77/0x120 [ 519.493860][T10278] netdev_state_change+0x10d/0x190 [ 519.498948][T10278] do_setlink+0x6dc/0x36c0 [ 519.503345][T10278] ? __nla_validate_parse+0x18cf/0x1f50 [ 519.508879][T10278] ? trace_kmalloc+0xbb/0x130 [ 519.513538][T10278] rtnl_newlink+0x1015/0x1af0 [ 519.518196][T10278] ? unwind_get_return_address+0x4c/0x90 [ 519.523820][T10278] ? __mutex_lock_common+0x513/0x2820 [ 519.529171][T10278] ? rtnetlink_rcv_msg+0x83c/0xd40 [ 519.534262][T10278] ? trace_lock_release+0x135/0x1a0 [ 519.539442][T10278] ? rcu_lock_release+0x9/0x30 [ 519.544184][T10278] ? rtnl_setlink+0x460/0x460 [ 519.548838][T10278] rtnetlink_rcv_msg+0x889/0xd40 [ 519.553881][T10278] ? rcu_lock_release+0xd/0x30 [ 519.558630][T10278] ? rcu_lock_release+0xd/0x30 [ 519.563392][T10278] ? __local_bh_enable_ip+0x13a/0x240 [ 519.568757][T10278] ? check_preemption_disabled+0x47/0x2a0 [ 519.574463][T10278] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 519.580078][T10278] ? local_bh_enable+0x9/0x30 [ 519.584734][T10278] ? trace_hardirqs_on+0x74/0x80 [ 519.589652][T10278] ? __local_bh_enable_ip+0x13a/0x240 [ 519.595002][T10278] ? local_bh_enable+0x1f/0x30 [ 519.599748][T10278] ? rcu_lock_release+0x9/0x30 [ 519.604507][T10278] ? trace_lock_release+0x135/0x1a0 [ 519.609789][T10278] ? rcu_lock_release+0x9/0x30 [ 519.614539][T10278] netlink_rcv_skb+0x19e/0x3d0 [ 519.619288][T10278] ? rtnetlink_bind+0x80/0x80 [ 519.623953][T10278] rtnetlink_rcv+0x1c/0x20 [ 519.628359][T10278] netlink_unicast+0x787/0x900 [ 519.633116][T10278] netlink_sendmsg+0x993/0xc50 [ 519.637858][T10278] ? netlink_getsockopt+0x9f0/0x9f0 [ 519.643030][T10278] ___sys_sendmsg+0x60d/0x910 [ 519.647691][T10278] ? rcu_lock_release+0xd/0x30 [ 519.652435][T10278] ? rcu_lock_release+0x26/0x30 [ 519.657272][T10278] ? __fget+0x4e6/0x510 [ 519.661404][T10278] ? __fdget+0x17c/0x200 [ 519.665623][T10278] __x64_sys_sendmsg+0x17c/0x200 [ 519.670537][T10278] do_syscall_64+0xfe/0x140 [ 519.675020][T10278] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 519.680894][T10278] RIP: 0033:0x459879 [ 519.684772][T10278] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 519.704362][T10278] RSP: 002b:00007fdea3e88c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 519.712753][T10278] RAX: ffffffffffffffda RBX: 00007fdea3e88c90 RCX: 0000000000459879 [ 519.720720][T10278] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 519.728669][T10278] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 519.736728][T10278] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdea3e896d4 [ 519.744691][T10278] R13: 00000000004c77b1 R14: 00000000004dd000 R15: 0000000000000005 13:17:13 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0xffffffae, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x6d, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0xff64}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:13 executing program 2: socket$inet6_sctp(0xa, 0x5, 0x84) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) read$alg(r0, &(0x7f0000000180)=""/4096, 0x1000) 13:17:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:13 executing program 1 (fault-call:3 fault-nth:6): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 519.754003][T10278] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 519.838329][T10292] netlink: 'syz-executor.4': attribute type 33 has an invalid length. 13:17:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a", 0x30, 0x10000}], 0x0, 0x0) 13:17:13 executing program 2: socket$inet6_sctp(0xa, 0x5, 0x84) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) read$alg(r0, &(0x7f0000000180)=""/4096, 0x1000) 13:17:13 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x2, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 519.879548][T10292] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 519.899325][T10297] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 519.913203][T10297] FAULT_INJECTION: forcing a failure. [ 519.913203][T10297] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 519.926428][T10297] CPU: 1 PID: 10297 Comm: syz-executor.1 Not tainted 5.3.0-rc7+ #0 [ 519.934393][T10297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 519.934397][T10297] Call Trace: [ 519.934414][T10297] dump_stack+0x1d8/0x2f8 [ 519.934429][T10297] should_fail+0x555/0x770 [ 519.934444][T10297] should_fail_alloc_page+0x55/0x60 [ 519.934455][T10297] prepare_alloc_pages+0x283/0x470 [ 519.934469][T10297] __alloc_pages_nodemask+0xb2/0x5d0 [ 519.952112][T10297] kmem_getpages+0x56/0xa20 [ 519.952122][T10297] ? trace_lock_release+0x135/0x1a0 [ 519.952132][T10297] cache_grow_begin+0x7e/0x2c0 [ 519.952142][T10297] cache_alloc_refill+0x311/0x3f0 [ 519.952155][T10297] ? check_preemption_disabled+0xb7/0x2a0 [ 519.961737][T10297] kmem_cache_alloc_node_trace+0x2a3/0x2d0 [ 519.961747][T10297] ? __kmalloc_node_track_caller+0x3c/0x60 [ 519.961760][T10297] __kmalloc_node_track_caller+0x3c/0x60 [ 519.961770][T10297] ? rtmsg_ifinfo_build_skb+0x7f/0x190 [ 519.961785][T10297] __alloc_skb+0xe8/0x500 [ 519.972145][T10297] rtmsg_ifinfo_build_skb+0x7f/0x190 [ 519.972157][T10297] rtmsg_ifinfo+0x77/0x120 [ 519.972167][T10297] netdev_state_change+0x10d/0x190 [ 519.972177][T10297] do_setlink+0x6dc/0x36c0 [ 519.972193][T10297] ? __nla_validate_parse+0x18cf/0x1f50 [ 519.972209][T10297] ? trace_kmalloc+0xbb/0x130 [ 519.972221][T10297] rtnl_newlink+0x1015/0x1af0 [ 520.039100][T10297] ? finish_lock_switch+0x31/0x40 [ 520.039116][T10297] ? trace_lock_release+0x135/0x1a0 [ 520.049047][T10297] ? finish_lock_switch+0x31/0x40 [ 520.049078][T10297] ? __mutex_lock_common+0x1b37/0x2820 13:17:13 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x2, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:14 executing program 3: openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(0xffffffffffffffff, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x2, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 520.049101][T10297] ? rtnetlink_rcv_msg+0x83c/0xd40 [ 520.084173][T10297] ? rtnl_setlink+0x460/0x460 [ 520.088852][T10297] rtnetlink_rcv_msg+0x889/0xd40 [ 520.093793][T10297] ? rcu_lock_release+0xd/0x30 [ 520.098560][T10297] ? rcu_lock_release+0xd/0x30 [ 520.103334][T10297] ? __local_bh_enable_ip+0x13a/0x240 [ 520.108706][T10297] ? check_preemption_disabled+0x47/0x2a0 [ 520.114425][T10297] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 520.120063][T10297] ? local_bh_enable+0x9/0x30 [ 520.124739][T10297] ? trace_hardirqs_on+0x74/0x80 [ 520.129776][T10297] ? __local_bh_enable_ip+0x13a/0x240 [ 520.135470][T10297] ? local_bh_enable+0x1f/0x30 [ 520.140223][T10297] ? rcu_lock_release+0x9/0x30 [ 520.144985][T10297] ? trace_lock_release+0x135/0x1a0 [ 520.150164][T10297] ? rcu_lock_release+0x9/0x30 [ 520.154912][T10297] netlink_rcv_skb+0x19e/0x3d0 [ 520.159664][T10297] ? rtnetlink_bind+0x80/0x80 [ 520.164322][T10297] rtnetlink_rcv+0x1c/0x20 [ 520.168717][T10297] netlink_unicast+0x787/0x900 [ 520.173473][T10297] netlink_sendmsg+0x993/0xc50 [ 520.178217][T10297] ? netlink_getsockopt+0x9f0/0x9f0 [ 520.183394][T10297] ___sys_sendmsg+0x60d/0x910 [ 520.188054][T10297] ? rcu_lock_release+0xd/0x30 [ 520.192807][T10297] ? rcu_lock_release+0x26/0x30 [ 520.197630][T10297] ? __fget+0x4e6/0x510 [ 520.201768][T10297] ? __fdget+0x17c/0x200 [ 520.206005][T10297] __x64_sys_sendmsg+0x17c/0x200 [ 520.210940][T10297] do_syscall_64+0xfe/0x140 [ 520.215428][T10297] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 520.221304][T10297] RIP: 0033:0x459879 [ 520.225187][T10297] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 520.244772][T10297] RSP: 002b:00007fdea3e88c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 520.253162][T10297] RAX: ffffffffffffffda RBX: 00007fdea3e88c90 RCX: 0000000000459879 [ 520.261112][T10297] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 520.269077][T10297] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 13:17:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:14 executing program 2: socket$inet6_sctp(0xa, 0x5, 0x84) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) read$alg(r0, &(0x7f0000000180)=""/4096, 0x1000) [ 520.277142][T10297] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdea3e896d4 [ 520.285097][T10297] R13: 00000000004c77b1 R14: 00000000004dd000 R15: 0000000000000005 [ 520.298733][T10297] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:17:14 executing program 1 (fault-call:3 fault-nth:7): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 520.388563][T10323] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 520.416409][T10323] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 520.435282][T10326] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 520.445531][T10326] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 520.463736][T10326] FAULT_INJECTION: forcing a failure. [ 520.463736][T10326] name failslab, interval 1, probability 0, space 0, times 0 [ 520.477398][T10326] CPU: 0 PID: 10326 Comm: syz-executor.1 Not tainted 5.3.0-rc7+ #0 [ 520.485301][T10326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 520.495342][T10326] Call Trace: [ 520.495359][T10326] dump_stack+0x1d8/0x2f8 [ 520.495372][T10326] should_fail+0x555/0x770 [ 520.495384][T10326] __should_failslab+0x11a/0x160 [ 520.495396][T10326] should_failslab+0x9/0x20 [ 520.495404][T10326] kmem_cache_alloc_node+0x65/0x280 [ 520.495420][T10326] ? __alloc_skb+0x9f/0x500 [ 520.526608][T10326] __alloc_skb+0x9f/0x500 [ 520.530948][T10326] ? trace_lock_release+0x135/0x1a0 [ 520.536159][T10326] netlink_ack+0x235/0xa10 [ 520.540687][T10326] netlink_rcv_skb+0x238/0x3d0 [ 520.545441][T10326] ? rtnetlink_bind+0x80/0x80 [ 520.550238][T10326] rtnetlink_rcv+0x1c/0x20 [ 520.554673][T10326] netlink_unicast+0x787/0x900 [ 520.559435][T10326] netlink_sendmsg+0x993/0xc50 [ 520.564198][T10326] ? netlink_getsockopt+0x9f0/0x9f0 [ 520.569377][T10326] ___sys_sendmsg+0x60d/0x910 [ 520.574039][T10326] ? rcu_lock_release+0xd/0x30 [ 520.578784][T10326] ? rcu_lock_release+0x26/0x30 [ 520.583610][T10326] ? __fget+0x4e6/0x510 [ 520.587747][T10326] ? __fdget+0x17c/0x200 [ 520.591964][T10326] __x64_sys_sendmsg+0x17c/0x200 [ 520.596897][T10326] do_syscall_64+0xfe/0x140 [ 520.601380][T10326] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 520.607250][T10326] RIP: 0033:0x459879 [ 520.611130][T10326] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 520.630724][T10326] RSP: 002b:00007fdea3e88c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 13:17:14 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0xffffffae, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x6d, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0xff64}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:14 executing program 3: openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(0xffffffffffffffff, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x2, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a", 0x30, 0x10000}], 0x0, 0x0) 13:17:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) 13:17:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x4, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x5, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:14 executing program 3: openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(0xffffffffffffffff, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x2, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 520.639319][T10326] RAX: ffffffffffffffda RBX: 00007fdea3e88c90 RCX: 0000000000459879 [ 520.647286][T10326] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 520.655254][T10326] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 520.663230][T10326] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdea3e896d4 [ 520.671206][T10326] R13: 00000000004c77b1 R14: 00000000004dd000 R15: 0000000000000005 13:17:14 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) read$alg(r0, &(0x7f0000000180)=""/4096, 0x1000) 13:17:14 executing program 1 (fault-call:3 fault-nth:8): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x6, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 520.799993][T10349] FAULT_INJECTION: forcing a failure. [ 520.799993][T10349] name failslab, interval 1, probability 0, space 0, times 0 13:17:14 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, 0x0) [ 520.879075][T10349] CPU: 0 PID: 10349 Comm: syz-executor.1 Not tainted 5.3.0-rc7+ #0 [ 520.887001][T10349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 520.897049][T10349] Call Trace: [ 520.900332][T10349] dump_stack+0x1d8/0x2f8 [ 520.904645][T10349] should_fail+0x555/0x770 [ 520.909040][T10349] __should_failslab+0x11a/0x160 [ 520.913957][T10349] should_failslab+0x9/0x20 [ 520.918436][T10349] kmem_cache_alloc_node+0x65/0x280 [ 520.923612][T10349] ? __alloc_skb+0x9f/0x500 [ 520.928090][T10349] __alloc_skb+0x9f/0x500 [ 520.932401][T10349] ? trace_lock_release+0x135/0x1a0 [ 520.937577][T10349] netlink_ack+0x235/0xa10 [ 520.941977][T10349] netlink_rcv_skb+0x238/0x3d0 [ 520.946731][T10349] ? rtnetlink_bind+0x80/0x80 [ 520.951386][T10349] rtnetlink_rcv+0x1c/0x20 [ 520.955775][T10349] netlink_unicast+0x787/0x900 [ 520.960518][T10349] netlink_sendmsg+0x993/0xc50 [ 520.965262][T10349] ? netlink_getsockopt+0x9f0/0x9f0 [ 520.970435][T10349] ___sys_sendmsg+0x60d/0x910 [ 520.975091][T10349] ? rcu_lock_release+0xd/0x30 [ 520.979835][T10349] ? rcu_lock_release+0x26/0x30 [ 520.984660][T10349] ? __fget+0x4e6/0x510 [ 520.988819][T10349] ? __fdget+0x17c/0x200 [ 520.993063][T10349] __x64_sys_sendmsg+0x17c/0x200 [ 520.997994][T10349] do_syscall_64+0xfe/0x140 [ 521.002484][T10349] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 521.008355][T10349] RIP: 0033:0x459879 [ 521.012230][T10349] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 521.031811][T10349] RSP: 002b:00007fdea3e88c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 521.040213][T10349] RAX: ffffffffffffffda RBX: 00007fdea3e88c90 RCX: 0000000000459879 [ 521.048184][T10349] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 521.056137][T10349] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 521.064109][T10349] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdea3e896d4 [ 521.072180][T10349] R13: 00000000004c77b1 R14: 00000000004dd000 R15: 0000000000000005 13:17:15 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x3, 0x103, &(0x7f00000078c0)) 13:17:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x7, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:15 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) read$alg(r0, &(0x7f0000000180)=""/4096, 0x1000) 13:17:15 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, 0x0) 13:17:15 executing program 1 (fault-call:3 fault-nth:9): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:15 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, 0x0) [ 521.599317][T10377] FAULT_INJECTION: forcing a failure. [ 521.599317][T10377] name failslab, interval 1, probability 0, space 0, times 0 [ 521.622897][T10377] CPU: 0 PID: 10377 Comm: syz-executor.1 Not tainted 5.3.0-rc7+ #0 [ 521.630821][T10377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 521.630826][T10377] Call Trace: [ 521.630844][T10377] dump_stack+0x1d8/0x2f8 [ 521.630857][T10377] should_fail+0x555/0x770 [ 521.630869][T10377] __should_failslab+0x11a/0x160 [ 521.630881][T10377] should_failslab+0x9/0x20 [ 521.630890][T10377] kmem_cache_alloc_node_trace+0x6e/0x2d0 [ 521.630904][T10377] ? __kmalloc_node_track_caller+0x3c/0x60 [ 521.652968][T10377] __kmalloc_node_track_caller+0x3c/0x60 [ 521.652980][T10377] ? netlink_ack+0x235/0xa10 [ 521.652990][T10377] __alloc_skb+0xe8/0x500 [ 521.653000][T10377] ? trace_lock_release+0x135/0x1a0 [ 521.653009][T10377] netlink_ack+0x235/0xa10 [ 521.653021][T10377] netlink_rcv_skb+0x238/0x3d0 [ 521.653031][T10377] ? rtnetlink_bind+0x80/0x80 [ 521.653041][T10377] rtnetlink_rcv+0x1c/0x20 [ 521.653055][T10377] netlink_unicast+0x787/0x900 [ 521.679603][T10377] netlink_sendmsg+0x993/0xc50 [ 521.721420][T10377] ? netlink_getsockopt+0x9f0/0x9f0 [ 521.726614][T10377] ___sys_sendmsg+0x60d/0x910 [ 521.726632][T10377] ? rcu_lock_release+0xd/0x30 [ 521.726646][T10377] ? rcu_lock_release+0x26/0x30 [ 521.726657][T10377] ? __fget+0x4e6/0x510 [ 521.745046][T10377] ? __fdget+0x17c/0x200 [ 521.749297][T10377] __x64_sys_sendmsg+0x17c/0x200 [ 521.754225][T10377] do_syscall_64+0xfe/0x140 [ 521.758709][T10377] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 521.764577][T10377] RIP: 0033:0x459879 [ 521.768567][T10377] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 521.788164][T10377] RSP: 002b:00007fdea3e88c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 13:17:15 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) read$alg(r0, &(0x7f0000000180)=""/4096, 0x1000) 13:17:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x9, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:15 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x0, 0x1, 0x2, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 521.796559][T10377] RAX: ffffffffffffffda RBX: 00007fdea3e88c90 RCX: 0000000000459879 [ 521.804505][T10377] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 521.812453][T10377] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 521.820421][T10377] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdea3e896d4 [ 521.828550][T10377] R13: 00000000004c77b1 R14: 00000000004dd000 R15: 0000000000000005 13:17:15 executing program 1 (fault-call:3 fault-nth:10): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 521.964018][T10398] validate_nla: 8 callbacks suppressed [ 521.964025][T10398] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 521.988154][T10398] net_ratelimit: 8 callbacks suppressed [ 521.988161][T10398] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 522.012846][T10401] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 522.012854][T10398] FAULT_INJECTION: forcing a failure. [ 522.012854][T10398] name failslab, interval 1, probability 0, space 0, times 0 [ 522.012868][T10398] CPU: 1 PID: 10398 Comm: syz-executor.1 Not tainted 5.3.0-rc7+ #0 [ 522.022223][T10401] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 522.035146][T10398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 522.035151][T10398] Call Trace: [ 522.035171][T10398] dump_stack+0x1d8/0x2f8 [ 522.035189][T10398] should_fail+0x555/0x770 [ 522.035202][T10398] __should_failslab+0x11a/0x160 [ 522.035214][T10398] ? skb_clone+0x1cc/0x380 [ 522.035224][T10398] should_failslab+0x9/0x20 [ 522.035233][T10398] kmem_cache_alloc+0x56/0x2e0 [ 522.035242][T10398] skb_clone+0x1cc/0x380 [ 522.035254][T10398] netlink_deliver_tap+0x4bd/0x880 [ 522.035267][T10398] netlink_unicast+0x5d4/0x900 [ 522.035282][T10398] netlink_ack+0x729/0xa10 [ 522.118873][T10398] netlink_rcv_skb+0x238/0x3d0 [ 522.123649][T10398] ? rtnetlink_bind+0x80/0x80 [ 522.128427][T10398] rtnetlink_rcv+0x1c/0x20 [ 522.132920][T10398] netlink_unicast+0x787/0x900 [ 522.137690][T10398] netlink_sendmsg+0x993/0xc50 [ 522.142446][T10398] ? netlink_getsockopt+0x9f0/0x9f0 [ 522.147636][T10398] ___sys_sendmsg+0x60d/0x910 [ 522.152317][T10398] ? rcu_lock_release+0xd/0x30 [ 522.157249][T10398] ? rcu_lock_release+0x26/0x30 [ 522.162096][T10398] ? __fget+0x4e6/0x510 [ 522.166248][T10398] ? __fdget+0x17c/0x200 [ 522.170476][T10398] __x64_sys_sendmsg+0x17c/0x200 [ 522.175504][T10398] do_syscall_64+0xfe/0x140 [ 522.180063][T10398] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 522.185936][T10398] RIP: 0033:0x459879 [ 522.189816][T10398] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 522.209481][T10398] RSP: 002b:00007fdea3e88c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 522.218466][T10398] RAX: ffffffffffffffda RBX: 00007fdea3e88c90 RCX: 0000000000459879 [ 522.226442][T10398] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 522.234506][T10398] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 522.242469][T10398] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdea3e896d4 [ 522.250511][T10398] R13: 00000000004c77b1 R14: 00000000004dd000 R15: 0000000000000005 13:17:16 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x3, 0x103, &(0x7f00000078c0)) 13:17:16 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x0, 0x1, 0x2, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) 13:17:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xa, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:16 executing program 1 (fault-call:3 fault-nth:11): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) 13:17:16 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x0, 0x1, 0x2, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 522.463767][T10412] netlink: 'syz-executor.4': attribute type 33 has an invalid length. 13:17:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) 13:17:16 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x0, 0x2, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 522.545892][T10412] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:17:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) 13:17:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xb, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 522.594374][T10423] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 522.603267][T10423] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 522.713763][T10441] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 522.732059][T10441] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:17:17 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x3, 0x103, &(0x7f00000078c0)) 13:17:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00", 0x31, 0x10000}], 0x0, 0x0) 13:17:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:17 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x0, 0x2, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) 13:17:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xc, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:17 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x0, 0x2, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) [ 523.343677][T10450] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 523.353325][T10450] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 523.382111][T10452] netlink: 'syz-executor.1': attribute type 33 has an invalid length. 13:17:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xd, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 523.393306][T10452] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:17:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00", 0x31, 0x10000}], 0x0, 0x0) 13:17:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x2, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:17 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 523.490599][T10469] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 523.541190][T10469] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 523.575737][T10475] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 523.585118][T10475] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:17:18 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{0x0, 0x0, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) 13:17:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xe, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:18 executing program 3 (fault-call:1 fault-nth:0): r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a00", 0x31, 0x10000}], 0x0, 0x0) [ 524.172644][T10491] FAULT_INJECTION: forcing a failure. [ 524.172644][T10491] name failslab, interval 1, probability 0, space 0, times 0 [ 524.189714][T10498] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 524.189761][T10491] CPU: 1 PID: 10491 Comm: syz-executor.3 Not tainted 5.3.0-rc7+ #0 [ 524.205777][T10491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 524.205782][T10491] Call Trace: [ 524.205800][T10491] dump_stack+0x1d8/0x2f8 [ 524.205822][T10491] should_fail+0x555/0x770 [ 524.219207][T10498] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 524.223459][T10491] __should_failslab+0x11a/0x160 [ 524.223471][T10491] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 524.223479][T10491] should_failslab+0x9/0x20 [ 524.223487][T10491] __kmalloc+0x7a/0x340 [ 524.223495][T10491] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 524.223504][T10491] tomoyo_realpath_from_path+0xdc/0x7c0 [ 524.223515][T10491] tomoyo_path_number_perm+0x166/0x640 [ 524.223536][T10491] ? smack_file_ioctl+0x278/0x2e0 [ 524.283948][T10491] ? __fget+0x431/0x510 [ 524.288119][T10491] tomoyo_file_ioctl+0x23/0x30 [ 524.293151][T10491] security_file_ioctl+0x6d/0xd0 [ 524.298099][T10491] __x64_sys_ioctl+0xa3/0x120 [ 524.302807][T10491] do_syscall_64+0xfe/0x140 [ 524.307313][T10491] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 524.313205][T10491] RIP: 0033:0x459879 [ 524.317092][T10491] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 524.337281][T10491] RSP: 002b:00007f57e1d8fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 524.345838][T10491] RAX: ffffffffffffffda RBX: 00007f57e1d8fc90 RCX: 0000000000459879 [ 524.353796][T10491] RDX: 0000000020000080 RSI: 00000000c0405602 RDI: 0000000000000003 [ 524.361757][T10491] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 13:17:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x4, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xf, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) 13:17:18 executing program 3 (fault-call:1 fault-nth:1): r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 524.369711][T10491] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f57e1d906d4 [ 524.377684][T10491] R13: 00000000004c4b48 R14: 00000000004d8ea8 R15: 0000000000000004 [ 524.389344][T10491] ERROR: Out of memory at tomoyo_realpath_from_path. 13:17:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x10, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff6", 0x3d, 0x10000}], 0x0, 0x0) [ 524.538509][T10517] FAULT_INJECTION: forcing a failure. [ 524.538509][T10517] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 524.551738][T10517] CPU: 0 PID: 10517 Comm: syz-executor.3 Not tainted 5.3.0-rc7+ #0 [ 524.559621][T10517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 524.569678][T10517] Call Trace: [ 524.569698][T10517] dump_stack+0x1d8/0x2f8 [ 524.569710][T10517] should_fail+0x555/0x770 [ 524.569722][T10517] should_fail_alloc_page+0x55/0x60 [ 524.569731][T10517] prepare_alloc_pages+0x283/0x470 [ 524.569745][T10517] __alloc_pages_nodemask+0xb2/0x5d0 [ 524.597288][T10517] ? stack_trace_save+0x150/0x150 [ 524.602321][T10517] kmem_getpages+0x56/0xa20 [ 524.607011][T10517] cache_grow_begin+0x7e/0x2c0 [ 524.611781][T10517] cache_alloc_refill+0x311/0x3f0 [ 524.616808][T10517] ? check_preemption_disabled+0xb7/0x2a0 [ 524.622540][T10517] __kmalloc+0x318/0x340 [ 524.626899][T10517] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 524.632774][T10517] tomoyo_realpath_from_path+0xdc/0x7c0 [ 524.638308][T10517] tomoyo_path_number_perm+0x166/0x640 [ 524.643825][T10517] ? smack_file_ioctl+0x278/0x2e0 [ 524.648831][T10517] ? __fget+0x431/0x510 [ 524.652970][T10517] tomoyo_file_ioctl+0x23/0x30 [ 524.657724][T10517] security_file_ioctl+0x6d/0xd0 [ 524.662793][T10517] __x64_sys_ioctl+0xa3/0x120 [ 524.667456][T10517] do_syscall_64+0xfe/0x140 [ 524.671942][T10517] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 524.677818][T10517] RIP: 0033:0x459879 [ 524.681691][T10517] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 524.701277][T10517] RSP: 002b:00007f57e1d8fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 524.709680][T10517] RAX: ffffffffffffffda RBX: 00007f57e1d8fc90 RCX: 0000000000459879 [ 524.717631][T10517] RDX: 0000000020000080 RSI: 00000000c0405602 RDI: 0000000000000003 [ 524.725585][T10517] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 524.733553][T10517] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f57e1d906d4 [ 524.741511][T10517] R13: 00000000004c4b48 R14: 00000000004d8ea8 R15: 0000000000000004 13:17:19 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{0x0, 0x0, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x5, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x11, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) 13:17:19 executing program 3 (fault-call:1 fault-nth:2): r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff6", 0x3d, 0x10000}], 0x0, 0x0) 13:17:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x12, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x6, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 525.298959][T10537] FAULT_INJECTION: forcing a failure. [ 525.298959][T10537] name failslab, interval 1, probability 0, space 0, times 0 [ 525.321601][T10537] CPU: 0 PID: 10537 Comm: syz-executor.3 Not tainted 5.3.0-rc7+ #0 [ 525.329698][T10537] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 525.339760][T10537] Call Trace: [ 525.343194][T10537] dump_stack+0x1d8/0x2f8 [ 525.347616][T10537] should_fail+0x555/0x770 [ 525.352026][T10537] __should_failslab+0x11a/0x160 [ 525.356943][T10537] ? tomoyo_encode2+0x273/0x5a0 [ 525.361806][T10537] should_failslab+0x9/0x20 [ 525.366286][T10537] __kmalloc+0x7a/0x340 [ 525.370420][T10537] tomoyo_encode2+0x273/0x5a0 [ 525.375076][T10537] tomoyo_realpath_from_path+0x769/0x7c0 [ 525.380693][T10537] tomoyo_path_number_perm+0x166/0x640 [ 525.386139][T10537] ? smack_file_ioctl+0x278/0x2e0 [ 525.391187][T10537] ? __fget+0x431/0x510 [ 525.395328][T10537] tomoyo_file_ioctl+0x23/0x30 [ 525.400069][T10537] security_file_ioctl+0x6d/0xd0 [ 525.405942][T10537] __x64_sys_ioctl+0xa3/0x120 [ 525.410615][T10537] do_syscall_64+0xfe/0x140 [ 525.415113][T10537] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 525.420977][T10537] RIP: 0033:0x459879 [ 525.424851][T10537] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:17:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0b") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) [ 525.444445][T10537] RSP: 002b:00007f57e1d8fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 525.452840][T10537] RAX: ffffffffffffffda RBX: 00007f57e1d8fc90 RCX: 0000000000459879 [ 525.460814][T10537] RDX: 0000000020000080 RSI: 00000000c0405602 RDI: 0000000000000003 [ 525.468780][T10537] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 525.476737][T10537] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f57e1d906d4 [ 525.484786][T10537] R13: 00000000004c4b48 R14: 00000000004d8ea8 R15: 0000000000000004 13:17:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x25, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff6", 0x3d, 0x10000}], 0x0, 0x0) 13:17:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x7, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 525.568561][T10537] ERROR: Out of memory at tomoyo_realpath_from_path. 13:17:20 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{0x0, 0x0, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0b") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) 13:17:20 executing program 3 (fault-call:1 fault-nth:3): r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x48, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248", 0x43, 0x10000}], 0x0, 0x0) 13:17:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x9, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:20 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x4c, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0b") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) 13:17:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248", 0x43, 0x10000}], 0x0, 0x0) 13:17:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xa, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:20 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, 0x0, 0x0, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:20 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0x2, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) 13:17:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x60, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xb, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248", 0x43, 0x10000}], 0x0, 0x0) 13:17:20 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0x10, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 527.012608][T10624] validate_nla: 16 callbacks suppressed [ 527.012613][T10624] netlink: 'syz-executor.1': attribute type 33 has an invalid length. 13:17:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) [ 527.085067][T10624] net_ratelimit: 16 callbacks suppressed [ 527.085073][T10624] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 527.111226][T10627] netlink: 'syz-executor.4': attribute type 33 has an invalid length. 13:17:21 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0x4c01, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) 13:17:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xc, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 527.126293][T10627] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:17:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x68, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 527.286508][T10649] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 527.301571][T10649] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 527.320476][T10652] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 527.330498][T10652] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:17:21 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, 0x0, 0x0, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:21 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0x5421, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) 13:17:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xd, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 13:17:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:21 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0x5450, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 527.881192][T10664] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 527.900245][T10664] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 527.917735][T10666] netlink: 'syz-executor.1': attribute type 33 has an invalid length. 13:17:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x74, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) [ 527.936882][T10666] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:17:21 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0x5451, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xe, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x7a, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 528.034361][T10681] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 528.050079][T10681] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 528.124962][T10690] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 528.176122][T10690] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 528.198696][T10695] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 528.207790][T10695] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:17:22 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, 0x0, 0x0, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) 13:17:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f4248526653", 0x46, 0x10000}], 0x0, 0x0) 13:17:22 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0x5452, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xf, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) [ 528.741287][T10710] netlink: 'syz-executor.4': attribute type 33 has an invalid length. 13:17:22 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0x5460, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x10, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x500, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 528.787949][T10710] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:17:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 13:17:22 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0x6364, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:23 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}], 0x7, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) 13:17:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x11, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x600, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:23 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0x8912, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 13:17:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x12, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:23 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0x8933, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) 13:17:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x25, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f", 0x47, 0x10000}], 0x0, 0x0) 13:17:24 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}], 0x7, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x80000, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) 13:17:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x900, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:24 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0x40000000, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x48, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x0, 0x0) 13:17:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xa00, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x80000, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) 13:17:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x4c, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:24 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0x400454ca, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xb00, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x0, 0x0) 13:17:25 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}], 0x7, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x80000, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) 13:17:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x60, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:25 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0x40045612, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48}], 0x0, 0x0) 13:17:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xd00, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x80000, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) 13:17:25 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0x40049409, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x68, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:25 executing program 5 (fault-call:1 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xe00, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 531.549281][T10860] FAULT_INJECTION: forcing a failure. [ 531.549281][T10860] name failslab, interval 1, probability 0, space 0, times 0 [ 531.579395][T10860] CPU: 0 PID: 10860 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 531.587423][T10860] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 531.597483][T10860] Call Trace: [ 531.597502][T10860] dump_stack+0x1d8/0x2f8 [ 531.597517][T10860] should_fail+0x555/0x770 [ 531.597530][T10860] __should_failslab+0x11a/0x160 [ 531.597544][T10860] ? __se_sys_memfd_create+0x10a/0x4b0 [ 531.605160][T10860] should_failslab+0x9/0x20 [ 531.605171][T10860] __kmalloc+0x7a/0x340 [ 531.605185][T10860] __se_sys_memfd_create+0x10a/0x4b0 [ 531.605202][T10860] ? do_syscall_64+0x1d/0x140 [ 531.639351][T10860] __x64_sys_memfd_create+0x5b/0x70 [ 531.644679][T10860] do_syscall_64+0xfe/0x140 [ 531.649386][T10860] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 531.655372][T10860] RIP: 0033:0x459879 [ 531.659294][T10860] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 531.679059][T10860] RSP: 002b:00007f0134a31a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 531.688013][T10860] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459879 [ 531.695980][T10860] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 531.703944][T10860] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 531.712396][T10860] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f0134a326d4 [ 531.720956][T10860] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:17:26 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {0x0}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) 13:17:26 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0x4020940d, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xf00, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:26 executing program 5 (fault-call:1 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:26 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0x800454d2, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 532.194235][T10876] FAULT_INJECTION: forcing a failure. [ 532.194235][T10876] name failslab, interval 1, probability 0, space 0, times 0 [ 532.211393][T10879] validate_nla: 18 callbacks suppressed [ 532.211399][T10879] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 532.244437][T10876] CPU: 0 PID: 10876 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 532.252367][T10876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 532.262611][T10876] Call Trace: [ 532.267187][T10876] dump_stack+0x1d8/0x2f8 [ 532.271802][T10876] should_fail+0x555/0x770 [ 532.276585][T10876] __should_failslab+0x11a/0x160 [ 532.281448][T10879] net_ratelimit: 18 callbacks suppressed [ 532.281453][T10879] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 532.281553][T10876] ? shmem_alloc_inode+0x1b/0x40 [ 532.303784][T10876] should_failslab+0x9/0x20 [ 532.303795][T10876] kmem_cache_alloc+0x56/0x2e0 [ 532.303805][T10876] ? shmem_fallocate+0xc90/0xc90 [ 532.303816][T10876] shmem_alloc_inode+0x1b/0x40 [ 532.303824][T10876] ? shmem_fallocate+0xc90/0xc90 [ 532.303832][T10876] new_inode_pseudo+0x68/0x240 13:17:26 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0x80086301, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x1100, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 532.303841][T10876] new_inode+0x28/0x1c0 [ 532.303849][T10876] ? __kasan_check_read+0x11/0x20 [ 532.303859][T10876] shmem_get_inode+0x11b/0x700 [ 532.303867][T10876] ? __alloc_fd+0x58f/0x630 [ 532.303883][T10876] __shmem_file_setup+0x129/0x280 [ 532.321506][T10876] shmem_file_setup+0x2f/0x40 [ 532.321517][T10876] __se_sys_memfd_create+0x28e/0x4b0 [ 532.321527][T10876] __x64_sys_memfd_create+0x5b/0x70 [ 532.321536][T10876] do_syscall_64+0xfe/0x140 [ 532.321548][T10876] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 532.321562][T10876] RIP: 0033:0x459879 [ 532.350996][T10876] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 532.351001][T10876] RSP: 002b:00007f0134a31a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 532.351009][T10876] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459879 [ 532.351014][T10876] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004be7a8 13:17:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000180)=""/4096, 0x1000) 13:17:26 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0045540, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:26 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0045878, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 532.351019][T10876] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 532.351029][T10876] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f0134a326d4 [ 532.365316][T10876] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 532.403542][T10890] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 532.492347][T10890] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 532.509402][T10877] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 532.519994][T10877] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:17:26 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {0x0}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:26 executing program 5 (fault-call:1 fault-nth:2): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:26 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0045878, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x1157, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x74, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000180)=""/4096, 0x1000) [ 533.044269][T10909] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 533.076518][T10915] FAULT_INJECTION: forcing a failure. [ 533.076518][T10915] name failslab, interval 1, probability 0, space 0, times 0 13:17:27 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0189436, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 533.079333][T10909] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 533.095321][T10915] CPU: 1 PID: 10915 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 533.112428][T10915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 533.122485][T10915] Call Trace: [ 533.125792][T10915] dump_stack+0x1d8/0x2f8 [ 533.130136][T10915] should_fail+0x555/0x770 [ 533.134662][T10915] __should_failslab+0x11a/0x160 [ 533.134673][T10915] ? security_inode_alloc+0x36/0x1e0 13:17:27 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0205647, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 533.134683][T10915] should_failslab+0x9/0x20 [ 533.134696][T10915] kmem_cache_alloc+0x56/0x2e0 [ 533.144883][T10915] security_inode_alloc+0x36/0x1e0 [ 533.144891][T10915] inode_init_always+0x3b5/0x8d0 [ 533.144900][T10915] ? shmem_fallocate+0xc90/0xc90 [ 533.144907][T10915] new_inode_pseudo+0x7f/0x240 [ 533.144913][T10915] new_inode+0x28/0x1c0 [ 533.144921][T10915] ? __kasan_check_read+0x11/0x20 [ 533.144930][T10915] shmem_get_inode+0x11b/0x700 [ 533.144937][T10915] ? __alloc_fd+0x58f/0x630 13:17:27 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0205648, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x7a, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:27 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0205649, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 533.144947][T10915] __shmem_file_setup+0x129/0x280 [ 533.144957][T10915] shmem_file_setup+0x2f/0x40 [ 533.144966][T10915] __se_sys_memfd_create+0x28e/0x4b0 [ 533.144975][T10915] ? do_syscall_64+0x1d/0x140 [ 533.144983][T10915] __x64_sys_memfd_create+0x5b/0x70 [ 533.144994][T10915] do_syscall_64+0xfe/0x140 [ 533.222266][T10915] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 533.228317][T10915] RIP: 0033:0x459879 [ 533.232219][T10915] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 533.251827][T10915] RSP: 002b:00007f0134a31a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 533.251837][T10915] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459879 [ 533.251842][T10915] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 533.251848][T10915] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 533.251853][T10915] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f0134a326d4 13:17:27 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc020660b, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 533.251859][T10915] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 533.321428][T10932] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 533.346839][T10932] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:17:27 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {0x0}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:27 executing program 5 (fault-call:1 fault-nth:3): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000180)=""/4096, 0x1000) 13:17:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x1200, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:27 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0285628, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:27 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0285629, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 533.914084][T10946] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 533.932541][T10946] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 533.945382][T10950] FAULT_INJECTION: forcing a failure. [ 533.945382][T10950] name failslab, interval 1, probability 0, space 0, times 0 [ 533.972078][T10950] CPU: 0 PID: 10950 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 533.980004][T10950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 533.982944][T10952] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 533.990060][T10950] Call Trace: [ 533.990082][T10950] dump_stack+0x1d8/0x2f8 [ 533.990097][T10950] should_fail+0x555/0x770 [ 533.990110][T10950] __should_failslab+0x11a/0x160 [ 533.990119][T10950] ? __d_alloc+0x2d/0x6e0 [ 533.990137][T10950] should_failslab+0x9/0x20 [ 533.998913][T10952] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 534.001604][T10950] kmem_cache_alloc+0x56/0x2e0 [ 534.001616][T10950] __d_alloc+0x2d/0x6e0 [ 534.001627][T10950] ? lockdep_init_map+0x2a/0x680 [ 534.001636][T10950] d_alloc_pseudo+0x1d/0x70 [ 534.001645][T10950] alloc_file_pseudo+0xc3/0x260 [ 534.001659][T10950] __shmem_file_setup+0x1a2/0x280 [ 534.001672][T10950] shmem_file_setup+0x2f/0x40 [ 534.072099][T10950] __se_sys_memfd_create+0x28e/0x4b0 [ 534.077463][T10950] ? do_syscall_64+0x1d/0x140 [ 534.082141][T10950] __x64_sys_memfd_create+0x5b/0x70 [ 534.087330][T10950] do_syscall_64+0xfe/0x140 [ 534.092030][T10950] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 534.097915][T10950] RIP: 0033:0x459879 [ 534.101938][T10950] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:17:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:28 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405603, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) 13:17:28 executing program 5 (fault-call:1 fault-nth:4): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 534.121528][T10950] RSP: 002b:00007f0134a31a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 534.129938][T10950] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459879 [ 534.137941][T10950] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 534.145918][T10950] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 534.153871][T10950] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f0134a326d4 [ 534.161829][T10950] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:17:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x500, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 534.254323][T10965] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 534.291715][T10965] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 534.313945][T10970] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 534.335404][T10973] FAULT_INJECTION: forcing a failure. [ 534.335404][T10973] name failslab, interval 1, probability 0, space 0, times 0 [ 534.347499][T10970] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 534.349134][T10973] CPU: 0 PID: 10973 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 534.371202][T10973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 534.381256][T10973] Call Trace: [ 534.381274][T10973] dump_stack+0x1d8/0x2f8 [ 534.381286][T10973] should_fail+0x555/0x770 [ 534.381298][T10973] __should_failslab+0x11a/0x160 [ 534.381308][T10973] ? __alloc_file+0x2c/0x390 [ 534.381323][T10973] should_failslab+0x9/0x20 [ 534.388946][T10973] kmem_cache_alloc+0x56/0x2e0 [ 534.412430][T10973] ? trace_lock_release+0x135/0x1a0 [ 534.417634][T10973] __alloc_file+0x2c/0x390 [ 534.422062][T10973] alloc_empty_file+0xac/0x1b0 [ 534.427274][T10973] alloc_file+0x60/0x4c0 [ 534.427285][T10973] alloc_file_pseudo+0x1d4/0x260 [ 534.427302][T10973] __shmem_file_setup+0x1a2/0x280 [ 534.436470][T10973] shmem_file_setup+0x2f/0x40 [ 534.446282][T10973] __se_sys_memfd_create+0x28e/0x4b0 [ 534.451576][T10973] ? do_syscall_64+0x1d/0x140 [ 534.456264][T10973] __x64_sys_memfd_create+0x5b/0x70 [ 534.461475][T10973] do_syscall_64+0xfe/0x140 [ 534.465983][T10973] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 534.471856][T10973] RIP: 0033:0x459879 [ 534.475729][T10973] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 534.495314][T10973] RSP: 002b:00007f0134a31a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 534.503706][T10973] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459879 [ 534.511660][T10973] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 534.519610][T10973] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 534.527566][T10973] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f0134a326d4 [ 534.535568][T10973] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:17:28 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006480)=""/128, 0x80}], 0x7, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:28 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405604, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) 13:17:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2500, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x600, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:28 executing program 5 (fault-call:1 fault-nth:5): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 534.757507][T10983] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 534.775696][T10987] FAULT_INJECTION: forcing a failure. [ 534.775696][T10987] name failslab, interval 1, probability 0, space 0, times 0 [ 534.797325][T10983] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 534.804142][T10987] CPU: 0 PID: 10987 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 534.820354][T10987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 534.830424][T10987] Call Trace: [ 534.833705][T10987] dump_stack+0x1d8/0x2f8 [ 534.833718][T10987] should_fail+0x555/0x770 [ 534.833730][T10987] __should_failslab+0x11a/0x160 [ 534.833740][T10987] ? security_file_alloc+0x36/0x200 [ 534.833750][T10987] should_failslab+0x9/0x20 [ 534.833761][T10987] kmem_cache_alloc+0x56/0x2e0 [ 534.833770][T10987] security_file_alloc+0x36/0x200 [ 534.833782][T10987] __alloc_file+0xde/0x390 [ 534.833796][T10987] alloc_empty_file+0xac/0x1b0 [ 534.871421][T10987] alloc_file+0x60/0x4c0 [ 534.871435][T10987] alloc_file_pseudo+0x1d4/0x260 [ 534.871448][T10987] __shmem_file_setup+0x1a2/0x280 [ 534.871458][T10987] shmem_file_setup+0x2f/0x40 [ 534.871466][T10987] __se_sys_memfd_create+0x28e/0x4b0 [ 534.871475][T10987] ? do_syscall_64+0x1d/0x140 13:17:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r1, 0x0, 0x0) 13:17:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x3f00, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x700, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:28 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405605, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 534.871483][T10987] __x64_sys_memfd_create+0x5b/0x70 [ 534.871496][T10987] do_syscall_64+0xfe/0x140 [ 534.880490][T10987] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 534.880499][T10987] RIP: 0033:0x459879 [ 534.880508][T10987] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 534.880517][T10987] RSP: 002b:00007f0134a31a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 13:17:28 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405606, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:28 executing program 2 (fault-call:4 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) [ 534.910237][T10987] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459879 [ 534.910242][T10987] RDX: 0000000020000068 RSI: 0000000000000000 RDI: 00000000004be7a8 [ 534.910247][T10987] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 534.910253][T10987] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f0134a326d4 [ 534.910258][T10987] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:17:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x4000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:29 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405608, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:29 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006480)=""/128, 0x80}], 0x7, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:29 executing program 5 (fault-call:1 fault-nth:6): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x900, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) 13:17:29 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405667, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x4788, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xa00, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x3) 13:17:29 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0585609, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 535.668705][T11025] FAULT_INJECTION: forcing a failure. [ 535.668705][T11025] name failslab, interval 1, probability 0, space 0, times 0 13:17:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x4800, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 535.742903][T11025] CPU: 1 PID: 11025 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 535.751017][T11025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 535.762699][T11025] Call Trace: [ 535.767294][T11025] dump_stack+0x1d8/0x2f8 [ 535.771757][T11025] should_fail+0x555/0x770 [ 535.777112][T11025] __should_failslab+0x11a/0x160 [ 535.783204][T11025] ? tomoyo_realpath_from_path+0xdc/0x7c0 13:17:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xb00, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 535.788935][T11025] should_failslab+0x9/0x20 [ 535.793615][T11025] __kmalloc+0x7a/0x340 [ 535.798749][T11025] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 535.804628][T11025] tomoyo_realpath_from_path+0xdc/0x7c0 [ 535.810248][T11025] tomoyo_path_perm+0x192/0x850 [ 535.815118][T11025] ? trace_lock_release+0x135/0x1a0 [ 535.820343][T11025] tomoyo_path_truncate+0x1c/0x20 [ 535.825378][T11025] security_path_truncate+0xd5/0x150 [ 535.830676][T11025] do_sys_ftruncate+0x493/0x710 [ 535.835539][T11025] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 535.841268][T11025] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 535.846735][T11025] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 535.852463][T11025] ? trace_hardirqs_off_caller+0x58/0x80 [ 535.858235][T11025] ? do_syscall_64+0x1d/0x140 [ 535.862930][T11025] __x64_sys_ftruncate+0x60/0x70 [ 535.867986][T11025] do_syscall_64+0xfe/0x140 [ 535.872501][T11025] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 535.878398][T11025] RIP: 0033:0x459847 [ 535.882308][T11025] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 535.902217][T11025] RSP: 002b:00007f0134a31a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 535.910638][T11025] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459847 [ 535.910644][T11025] RDX: 0000000020000068 RSI: 0000000000020000 RDI: 0000000000000005 [ 535.910649][T11025] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 535.910653][T11025] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000005 [ 535.910658][T11025] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 535.920324][T11025] ERROR: Out of memory at tomoyo_realpath_from_path. 13:17:30 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006480)=""/128, 0x80}], 0x7, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:30 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc058560f, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x4888, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xc00, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x20001180) 13:17:30 executing program 5 (fault-call:1 fault-nth:7): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 536.496683][T11069] FAULT_INJECTION: forcing a failure. [ 536.496683][T11069] name failslab, interval 1, probability 0, space 0, times 0 [ 536.513480][T11069] CPU: 0 PID: 11069 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 536.521556][T11069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 536.521560][T11069] Call Trace: [ 536.521580][T11069] dump_stack+0x1d8/0x2f8 [ 536.521594][T11069] should_fail+0x555/0x770 [ 536.521609][T11069] __should_failslab+0x11a/0x160 [ 536.521621][T11069] ? tomoyo_encode2+0x273/0x5a0 [ 536.521633][T11069] should_failslab+0x9/0x20 [ 536.521643][T11069] __kmalloc+0x7a/0x340 [ 536.521652][T11069] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 536.521662][T11069] tomoyo_encode2+0x273/0x5a0 [ 536.521673][T11069] ? dynamic_dname+0xf0/0xf0 [ 536.521684][T11069] tomoyo_realpath_from_path+0x769/0x7c0 [ 536.521697][T11069] tomoyo_path_perm+0x192/0x850 [ 536.521708][T11069] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 536.521715][T11069] ? trace_lock_release+0x135/0x1a0 [ 536.521722][T11069] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 536.521735][T11069] ? trace_hardirqs_on_caller+0x46/0x80 [ 536.548834][T11069] tomoyo_path_truncate+0x1c/0x20 [ 536.573441][T11069] security_path_truncate+0xd5/0x150 [ 536.573452][T11069] do_sys_ftruncate+0x493/0x710 [ 536.573463][T11069] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 536.573473][T11069] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 536.573501][T11069] ? trace_irq_disable_rcuidle+0x23/0x1e0 13:17:30 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0585611, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xd00, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:30 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc058565d, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xd63, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x4c00, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 536.573508][T11069] ? trace_hardirqs_off_caller+0x58/0x80 [ 536.573515][T11069] ? do_syscall_64+0x1d/0x140 [ 536.573523][T11069] __x64_sys_ftruncate+0x60/0x70 [ 536.573531][T11069] do_syscall_64+0xfe/0x140 [ 536.573541][T11069] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 536.573549][T11069] RIP: 0033:0x459847 [ 536.573559][T11069] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:17:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x5711, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 536.573564][T11069] RSP: 002b:00007f0134a31a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d [ 536.594383][T11069] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459847 [ 536.594388][T11069] RDX: 0000000020000068 RSI: 0000000000020000 RDI: 0000000000000005 [ 536.594393][T11069] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 536.594403][T11069] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000005 [ 536.670693][T11069] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 536.776566][T11069] ERROR: Out of memory at tomoyo_realpath_from_path. 13:17:31 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {0x0}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x7ffff000) 13:17:31 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x3, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x5865, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xe00, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:31 executing program 5 (fault-call:1 fault-nth:8): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 537.339761][T11104] FAULT_INJECTION: forcing a failure. [ 537.339761][T11104] name failslab, interval 1, probability 0, space 0, times 0 [ 537.353132][T11105] validate_nla: 15 callbacks suppressed [ 537.353139][T11105] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 537.370323][T11104] CPU: 1 PID: 11104 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 537.371315][T11105] net_ratelimit: 15 callbacks suppressed 13:17:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x6000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 537.371320][T11105] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 537.378236][T11104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 537.378242][T11104] Call Trace: [ 537.378263][T11104] dump_stack+0x1d8/0x2f8 [ 537.378278][T11104] should_fail+0x555/0x770 [ 537.378293][T11104] __should_failslab+0x11a/0x160 [ 537.412624][T11104] ? tomoyo_encode2+0x273/0x5a0 [ 537.421334][T11104] should_failslab+0x9/0x20 [ 537.421346][T11104] __kmalloc+0x7a/0x340 [ 537.421357][T11104] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 537.421366][T11104] tomoyo_encode2+0x273/0x5a0 [ 537.421376][T11104] ? dynamic_dname+0xf0/0xf0 [ 537.421385][T11104] tomoyo_realpath_from_path+0x769/0x7c0 [ 537.421398][T11104] tomoyo_path_perm+0x192/0x850 [ 537.421409][T11104] ? trace_lock_release+0x135/0x1a0 [ 537.421429][T11104] tomoyo_path_truncate+0x1c/0x20 [ 537.473077][T11117] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 537.475818][T11104] security_path_truncate+0xd5/0x150 13:17:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x6558, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xf00, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 537.475829][T11104] do_sys_ftruncate+0x493/0x710 [ 537.475841][T11104] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 537.475851][T11104] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 537.475863][T11104] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 537.487009][T11117] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 537.489420][T11104] ? trace_hardirqs_off_caller+0x58/0x80 [ 537.489431][T11104] ? do_syscall_64+0x1d/0x140 13:17:31 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x4, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:31 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x5, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 537.489443][T11104] __x64_sys_ftruncate+0x60/0x70 [ 537.489452][T11104] do_syscall_64+0xfe/0x140 [ 537.489465][T11104] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 537.489479][T11104] RIP: 0033:0x459847 [ 537.541500][T11104] Code: 24 29 d7 48 69 ff e8 03 00 00 48 89 7c 24 08 48 89 e7 e8 dc e4 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 b8 4d 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 537.541504][T11104] RSP: 002b:00007f0134a31a88 EFLAGS: 00000217 ORIG_RAX: 000000000000004d 13:17:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b97000)={0xa, &(0x7f0000002200)=[{0x1, 0x2, 0x4, 0x8}, {0xec, 0x31, 0xc6b, 0x401}, {0xfff, 0x40, 0xfce7, 0x7fff}, {0x5, 0x80000001, 0x1880f1b0, 0x7fff}, {0x9, 0x1200, 0x8, 0x8000}, {0xb5, 0xbce, 0xe34, 0xf7fd}, {0x1, 0x40, 0x43, 0x4}, {0x2, 0xfd6, 0x4, 0x3}, {0x3, 0x438f, 0x40, 0x5}, {0x7, 0x0, 0x5, 0x80000001}]}, 0x10) r3 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x2, 0x4100) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b97000)={0x1, &(0x7f000048fff0)=[{0x6}]}, 0x10) getsockopt$sock_buf(r4, 0x1, 0x1a, 0x0, &(0x7f0000000000)) sendfile(r3, r4, &(0x7f0000002180), 0x4) getsockopt$sock_buf(r2, 0x1, 0x1a, 0x0, &(0x7f0000000000)) ioctl$int_in(r2, 0x5452, &(0x7f0000000100)=0x4) utime(&(0x7f00000021c0)='./file0\x00', &(0x7f0000000140)={0x3, 0x4cc}) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000001180)=""/4096) [ 537.541512][T11104] RAX: ffffffffffffffda RBX: 0000000020000040 RCX: 0000000000459847 [ 537.541516][T11104] RDX: 0000000020000068 RSI: 0000000000020000 RDI: 0000000000000005 [ 537.541521][T11104] RBP: 000000000075bf20 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 537.541525][T11104] R10: 0000000000010000 R11: 0000000000000217 R12: 0000000000000005 [ 537.541529][T11104] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 537.578755][T11121] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 537.658774][T11121] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 537.683230][T11104] ERROR: Out of memory at tomoyo_realpath_from_path. [ 537.694037][T11131] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 537.706781][T11131] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:17:32 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {0x0}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:32 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x6, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x6800, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x1100, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) close(r0) 13:17:32 executing program 5 (fault-call:1 fault-nth:9): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 538.188755][T11149] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 538.208150][T11151] FAULT_INJECTION: forcing a failure. [ 538.208150][T11151] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 538.212372][T11149] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 538.228171][T11151] CPU: 0 PID: 11151 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 538.244532][T11151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 538.254586][T11151] Call Trace: [ 538.254603][T11151] dump_stack+0x1d8/0x2f8 [ 538.254616][T11151] should_fail+0x555/0x770 [ 538.254629][T11151] should_fail_alloc_page+0x55/0x60 [ 538.254638][T11151] prepare_alloc_pages+0x283/0x470 [ 538.254647][T11151] __alloc_pages_nodemask+0xb2/0x5d0 [ 538.254656][T11151] ? percpu_counter_add_batch+0x153/0x170 13:17:32 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x8, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x6c00, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 538.254668][T11151] alloc_pages_vma+0x4e7/0x8b0 [ 538.254683][T11151] shmem_alloc_and_acct_page+0x429/0xbb0 [ 538.262295][T11151] shmem_getpage_gfp+0x1270/0x2c00 [ 538.262321][T11151] shmem_write_begin+0xcb/0x1b0 [ 538.280331][T11150] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 538.282417][T11151] generic_perform_write+0x25d/0x4e0 [ 538.282434][T11151] __generic_file_write_iter+0x24b/0x520 [ 538.282446][T11151] generic_file_write_iter+0x445/0x5d0 [ 538.282462][T11151] __vfs_write+0x5a1/0x740 13:17:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x1200, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 538.288657][T11150] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 538.292967][T11151] vfs_write+0x275/0x590 [ 538.292978][T11151] __x64_sys_pwrite64+0x162/0x1d0 [ 538.292990][T11151] do_syscall_64+0xfe/0x140 [ 538.293003][T11151] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 538.293011][T11151] RIP: 0033:0x4137c7 13:17:32 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x67, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 538.293021][T11151] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 538.293025][T11151] RSP: 002b:00007f0134a31a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 538.293033][T11151] RAX: ffffffffffffffda RBX: 0000000020000050 RCX: 00000000004137c7 [ 538.293044][T11151] RDX: 0000000000000048 RSI: 0000000020000140 RDI: 0000000000000005 [ 538.352889][T11151] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 538.352894][T11151] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000005 13:17:32 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1611320}, 0xc, &(0x7f0000000100)={&(0x7f0000001180)=ANY=[@ANYBLOB="1c010000", @ANYRES16=r1, @ANYBLOB="00022cbd7000ffdbdf250c00000014000200080006000900000008000700070000003c00030014000200697036746e6c3000000000ee000000001400020076657468315f746f5f68737200000000080003000200000008000100010000003000010008000800ff7fffff08000b0073697000080004004e20000014000300e0000001000000000000007f0000010000000000000000000000000c0007000800000016000000080009002d000000080004004e2000000800090045000000080005000400000014000300ff0100000000000008000500010000000c0007002000000001000000140001000800080007000000080001000200"/262], 0x11c}, 0x1, 0x0, 0x0, 0x20004000}, 0x4000) read$alg(r0, &(0x7f0000000180)=""/4096, 0x1000) 13:17:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x7400, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 538.352898][T11151] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 538.370236][T11160] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 538.403713][T11160] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 538.474175][T11164] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 538.525246][T11164] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 538.563773][T11177] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 538.576538][T11177] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:17:32 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {0x0}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x400000, 0x0) ioctl$VIDIOC_OVERLAY(r2, 0x4004560e, &(0x7f00000000c0)=0x9) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000b97000)={0x1, &(0x7f000048fff0)=[{0x6}]}, 0x10) getsockopt$sock_buf(r5, 0x1, 0x1a, 0x0, &(0x7f0000000000)) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000001240)=0x40) close(r4) bind$inet(r4, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r3, 0x0, r4, 0x0, 0x10005, 0x0) setsockopt$inet_dccp_int(r3, 0x21, 0xa, &(0x7f0000000140)=0x8d95, 0x4) r6 = openat$cgroup_ro(r3, &(0x7f0000000100)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r6, 0x408c5333, &(0x7f0000001180)={0x1, 0x80000001, 0x0, 'queue0\x00', 0x9}) 13:17:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x2000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:32 executing program 5 (fault-call:1 fault-nth:10): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x7a00, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:32 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x2, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 539.055510][T11190] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 539.071446][T11195] FAULT_INJECTION: forcing a failure. [ 539.071446][T11195] name failslab, interval 1, probability 0, space 0, times 0 [ 539.084170][T11195] CPU: 0 PID: 11195 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 13:17:33 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x3, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 539.089427][T11190] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 539.092055][T11195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 539.092058][T11195] Call Trace: [ 539.092078][T11195] dump_stack+0x1d8/0x2f8 [ 539.092091][T11195] should_fail+0x555/0x770 [ 539.092103][T11195] __should_failslab+0x11a/0x160 [ 539.092112][T11195] ? xas_create+0x1197/0x1910 [ 539.092121][T11195] should_failslab+0x9/0x20 [ 539.092136][T11195] kmem_cache_alloc+0x56/0x2e0 [ 539.120557][T11195] xas_create+0x1197/0x1910 13:17:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x8100, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 539.134221][T11195] xas_create_range+0x142/0x700 [ 539.134240][T11195] shmem_add_to_page_cache+0x8e1/0x1230 [ 539.134257][T11195] shmem_getpage_gfp+0x184b/0x2c00 [ 539.134277][T11195] shmem_write_begin+0xcb/0x1b0 [ 539.172962][T11195] generic_perform_write+0x25d/0x4e0 [ 539.178242][T11195] __generic_file_write_iter+0x24b/0x520 [ 539.183866][T11195] generic_file_write_iter+0x445/0x5d0 [ 539.189319][T11195] __vfs_write+0x5a1/0x740 [ 539.193721][T11195] vfs_write+0x275/0x590 [ 539.198046][T11195] __x64_sys_pwrite64+0x162/0x1d0 [ 539.203065][T11195] do_syscall_64+0xfe/0x140 [ 539.207573][T11195] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 539.213460][T11195] RIP: 0033:0x4137c7 [ 539.217331][T11195] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 a1 18 00 00 c3 48 83 ec 08 e8 a7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 ed f9 ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 539.236914][T11195] RSP: 002b:00007f0134a31a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000012 [ 539.245305][T11195] RAX: ffffffffffffffda RBX: 0000000020000050 RCX: 00000000004137c7 13:17:33 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x7, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x2500, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 539.253273][T11195] RDX: 0000000000000048 RSI: 0000000020000140 RDI: 0000000000000005 [ 539.261221][T11195] RBP: 0000000000000000 R08: fe03f80fe03f80ff R09: 00000000fbad8001 [ 539.269170][T11195] R10: 0000000000010000 R11: 0000000000000293 R12: 0000000000000005 [ 539.277121][T11195] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:17:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r3, 0x0, 0x10005, 0x0) setsockopt$inet_dccp_int(r2, 0x21, 0xa, &(0x7f0000000140)=0x8d95, 0x4) ioctl$VFIO_CHECK_EXTENSION(r2, 0x3b65, 0x3) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) 13:17:33 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x4, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x3f00, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x8847, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:33 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x5, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:33 executing program 5 (fault-call:1 fault-nth:11): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") pipe(&(0x7f0000000240)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) bind$inet(r4, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r3, 0x0, r4, 0x0, 0x10005, 0x0) setsockopt$inet_dccp_int(r3, 0x21, 0xa, &(0x7f0000000140)=0x8d95, 0x4) ioctl$TIOCLINUX2(r3, 0x541c, &(0x7f0000001280)={0x2, 0xffff, 0x1f, 0x100000001, 0xf51, 0x5}) close(r2) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r6 = socket$inet_udp(0x2, 0x2, 0x0) close(r6) bind$inet(r6, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r6, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) getsockname$ax25(0xffffffffffffffff, &(0x7f00000011c0)={{0x3, @netrom}, [@netrom, @remote, @remote, @remote, @remote, @default, @default, @rose]}, &(0x7f0000001240)=0x48) splice(r5, 0x0, r6, 0x0, 0x10005, 0x0) setsockopt$inet_dccp_int(r5, 0x21, 0xa, &(0x7f0000000140)=0x8d95, 0x4) ioctl$UI_END_FF_UPLOAD(r5, 0x406855c9, &(0x7f00000000c0)={0x10, 0xffffffff7fffffff, {0x0, 0x42, 0xff, {0x0, 0x7}, {0x6}, @ramp={0x10000, 0x5, {0x608169b9, 0x2be, 0xf3, 0x5bf0}}}, {0x52, 0x4, 0x1, {0x7, 0x4}, {0x1, 0x684cf616}, @const={0xa02d, {0x1b08d53, 0x10000000000009, 0xfffffffffffffffc, 0xa0}}}}) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @rand_addr=0x4}, 0x11a) splice(r1, 0x0, r2, 0x0, 0x10005, 0x0) setsockopt$inet_dccp_int(r1, 0x21, 0xa, &(0x7f0000000140)=0x8d95, 0x4) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000080)={0x41b9eaf5, 0x7, 0xd1, 0xff7, 0x2}) r7 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r8 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r8, &(0x7f0000000340)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a) ioctl$SIOCX25GFACILITIES(r7, 0x89e2, &(0x7f0000000000)) ioctl$LOOP_CHANGE_FD(r7, 0x4c00, r8) sendfile(r7, r8, 0x0, 0x20000102000007) ioctl$BLKIOOPT(r7, 0x1279, &(0x7f0000001180)) unshare(0x24020400) r9 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r9, &(0x7f0000000180)=""/4096, 0x1000) 13:17:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x4000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:33 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x6, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x8848, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 539.714576][T11253] FAULT_INJECTION: forcing a failure. [ 539.714576][T11253] name failslab, interval 1, probability 0, space 0, times 0 [ 539.730967][T11253] CPU: 1 PID: 11253 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 539.739199][T11253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 539.750645][T11253] Call Trace: [ 539.753944][T11253] dump_stack+0x1d8/0x2f8 [ 539.758398][T11253] should_fail+0x555/0x770 [ 539.762947][T11253] __should_failslab+0x11a/0x160 [ 539.767872][T11253] ? getname_flags+0xba/0x640 [ 539.772550][T11253] should_failslab+0x9/0x20 [ 539.777037][T11253] kmem_cache_alloc+0x56/0x2e0 [ 539.781785][T11253] getname_flags+0xba/0x640 [ 539.786271][T11253] getname+0x19/0x20 [ 539.790145][T11253] do_sys_open+0x261/0x560 [ 539.794540][T11253] __x64_sys_open+0x87/0x90 [ 539.799038][T11253] do_syscall_64+0xfe/0x140 [ 539.803524][T11253] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 539.809408][T11253] RIP: 0033:0x413761 [ 539.813284][T11253] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 539.832865][T11253] RSP: 002b:00007f0134a31a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 539.841261][T11253] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413761 [ 539.849210][T11253] RDX: 00007f0134a31b0a RSI: 0000000000000002 RDI: 00007f0134a31b00 [ 539.857170][T11253] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 539.865125][T11253] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 539.873087][T11253] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:17:34 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x7, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x4788, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:34 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x7, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:34 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x34000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:34 executing program 5 (fault-call:1 fault-nth:12): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000080)={0x2, 0xbdd2, 0x5d1, 0x1, 0x9, 0x3}) 13:17:34 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x8, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x4800, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:34 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x400300, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 540.207407][T11270] FAULT_INJECTION: forcing a failure. [ 540.207407][T11270] name failslab, interval 1, probability 0, space 0, times 0 13:17:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$ppp(0xffffffffffffff9c, &(0x7f0000001340)='/dev/ppp\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x401, 0x0, @mcast2, 0x83}, 0x1c) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11fca5055e7bf070c691220057e3f1f37a9e7d89db972b1f7e4b661ea8f65dbbb4bef71bfa7c64dc8950992d754b91d9514a211aa767d1") unshare(0x24020400) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x290c, 0x54002) socket$rxrpc(0x21, 0x2, 0x5) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b97000)={0x1, &(0x7f000048fff0)=[{0x6}]}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x1a, 0x0, &(0x7f0000000000)) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f0000001240)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b97000)={0x1, &(0x7f000048fff0)=[{0x6}]}, 0x10) getsockopt$sock_buf(r3, 0x1, 0x1a, 0x0, &(0x7f0000000000)) setsockopt$inet_mreq(r3, 0x0, 0x23, &(0x7f0000001380)={@loopback, @empty}, 0x8) sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f00000011c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0x113, &(0x7f0000001180)={&(0x7f0000001200)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16, @ANYBLOB="00022dbd7000fedbdf2508000000c7fdf100fffffdff1c00030008000300040000000800040002000000ddfe0300030600000000000000cd0000"], 0x40}, 0x1, 0x0, 0x0, 0x7ac439144091b528}, 0x8010) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r4, &(0x7f0000000180)=""/4096, 0x1000) [ 540.306537][T11270] CPU: 1 PID: 11270 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 540.314465][T11270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 540.324525][T11270] Call Trace: [ 540.327821][T11270] dump_stack+0x1d8/0x2f8 [ 540.332163][T11270] should_fail+0x555/0x770 [ 540.336592][T11270] __should_failslab+0x11a/0x160 [ 540.341540][T11270] ? __alloc_file+0x2c/0x390 [ 540.346130][T11270] should_failslab+0x9/0x20 [ 540.350636][T11270] kmem_cache_alloc+0x56/0x2e0 [ 540.355391][T11270] __alloc_file+0x2c/0x390 [ 540.359792][T11270] alloc_empty_file+0xac/0x1b0 [ 540.364530][T11270] path_openat+0x9e/0x4460 [ 540.368933][T11270] ? __kasan_kmalloc+0x178/0x1b0 [ 540.373847][T11270] ? __kasan_kmalloc+0x11c/0x1b0 [ 540.378760][T11270] ? kasan_slab_alloc+0xf/0x20 [ 540.383499][T11270] ? kmem_cache_alloc+0x1f5/0x2e0 [ 540.388505][T11270] ? getname+0x19/0x20 [ 540.392549][T11270] ? do_sys_open+0x261/0x560 [ 540.397132][T11270] ? do_syscall_64+0xfe/0x140 [ 540.401791][T11270] ? psi_memstall_leave+0x10a/0x130 [ 540.407103][T11270] ? trace_lock_release+0x135/0x1a0 [ 540.413343][T11270] ? psi_memstall_leave+0x10a/0x130 [ 540.418532][T11270] ? _raw_spin_unlock_irq+0x27/0x80 [ 540.423713][T11270] ? trace_lock_release+0x135/0x1a0 [ 540.428919][T11270] ? __alloc_fd+0x58f/0x630 [ 540.433426][T11270] do_filp_open+0x192/0x3d0 [ 540.437921][T11270] ? _raw_spin_unlock+0x2c/0x50 [ 540.442761][T11270] do_sys_open+0x29f/0x560 [ 540.447161][T11270] __x64_sys_open+0x87/0x90 [ 540.451647][T11270] do_syscall_64+0xfe/0x140 [ 540.456144][T11270] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 540.462113][T11270] RIP: 0033:0x413761 [ 540.465992][T11270] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 540.485594][T11270] RSP: 002b:00007f0134a31a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 540.494008][T11270] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413761 13:17:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x4888, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 540.502643][T11270] RDX: 00007f0134a31b0a RSI: 0000000000000002 RDI: 00007f0134a31b00 [ 540.510597][T11270] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 540.518558][T11270] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 540.526512][T11270] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:17:34 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x9, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x4c00, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:34 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x1000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:34 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x7, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:34 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0xa, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:34 executing program 5 (fault-call:1 fault-nth:13): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b97000)={0x1, &(0x7f000048fff0)=[{0x6}]}, 0x10) getsockopt$sock_buf(r1, 0x1, 0x1a, 0x0, &(0x7f0000000000)) r2 = accept(r1, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="0d93ce6e", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000000)=@sack_info={r5, 0x0, 0xffff}, 0xc) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000140)={r5, 0x7}, &(0x7f0000001180)=0x8) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r6 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_ifreq(r6, 0x89f2, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r7, 0x84, 0x10, &(0x7f0000000000)=@sack_info={r9, 0x0, 0xffff}, 0xc) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000001240)={0x0, 0x5, 0x4, 0x4, 0x7f, 0x8, 0x89a, 0x5, {r9, @in={{0x2, 0x4e20, @multicast2}}, 0x8001, 0x2ee, 0x9, 0x4, 0x7}}, &(0x7f0000001300)=0xb0) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r6, 0x84, 0x72, &(0x7f0000001340)={r10, 0x9, 0x10}, 0xc) unshare(0x24020400) r11 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r11, 0x1, 0x1a, &(0x7f0000b97000)={0x3002ab0c7cce7392, &(0x7f000048fff0)=[{0x6}]}, 0x10) getsockopt$sock_buf(r11, 0x1, 0x1a, 0x0, &(0x7f0000000000)) connect(r11, &(0x7f00000011c0)=@pppoe={0x18, 0x0, {0x3, @empty, 'ifb0\x00'}}, 0x80) r12 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r12, &(0x7f0000000180)=""/4096, 0x1000) 13:17:35 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:35 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0xb, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 541.089076][T11312] FAULT_INJECTION: forcing a failure. [ 541.089076][T11312] name failslab, interval 1, probability 0, space 0, times 0 13:17:35 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0xc, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 541.145638][T11312] CPU: 0 PID: 11312 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 541.153559][T11312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 541.163642][T11312] Call Trace: [ 541.166949][T11312] dump_stack+0x1d8/0x2f8 [ 541.171286][T11312] should_fail+0x555/0x770 [ 541.175716][T11312] __should_failslab+0x11a/0x160 [ 541.180663][T11312] ? __alloc_file+0x2c/0x390 [ 541.185277][T11312] should_failslab+0x9/0x20 [ 541.189783][T11312] kmem_cache_alloc+0x56/0x2e0 13:17:35 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0xd, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 541.194568][T11312] __alloc_file+0x2c/0x390 [ 541.198992][T11312] alloc_empty_file+0xac/0x1b0 [ 541.203774][T11312] path_openat+0x9e/0x4460 [ 541.208200][T11312] ? __kasan_kmalloc+0x178/0x1b0 [ 541.213145][T11312] ? __kasan_kmalloc+0x11c/0x1b0 [ 541.218073][T11312] ? kasan_slab_alloc+0xf/0x20 [ 541.222836][T11312] ? kmem_cache_alloc+0x1f5/0x2e0 [ 541.222846][T11312] ? getname+0x19/0x20 [ 541.222852][T11312] ? do_sys_open+0x261/0x560 [ 541.222861][T11312] ? do_syscall_64+0xfe/0x140 13:17:35 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0xe, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:35 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x300, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 541.222873][T11312] ? trace_mm_page_alloc+0x17a/0x1f0 [ 541.222880][T11312] ? cache_grow_end+0x143/0x170 [ 541.222894][T11312] ? trace_lock_release+0x135/0x1a0 [ 541.256503][T11312] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 541.261973][T11312] ? cache_grow_end+0x143/0x170 [ 541.266827][T11312] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 541.272469][T11312] ? trace_hardirqs_on_caller+0x46/0x80 [ 541.278021][T11312] ? retint_kernel+0x2b/0x2b [ 541.282626][T11312] ? trace_lock_release+0x135/0x1a0 [ 541.287830][T11312] ? __alloc_fd+0x58f/0x630 [ 541.292349][T11312] do_filp_open+0x192/0x3d0 [ 541.296866][T11312] ? _raw_spin_unlock+0x2c/0x50 [ 541.301878][T11312] do_sys_open+0x29f/0x560 [ 541.306301][T11312] __x64_sys_open+0x87/0x90 [ 541.310904][T11312] do_syscall_64+0xfe/0x140 [ 541.315407][T11312] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 541.321281][T11312] RIP: 0033:0x413761 [ 541.325162][T11312] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 13:17:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x5865, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 541.344745][T11312] RSP: 002b:00007f0134a31a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 541.353150][T11312] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413761 [ 541.361117][T11312] RDX: 00007f0134a31b0a RSI: 0000000000000002 RDI: 00007f0134a31b00 [ 541.369071][T11312] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 541.377051][T11312] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 541.385027][T11312] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:17:35 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {0x0}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:35 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x2, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:35 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x3000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0x7) 13:17:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x6000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:35 executing program 5 (fault-call:1 fault-nth:14): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:35 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x3, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:35 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x4000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x630d, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, r2, 0x0, 0x10005, 0x0) setsockopt$inet_dccp_int(r1, 0x21, 0xa, &(0x7f0000000140)=0x8d95, 0x4) connect$bt_rfcomm(r1, &(0x7f0000000080)={0x1f, {0x1, 0x2, 0x100, 0x4, 0x7, 0xb10}, 0x758f}, 0xa) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r3 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_ifreq(r3, 0x89f2, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) setsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) accept$inet(r4, &(0x7f00000000c0)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10) unshare(0x24020400) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r5, &(0x7f0000000180)=""/4096, 0x1000) [ 541.987811][T11348] FAULT_INJECTION: forcing a failure. [ 541.987811][T11348] name failslab, interval 1, probability 0, space 0, times 0 13:17:35 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x4, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 542.047740][T11348] CPU: 0 PID: 11348 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 542.055678][T11348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 542.065825][T11348] Call Trace: [ 542.069118][T11348] dump_stack+0x1d8/0x2f8 [ 542.073456][T11348] should_fail+0x555/0x770 [ 542.077940][T11348] __should_failslab+0x11a/0x160 [ 542.082910][T11348] ? tomoyo_encode2+0x273/0x5a0 [ 542.082921][T11348] should_failslab+0x9/0x20 [ 542.082930][T11348] __kmalloc+0x7a/0x340 13:17:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x5000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 542.082940][T11348] tomoyo_encode2+0x273/0x5a0 [ 542.082951][T11348] tomoyo_realpath_from_path+0x769/0x7c0 [ 542.082964][T11348] tomoyo_check_open_permission+0x1ce/0x9d0 [ 542.082987][T11348] tomoyo_file_open+0x141/0x190 [ 542.082997][T11348] security_file_open+0x65/0x2f0 [ 542.083010][T11348] do_dentry_open+0x34e/0xf90 [ 542.092343][T11348] vfs_open+0x73/0x80 [ 542.092352][T11348] path_openat+0x1397/0x4460 [ 542.092365][T11348] ? getname+0x19/0x20 [ 542.092380][T11348] ? check_preemption_disabled+0x3a/0x2a0 [ 542.092400][T11348] ? trace_lock_release+0x135/0x1a0 [ 542.122478][T11348] ? __alloc_fd+0x58f/0x630 [ 542.122489][T11348] do_filp_open+0x192/0x3d0 [ 542.122507][T11348] do_sys_open+0x29f/0x560 [ 542.122523][T11348] __x64_sys_open+0x87/0x90 [ 542.122534][T11348] do_syscall_64+0xfe/0x140 [ 542.122546][T11348] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 542.122555][T11348] RIP: 0033:0x413761 [ 542.122567][T11348] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 542.145535][T11348] RSP: 002b:00007f0134a31a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 542.145545][T11348] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413761 [ 542.145549][T11348] RDX: 00007f0134a31b0a RSI: 0000000000000002 RDI: 00007f0134a31b00 [ 542.145559][T11348] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 542.226805][T11348] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 542.242730][T11348] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 542.265890][T11348] ERROR: Out of memory at tomoyo_realpath_from_path. 13:17:36 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {0x0}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:36 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x5, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x6000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x6558, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, &(0x7f0000000080)={0x0, 0x1, 0x0, 0x1, 0x2, "25d987cc478bd12792936a6c6d115115df7857", 0x3f, 0x2}) unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) 13:17:36 executing program 5 (fault-call:1 fault-nth:15): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 542.787011][T11390] validate_nla: 22 callbacks suppressed [ 542.787019][T11390] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 542.794623][T11393] FAULT_INJECTION: forcing a failure. [ 542.794623][T11393] name failslab, interval 1, probability 0, space 0, times 0 [ 542.827492][T11390] net_ratelimit: 22 callbacks suppressed [ 542.827498][T11390] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 542.836428][T11393] CPU: 1 PID: 11393 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 542.854564][T11385] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 542.859803][T11393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 542.859808][T11393] Call Trace: [ 542.859837][T11393] dump_stack+0x1d8/0x2f8 [ 542.859850][T11393] should_fail+0x555/0x770 [ 542.859868][T11393] __should_failslab+0x11a/0x160 [ 542.868749][T11385] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 542.878073][T11393] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 542.878084][T11393] should_failslab+0x9/0x20 [ 542.878093][T11393] __kmalloc+0x7a/0x340 [ 542.878101][T11393] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 542.878110][T11393] tomoyo_realpath_from_path+0xdc/0x7c0 [ 542.878122][T11393] tomoyo_check_open_permission+0x1ce/0x9d0 [ 542.878143][T11393] tomoyo_file_open+0x141/0x190 [ 542.878158][T11393] security_file_open+0x65/0x2f0 [ 542.951524][T11393] do_dentry_open+0x34e/0xf90 [ 542.956193][T11393] vfs_open+0x73/0x80 [ 542.960516][T11393] path_openat+0x1397/0x4460 [ 542.965114][T11393] ? getname+0x19/0x20 [ 542.969218][T11393] ? cache_grow_end+0x143/0x170 [ 542.974135][T11393] ? trace_lock_release+0x135/0x1a0 [ 542.979333][T11393] ? __alloc_fd+0x58f/0x630 [ 542.983830][T11393] do_filp_open+0x192/0x3d0 [ 542.988328][T11393] do_sys_open+0x29f/0x560 [ 542.992727][T11393] __x64_sys_open+0x87/0x90 [ 542.997211][T11393] do_syscall_64+0xfe/0x140 [ 543.001698][T11393] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 543.007565][T11393] RIP: 0033:0x413761 [ 543.011439][T11393] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 0a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 543.031031][T11393] RSP: 002b:00007f0134a31a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 543.039429][T11393] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000413761 [ 543.047390][T11393] RDX: 00007f0134a31b0a RSI: 0000000000000002 RDI: 00007f0134a31b00 [ 543.055346][T11393] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 543.063313][T11393] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 543.071266][T11393] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:17:37 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x6, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x7000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x6800, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 543.088352][T11393] ERROR: Out of memory at tomoyo_realpath_from_path. 13:17:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, r2, 0x0, 0x10005, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b97000)={0x1, &(0x7f000048fff0)=[{0x6}]}, 0x10) getsockopt$sock_buf(r3, 0x1, 0x1a, 0x0, &(0x7f0000000000)) getsockopt$EBT_SO_GET_INIT_INFO(r3, 0x0, 0x82, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000180)=0x78) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000001c0)="e8", 0x1) setsockopt$inet_dccp_int(r1, 0x21, 0xa, &(0x7f0000000140)=0x8d95, 0x4) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x100, 0x0) read$alg(r4, &(0x7f0000002180)=""/4096, 0xfffffffeffffffff) 13:17:37 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x7, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 543.153491][T11406] netlink: 'syz-executor.1': attribute type 33 has an invalid length. 13:17:37 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x8, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 543.223704][T11406] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 543.240867][T11408] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 543.253544][T11408] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:17:37 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {0x0}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x6c00, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:37 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x9, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x8000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = dup2(0xffffffffffffffff, r0) setsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f0000000080), 0x4) unshare(0x24020400) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r2, &(0x7f0000000180)=""/4096, 0x1000) 13:17:37 executing program 5 (fault-call:1 fault-nth:16): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:37 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0xa, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 543.642820][T11429] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 543.655315][T11429] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 543.692808][T11437] FAULT_INJECTION: forcing a failure. [ 543.692808][T11437] name failslab, interval 1, probability 0, space 0, times 0 [ 543.698480][T11435] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 543.724028][T11437] CPU: 0 PID: 11437 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 543.731965][T11437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 543.732297][T11435] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 543.742018][T11437] Call Trace: [ 543.742044][T11437] dump_stack+0x1d8/0x2f8 [ 543.742063][T11437] should_fail+0x555/0x770 [ 543.742076][T11437] __should_failslab+0x11a/0x160 [ 543.742086][T11437] ? tomoyo_encode2+0x273/0x5a0 [ 543.742096][T11437] should_failslab+0x9/0x20 [ 543.742106][T11437] __kmalloc+0x7a/0x340 [ 543.742120][T11437] tomoyo_encode2+0x273/0x5a0 [ 543.792658][T11437] tomoyo_realpath_from_path+0x769/0x7c0 [ 543.798283][T11437] tomoyo_path_number_perm+0x166/0x640 [ 543.803724][T11437] ? trace_hardirqs_on_caller+0x74/0x80 [ 543.809253][T11437] ? smack_file_ioctl+0x226/0x2e0 [ 543.814292][T11437] ? __fget+0x431/0x510 [ 543.818431][T11437] tomoyo_file_ioctl+0x23/0x30 [ 543.823176][T11437] security_file_ioctl+0x6d/0xd0 [ 543.828096][T11437] __x64_sys_ioctl+0xa3/0x120 [ 543.832749][T11437] do_syscall_64+0xfe/0x140 [ 543.837360][T11437] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 543.843269][T11437] RIP: 0033:0x4596e7 [ 543.847144][T11437] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 543.866735][T11437] RSP: 002b:00007f0134a31a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 543.875140][T11437] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004596e7 [ 543.883403][T11437] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 13:17:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x8000, 0x0) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @empty}, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, r3}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000200)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r3}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000001180)={0x15, 0x110, 0xfa00, {r4, 0x4, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x24}}}}, 0x118) unshare(0x24020400) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r5, &(0x7f0000000180)=""/4096, 0x1000) 13:17:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x7400, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:37 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0xb, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 543.891380][T11437] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 543.899339][T11437] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 543.907419][T11437] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 543.916965][T11437] ERROR: Out of memory at tomoyo_realpath_from_path. 13:17:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x9000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:37 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0xc, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 543.977744][T11454] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 544.011452][T11454] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 544.029853][T11460] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 544.038728][T11460] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:17:38 executing program 5 (fault-call:1 fault-nth:17): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x7a00, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xa000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:38 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0xd, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:38 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x7, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f2, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) r2 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_ifreq(r2, 0x89f2, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x10100, 0x0) ioctl$TIOCMBIC(r4, 0x5417, &(0x7f0000001180)=0x400) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000000)=@sack_info={r6, 0x0, 0xffff}, 0xc) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000080)={r6, 0x3}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000100)={r7, 0xa399}, 0x8) r8 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r8, &(0x7f0000000180)=""/4096, 0x1000) ioctl$RTC_UIE_OFF(r8, 0x7004) 13:17:38 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0xe, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 544.513936][T11480] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 544.523363][T11480] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 544.536127][T11484] FAULT_INJECTION: forcing a failure. [ 544.536127][T11484] name failslab, interval 1, probability 0, space 0, times 0 [ 544.563582][T11484] CPU: 0 PID: 11484 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 544.566117][T11486] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 544.571508][T11484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 544.571513][T11484] Call Trace: [ 544.571531][T11484] dump_stack+0x1d8/0x2f8 [ 544.571545][T11484] should_fail+0x555/0x770 [ 544.571558][T11484] __should_failslab+0x11a/0x160 [ 544.571568][T11484] ? tomoyo_encode2+0x273/0x5a0 [ 544.571580][T11484] should_failslab+0x9/0x20 [ 544.571590][T11484] __kmalloc+0x7a/0x340 [ 544.571601][T11484] tomoyo_encode2+0x273/0x5a0 [ 544.571612][T11484] tomoyo_realpath_from_path+0x769/0x7c0 [ 544.571625][T11484] tomoyo_path_number_perm+0x166/0x640 [ 544.584379][T11486] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 544.589822][T11484] ? trace_hardirqs_on_caller+0x74/0x80 [ 544.589843][T11484] ? smack_file_ioctl+0x226/0x2e0 [ 544.589851][T11484] ? __fget+0x431/0x510 [ 544.589867][T11484] tomoyo_file_ioctl+0x23/0x30 [ 544.635943][T11484] security_file_ioctl+0x6d/0xd0 [ 544.670463][T11484] __x64_sys_ioctl+0xa3/0x120 [ 544.670479][T11484] do_syscall_64+0xfe/0x140 [ 544.684566][T11484] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 544.690454][T11484] RIP: 0033:0x4596e7 [ 544.694363][T11484] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:17:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xb000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xc000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xd000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x8100, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000001380)=ANY=[@ANYBLOB="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"]) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x400000, 0x0) [ 544.713968][T11484] RSP: 002b:00007f0134a31a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 544.722389][T11484] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004596e7 [ 544.730365][T11484] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 544.738343][T11484] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 544.746321][T11484] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 544.754397][T11484] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 544.774288][T11484] ERROR: Out of memory at tomoyo_realpath_from_path. 13:17:38 executing program 5 (fault-call:1 fault-nth:18): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:38 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x10, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xe000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b97000)={0x1, &(0x7f000048fff0)=[{0x6}]}, 0x10) getsockopt$sock_buf(r1, 0x1, 0x1a, 0x0, &(0x7f0000000000)) lseek(r1, 0x0, 0x0) unshare(0x24020400) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r2, &(0x7f0000000180)=""/4096, 0x1000) [ 545.034104][T11525] FAULT_INJECTION: forcing a failure. [ 545.034104][T11525] name failslab, interval 1, probability 0, space 0, times 0 [ 545.057293][T11525] CPU: 0 PID: 11525 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 545.065215][T11525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 545.075257][T11525] Call Trace: [ 545.078535][T11525] dump_stack+0x1d8/0x2f8 [ 545.082848][T11525] should_fail+0x555/0x770 [ 545.087246][T11525] __should_failslab+0x11a/0x160 [ 545.092166][T11525] ? tomoyo_encode2+0x273/0x5a0 [ 545.096996][T11525] should_failslab+0x9/0x20 [ 545.101477][T11525] __kmalloc+0x7a/0x340 [ 545.105612][T11525] tomoyo_encode2+0x273/0x5a0 [ 545.110277][T11525] tomoyo_realpath_from_path+0x769/0x7c0 [ 545.115887][T11525] tomoyo_path_number_perm+0x166/0x640 [ 545.121320][T11525] ? trace_hardirqs_on_caller+0x74/0x80 [ 545.126850][T11525] ? retint_kernel+0x2b/0x2b [ 545.131417][T11525] ? security_file_ioctl+0x79/0xd0 [ 545.136504][T11525] tomoyo_file_ioctl+0x23/0x30 [ 545.141246][T11525] security_file_ioctl+0x6d/0xd0 [ 545.146160][T11525] __x64_sys_ioctl+0xa3/0x120 [ 545.150813][T11525] do_syscall_64+0xfe/0x140 [ 545.155296][T11525] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 545.161173][T11525] RIP: 0033:0x4596e7 [ 545.165053][T11525] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 545.184636][T11525] RSP: 002b:00007f0134a31a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 545.193035][T11525] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004596e7 [ 545.200995][T11525] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 545.208944][T11525] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 545.216895][T11525] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 545.224843][T11525] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 545.234446][T11525] ERROR: Out of memory at tomoyo_realpath_from_path. 13:17:39 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x7, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x8847, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:39 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x11, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xf000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000080)={'yam0\x00', {0x2, 0x4e23, @multicast1}}) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) 13:17:39 executing program 5 (fault-call:1 fault-nth:19): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x8848, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 545.376987][T11547] FAULT_INJECTION: forcing a failure. [ 545.376987][T11547] name failslab, interval 1, probability 0, space 0, times 0 [ 545.389820][T11547] CPU: 1 PID: 11547 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 545.397718][T11547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 545.407776][T11547] Call Trace: [ 545.411075][T11547] dump_stack+0x1d8/0x2f8 [ 545.415420][T11547] should_fail+0x555/0x770 [ 545.419839][T11547] __should_failslab+0x11a/0x160 [ 545.424771][T11547] ? radix_tree_node_alloc+0x1a1/0x370 [ 545.430232][T11547] should_failslab+0x9/0x20 [ 545.435005][T11547] kmem_cache_alloc+0x56/0x2e0 [ 545.439745][T11547] ? rcu_lock_release+0x4/0x20 [ 545.444499][T11547] radix_tree_node_alloc+0x1a1/0x370 [ 545.449767][T11547] ? __cgroup_account_cputime+0x335/0x350 [ 545.455487][T11547] idr_get_free+0x2b8/0x890 [ 545.459979][T11547] idr_alloc_cyclic+0x18b/0x550 [ 545.464879][T11547] __kernfs_new_node+0x124/0x6b0 [ 545.469801][T11547] ? _raw_spin_unlock_irq+0x69/0x80 [ 545.474976][T11547] ? __schedule+0x998/0xc50 [ 545.479574][T11547] kernfs_new_node+0x97/0x180 [ 545.484243][T11547] kernfs_create_dir_ns+0x44/0x130 [ 545.489360][T11547] internal_create_group+0x207/0xd90 [ 545.494732][T11547] sysfs_create_group+0x1f/0x30 [ 545.499702][T11547] loop_set_fd+0xcb2/0x1180 [ 545.504202][T11547] lo_ioctl+0xd5/0x2200 [ 545.508347][T11547] ? __kasan_slab_free+0x12a/0x1e0 [ 545.513442][T11547] ? kasan_slab_free+0xe/0x10 [ 545.518101][T11547] ? kfree+0x115/0x200 [ 545.525906][T11547] ? tomoyo_path_number_perm+0x4e1/0x640 [ 545.531516][T11547] ? tomoyo_file_ioctl+0x23/0x30 [ 545.536436][T11547] ? security_file_ioctl+0x6d/0xd0 [ 545.541533][T11547] ? __x64_sys_ioctl+0xa3/0x120 [ 545.546360][T11547] ? do_syscall_64+0xfe/0x140 [ 545.551078][T11547] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 545.557127][T11547] ? debug_check_no_obj_freed+0x505/0x5b0 [ 545.562838][T11547] ? trace_lock_release+0x135/0x1a0 [ 545.568014][T11547] ? debug_check_no_obj_freed+0x505/0x5b0 [ 545.573720][T11547] ? rcu_lock_release+0x9/0x30 [ 545.578462][T11547] ? trace_lock_release+0x135/0x1a0 [ 545.583634][T11547] ? rcu_lock_release+0x9/0x30 [ 545.588372][T11547] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 545.593978][T11547] ? lo_release+0x1f0/0x1f0 [ 545.598465][T11547] blkdev_ioctl+0x807/0x2990 [ 545.603035][T11547] ? tomoyo_path_number_perm+0x53e/0x640 [ 545.608652][T11547] block_ioctl+0xbd/0x100 [ 545.612973][T11547] ? blkdev_iopoll+0x100/0x100 [ 545.617730][T11547] do_vfs_ioctl+0x744/0x1730 [ 545.622328][T11547] ? __fget+0x431/0x510 [ 545.626484][T11547] ? tomoyo_file_ioctl+0x23/0x30 [ 545.631411][T11547] ? security_file_ioctl+0xa1/0xd0 [ 545.636500][T11547] __x64_sys_ioctl+0xe3/0x120 [ 545.641159][T11547] do_syscall_64+0xfe/0x140 [ 545.645727][T11547] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 545.651596][T11547] RIP: 0033:0x4596e7 [ 545.655478][T11547] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:17:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x10000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:39 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x12, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b97000)={0x1, &(0x7f000048fff0)=[{0x6}]}, 0x10) getsockopt$sock_buf(r1, 0x1, 0x1a, 0x0, &(0x7f0000000000)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001180)={{{@in6=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udp(0x2, 0x2, 0x0) fstat(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresgid(r5, 0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000240)='jfs\x00', &(0x7f0000000280)='./file0\x00', 0x8ae, 0x0, &(0x7f00000003c0), 0x802, &(0x7f0000000540)={[{@errors_continue='errors=continue'}, {@quota='quota'}, {@gid={'gid', 0x3d, r5}}, {@discard_size={'discard', 0x3d, 0x3f}}, {@gid={'gid', 0x3d, 0xee00}}, {@errors_remount='errors=remount-ro'}, {@grpquota='grpquota'}, {@errors_remount='errors=remount-ro'}], [{@obj_role={'obj_role', 0x3d, '\'\\self}}self('}}, {@subj_type={'subj_type', 0x3d, '/dev/input/event#\x00'}}, {@appraise_type='appraise_type=imasig'}, {@hash='hash'}, {@subj_type={'subj_type', 0x3d, '\x0f'}}, {@permit_directio='permit_directio'}]}) fsetxattr$system_posix_acl(r1, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000001300)={{}, {0x1, 0x4}, [{0x2, 0x4, r2}, {0x2, 0x2, r3}], {}, [{0x8, 0x7, r5}, {0x8, 0x1, 0xee00}], {0x10, 0x2}, {0x20, 0xb}}, 0x44, 0x2) unshare(0x24020400) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x100, 0x0) read$alg(r6, &(0x7f0000000180)=""/4096, 0x1000) [ 545.675059][T11547] RSP: 002b:00007f0134a31a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 545.683458][T11547] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004596e7 [ 545.691431][T11547] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 545.699380][T11547] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 545.707334][T11547] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 545.715296][T11547] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:17:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x34000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x11000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 545.872200][T11564] JFS: discard option not supported on device [ 545.880768][T11564] jfs: Unrecognized mount option "obj_role='\self}}self(" or missing value [ 545.964513][T11574] JFS: discard option not supported on device [ 545.973482][T11574] jfs: Unrecognized mount option "obj_role='\self}}self(" or missing value 13:17:40 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x7, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:40 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x25, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x12000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x400300, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:40 executing program 5 (fault-call:1 fault-nth:20): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) exit_group(0x189a) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000080)={{0x3, @bcast}, [@rose, @bcast, @default, @null, @netrom, @rose, @default, @null]}, &(0x7f0000000100)=0x48, 0x80000) preadv(r1, &(0x7f0000001240)=[{&(0x7f0000000140)=""/49, 0x31}, {&(0x7f0000001180)=""/161, 0xa1}], 0x2, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r2, &(0x7f0000000180)=""/4096, 0x1000) 13:17:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x20000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000180)={0xc, {0x0, 0xfb, 0x8, 0xe93}, {0x56d, 0x100000001, 0x9, 0x23f}, {0xd3c, 0x1}}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) mount$overlay(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x4000, &(0x7f0000000100)={[{@metacopy_off='metacopy=off'}], [{@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r3}}]}) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r4, &(0x7f0000001180)=""/4096, 0xfffffffffffffff7) 13:17:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x1000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:40 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x5c, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 546.243171][T11589] FAULT_INJECTION: forcing a failure. [ 546.243171][T11589] name failslab, interval 1, probability 0, space 0, times 0 [ 546.294166][T11589] CPU: 0 PID: 11589 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 546.302097][T11589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 546.312155][T11589] Call Trace: [ 546.315460][T11589] dump_stack+0x1d8/0x2f8 [ 546.319811][T11589] should_fail+0x555/0x770 [ 546.324244][T11589] __should_failslab+0x11a/0x160 [ 546.329197][T11589] ? tomoyo_encode2+0x273/0x5a0 [ 546.334056][T11589] should_failslab+0x9/0x20 [ 546.338582][T11589] __kmalloc+0x7a/0x340 [ 546.342758][T11589] tomoyo_encode2+0x273/0x5a0 [ 546.347470][T11589] tomoyo_realpath_from_path+0x769/0x7c0 [ 546.353119][T11589] tomoyo_path_number_perm+0x166/0x640 [ 546.358681][T11589] ? trace_hardirqs_on_caller+0x74/0x80 [ 546.364258][T11589] ? smack_file_ioctl+0x226/0x2e0 [ 546.369387][T11589] ? __fget+0x431/0x510 [ 546.373558][T11589] tomoyo_file_ioctl+0x23/0x30 [ 546.378337][T11589] security_file_ioctl+0x6d/0xd0 [ 546.383293][T11589] __x64_sys_ioctl+0xa3/0x120 [ 546.387979][T11589] do_syscall_64+0xfe/0x140 13:17:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x25000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x3f000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 546.392490][T11589] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 546.398386][T11589] RIP: 0033:0x4596e7 [ 546.402278][T11589] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 546.402282][T11589] RSP: 002b:00007f0134a31a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 546.402291][T11589] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004596e7 [ 546.402296][T11589] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 546.402301][T11589] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 546.402306][T11589] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 546.402312][T11589] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 546.484646][T11589] ERROR: Out of memory at tomoyo_realpath_from_path. 13:17:40 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {0x0}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x2000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:40 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x300, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, r2, 0x0, 0x10005, 0x0) setsockopt$inet_dccp_int(r1, 0x21, 0xa, &(0x7f0000000140)=0x8d95, 0x4) ioctl$SIOCX25GDTEFACILITIES(r1, 0x89ea, &(0x7f0000000180)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b97000)={0x1, &(0x7f000048fff0)=[{0x6}]}, 0x10) getsockopt$sock_buf(r3, 0x1, 0x1a, 0x0, &(0x7f0000000000)) flistxattr(r3, &(0x7f0000000080)=""/191, 0xbf) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x14040000) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r4, 0x28, 0x1, &(0x7f0000000140), 0x8) read$alg(r4, &(0x7f0000002180)=""/4096, 0x9c) 13:17:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x40000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:40 executing program 5 (fault-call:1 fault-nth:21): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x48000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x3000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:41 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x500, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 547.078440][T11627] FAULT_INJECTION: forcing a failure. [ 547.078440][T11627] name failslab, interval 1, probability 0, space 0, times 0 [ 547.099553][T11627] CPU: 1 PID: 11627 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 547.107496][T11627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 547.117553][T11627] Call Trace: [ 547.120851][T11627] dump_stack+0x1d8/0x2f8 13:17:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) r3 = socket$inet6(0xa, 0x3, 0x20000000021) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r3, &(0x7f0000000000), 0xff77, 0x2000000, 0x0, 0x4d97) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0x10001}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000001280)={r4, @in6={{0xa, 0x4e21, 0x3f, @local, 0x131}}}, 0x84) splice(r1, 0x0, r2, 0x0, 0x10005, 0x0) setsockopt$inet_dccp_int(r1, 0x21, 0xa, &(0x7f0000000140)=0x8d95, 0x4) write$P9_RVERSION(r1, &(0x7f0000001340)=ANY=[@ANYBLOB="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"], 0x13) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r5, &(0x7f0000000180)=""/4096, 0x1000) [ 547.125194][T11627] should_fail+0x555/0x770 [ 547.129635][T11627] __should_failslab+0x11a/0x160 [ 547.134576][T11627] ? __kernfs_new_node+0x97/0x6b0 [ 547.139618][T11627] should_failslab+0x9/0x20 [ 547.144116][T11627] kmem_cache_alloc+0x56/0x2e0 [ 547.148868][T11627] __kernfs_new_node+0x97/0x6b0 [ 547.153744][T11627] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 547.159368][T11627] ? _raw_spin_unlock_irq+0x69/0x80 [ 547.164552][T11627] ? __schedule+0x998/0xc50 [ 547.169035][T11627] kernfs_new_node+0x97/0x180 [ 547.173960][T11627] kernfs_create_dir_ns+0x44/0x130 [ 547.179072][T11627] internal_create_group+0x207/0xd90 [ 547.184385][T11627] sysfs_create_group+0x1f/0x30 [ 547.189221][T11627] loop_set_fd+0xcb2/0x1180 [ 547.193713][T11627] lo_ioctl+0xd5/0x2200 [ 547.197884][T11627] ? __kasan_slab_free+0x12a/0x1e0 [ 547.202990][T11627] ? kasan_slab_free+0xe/0x10 [ 547.207666][T11627] ? kfree+0x115/0x200 [ 547.211802][T11627] ? tomoyo_path_number_perm+0x4e1/0x640 [ 547.217515][T11627] ? tomoyo_file_ioctl+0x23/0x30 [ 547.222447][T11627] ? security_file_ioctl+0x6d/0xd0 [ 547.227547][T11627] ? __x64_sys_ioctl+0xa3/0x120 [ 547.232389][T11627] ? do_syscall_64+0xfe/0x140 [ 547.237064][T11627] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 547.243582][T11627] ? debug_check_no_obj_freed+0x505/0x5b0 [ 547.249300][T11627] ? trace_lock_release+0x135/0x1a0 [ 547.254502][T11627] ? debug_check_no_obj_freed+0x505/0x5b0 [ 547.260355][T11627] ? rcu_lock_release+0x9/0x30 [ 547.265239][T11627] ? trace_lock_release+0x135/0x1a0 [ 547.270454][T11627] ? rcu_lock_release+0x9/0x30 [ 547.275249][T11627] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 547.280882][T11627] ? lo_release+0x1f0/0x1f0 [ 547.285385][T11627] blkdev_ioctl+0x807/0x2990 [ 547.290314][T11627] ? tomoyo_path_number_perm+0x53e/0x640 [ 547.295967][T11627] block_ioctl+0xbd/0x100 [ 547.300294][T11627] ? blkdev_iopoll+0x100/0x100 [ 547.305308][T11627] do_vfs_ioctl+0x744/0x1730 [ 547.310499][T11627] ? __fget+0x431/0x510 [ 547.314659][T11627] ? tomoyo_file_ioctl+0x23/0x30 [ 547.319589][T11627] ? security_file_ioctl+0xa1/0xd0 [ 547.324801][T11627] __x64_sys_ioctl+0xe3/0x120 [ 547.329478][T11627] do_syscall_64+0xfe/0x140 [ 547.333978][T11627] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 547.339856][T11627] RIP: 0033:0x4596e7 [ 547.343922][T11627] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 547.363525][T11627] RSP: 002b:00007f0134a31a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 547.373174][T11627] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004596e7 [ 547.381150][T11627] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 547.389467][T11627] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 547.397426][T11627] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 547.405388][T11627] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:17:41 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x600, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x4c000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:41 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {0x0}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x4000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:41 executing program 5 (fault-call:1 fault-nth:22): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:41 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x700, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x57110000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 547.900891][T11672] validate_nla: 24 callbacks suppressed [ 547.900899][T11672] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 547.928783][T11672] net_ratelimit: 24 callbacks suppressed [ 547.928791][T11672] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 547.934491][T11674] FAULT_INJECTION: forcing a failure. [ 547.934491][T11674] name failslab, interval 1, probability 0, space 0, times 0 [ 547.934519][T11674] CPU: 0 PID: 11674 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 547.934525][T11674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 547.934528][T11674] Call Trace: [ 547.934544][T11674] dump_stack+0x1d8/0x2f8 [ 547.934558][T11674] should_fail+0x555/0x770 [ 547.934571][T11674] __should_failslab+0x11a/0x160 13:17:41 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x900, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x60000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x5000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 547.934581][T11674] ? __kernfs_new_node+0x97/0x6b0 [ 547.934592][T11674] should_failslab+0x9/0x20 [ 547.934601][T11674] kmem_cache_alloc+0x56/0x2e0 [ 547.934611][T11674] __kernfs_new_node+0x97/0x6b0 [ 547.934621][T11674] ? finish_lock_switch+0x31/0x40 [ 547.934636][T11674] ? finish_task_switch+0x251/0x550 [ 547.962379][T11673] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 547.970186][T11674] ? __schedule+0x87f/0xc50 [ 547.970198][T11674] kernfs_new_node+0x97/0x180 [ 547.970208][T11674] kernfs_create_dir_ns+0x44/0x130 [ 547.970219][T11674] internal_create_group+0x207/0xd90 [ 547.970234][T11674] sysfs_create_group+0x1f/0x30 [ 547.990890][T11673] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 547.992282][T11674] loop_set_fd+0xcb2/0x1180 [ 547.992297][T11674] lo_ioctl+0xd5/0x2200 [ 548.082845][T11674] ? __kasan_slab_free+0x12a/0x1e0 [ 548.087935][T11674] ? kasan_slab_free+0xe/0x10 [ 548.092601][T11674] ? kfree+0x115/0x200 [ 548.096648][T11674] ? tomoyo_path_number_perm+0x4e1/0x640 [ 548.102257][T11674] ? tomoyo_file_ioctl+0x23/0x30 [ 548.107182][T11674] ? security_file_ioctl+0x6d/0xd0 [ 548.112277][T11674] ? __x64_sys_ioctl+0xa3/0x120 [ 548.117105][T11674] ? do_syscall_64+0xfe/0x140 [ 548.121759][T11674] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 548.127805][T11674] ? debug_check_no_obj_freed+0x505/0x5b0 [ 548.133614][T11674] ? trace_lock_release+0x135/0x1a0 [ 548.138793][T11674] ? debug_check_no_obj_freed+0x505/0x5b0 [ 548.144505][T11674] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 548.149944][T11674] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 548.155554][T11674] ? trace_hardirqs_on_caller+0x46/0x80 [ 548.161082][T11674] ? retint_kernel+0x2b/0x2b [ 548.165657][T11674] ? trace_hardirqs_on_caller+0x74/0x80 [ 548.171185][T11674] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 548.176618][T11674] ? rcu_lock_release+0x9/0x30 [ 548.181371][T11674] ? trace_lock_release+0x135/0x1a0 [ 548.186568][T11674] ? rcu_lock_release+0x9/0x30 [ 548.191310][T11674] ? trace_hardirqs_on+0x34/0x80 [ 548.196232][T11674] ? lo_release+0x1f0/0x1f0 [ 548.200717][T11674] blkdev_ioctl+0x807/0x2990 [ 548.205285][T11674] ? tomoyo_path_number_perm+0x53e/0x640 [ 548.210912][T11674] block_ioctl+0xbd/0x100 [ 548.215224][T11674] ? blkdev_iopoll+0x100/0x100 [ 548.219979][T11674] do_vfs_ioctl+0x744/0x1730 [ 548.224549][T11674] ? __fget+0x431/0x510 [ 548.228683][T11674] ? tomoyo_file_ioctl+0x23/0x30 [ 548.233601][T11674] ? security_file_ioctl+0xa1/0xd0 [ 548.238699][T11674] __x64_sys_ioctl+0xe3/0x120 [ 548.243367][T11674] do_syscall_64+0xfe/0x140 [ 548.247856][T11674] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 548.253726][T11674] RIP: 0033:0x4596e7 [ 548.257665][T11674] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 548.277977][T11674] RSP: 002b:00007f0134a31a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 548.286427][T11674] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004596e7 [ 548.294541][T11674] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 548.302496][T11674] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 548.310460][T11674] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 548.318528][T11674] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:17:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) pipe(&(0x7f0000001180)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, r2, 0x0, 0x7, 0x0) setsockopt$inet_dccp_int(r1, 0x21, 0xa, &(0x7f0000000140)=0x8d95, 0x4) ioctl$VIDIOC_S_EDID(r1, 0xc0285629, &(0x7f00000000c0)={0x0, 0x5, 0x9, [], &(0x7f0000000080)=0x5cab}) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x14000, 0x0) read$alg(r3, &(0x7f0000000180)=""/4096, 0x1000) 13:17:42 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0xa00, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 548.361547][T11687] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 548.370268][T11687] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:17:42 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x65580000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:42 executing program 5 (fault-call:1 fault-nth:23): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 548.413574][T11690] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 548.441392][T11690] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 548.499352][T11702] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 548.545717][T11702] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 548.570422][T11705] FAULT_INJECTION: forcing a failure. [ 548.570422][T11705] name failslab, interval 1, probability 0, space 0, times 0 [ 548.583496][T11705] CPU: 1 PID: 11705 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 548.591401][T11705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 548.601752][T11705] Call Trace: [ 548.605054][T11705] dump_stack+0x1d8/0x2f8 [ 548.609389][T11705] should_fail+0x555/0x770 [ 548.613979][T11705] __should_failslab+0x11a/0x160 [ 548.619027][T11705] ? radix_tree_node_alloc+0x1a1/0x370 [ 548.624483][T11705] should_failslab+0x9/0x20 [ 548.629263][T11705] kmem_cache_alloc+0x56/0x2e0 [ 548.634045][T11705] radix_tree_node_alloc+0x1a1/0x370 [ 548.639552][T11705] ? __kthread_create_on_node+0x302/0x3b0 [ 548.645264][T11705] idr_get_free+0x2b8/0x890 [ 548.649960][T11705] idr_alloc_cyclic+0x18b/0x550 [ 548.654890][T11705] __kernfs_new_node+0x124/0x6b0 [ 548.659818][T11705] ? update_load_avg+0x155/0xbf0 [ 548.664752][T11705] kernfs_new_node+0x97/0x180 [ 548.669584][T11705] kernfs_create_dir_ns+0x44/0x130 [ 548.674696][T11705] internal_create_group+0x207/0xd90 [ 548.679989][T11705] sysfs_create_group+0x1f/0x30 [ 548.684938][T11705] loop_set_fd+0xcb2/0x1180 [ 548.689446][T11705] lo_ioctl+0xd5/0x2200 [ 548.693586][T11705] ? __kasan_slab_free+0x12a/0x1e0 [ 548.698685][T11705] ? kasan_slab_free+0xe/0x10 [ 548.703454][T11705] ? kfree+0x115/0x200 [ 548.707719][T11705] ? tomoyo_path_number_perm+0x4e1/0x640 [ 548.713440][T11705] ? tomoyo_file_ioctl+0x23/0x30 [ 548.718606][T11705] ? security_file_ioctl+0x6d/0xd0 [ 548.723726][T11705] ? __x64_sys_ioctl+0xa3/0x120 [ 548.728583][T11705] ? do_syscall_64+0xfe/0x140 [ 548.733269][T11705] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 548.739344][T11705] ? debug_check_no_obj_freed+0x505/0x5b0 13:17:42 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {0x0}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:42 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0xb00, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x6000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) sendto$netrom(r1, &(0x7f0000000080)="2ff5e3d2c4888dd525c66b2f9a420c76d78cbb14183f34dfaa446b8607b76da741ee9a91d058f59b5edcae14077a96d439081e1fdd84275e29d870b2a40657cad8a078dc78466e1fe41cb3dabb3c9d2a9608b8cfcb204650b23a1392dda8b5115231250bdb8c00a8e8545327b856df06646073bb95b185b54351c08fc1ecbd8c232fef31e6547ddee1d0ac9ad4b827a509b4f7f183cb87a8eb761837bf19753e94f043ec0cd496758b637a3d40bdc0f8eef342d3c8f368722e0f3a79bcf6c24e5d7d3f4c18800d8318bf6f0420e9cbd1f51640c9023bedddf4417c0aa2fdc676f90e2919658fc6e149489f10170665bea1aee053", 0xf4, 0x1, &(0x7f0000001180)={{0x3, @bcast, 0x8}, [@default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) 13:17:42 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x68000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:42 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0xc00, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 548.745487][T11705] ? trace_lock_release+0x135/0x1a0 [ 548.750841][T11705] ? debug_check_no_obj_freed+0x505/0x5b0 [ 548.756578][T11705] ? rcu_lock_release+0x9/0x30 [ 548.761459][T11705] ? trace_lock_release+0x135/0x1a0 [ 548.766756][T11705] ? rcu_lock_release+0x9/0x30 [ 548.771541][T11705] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 548.777195][T11705] ? lo_release+0x1f0/0x1f0 [ 548.781709][T11705] blkdev_ioctl+0x807/0x2990 [ 548.786313][T11705] ? tomoyo_path_number_perm+0x53e/0x640 [ 548.792103][T11705] block_ioctl+0xbd/0x100 [ 548.796416][T11705] ? blkdev_iopoll+0x100/0x100 [ 548.801170][T11705] do_vfs_ioctl+0x744/0x1730 [ 548.805761][T11705] ? __fget+0x431/0x510 [ 548.809898][T11705] ? tomoyo_file_ioctl+0x23/0x30 [ 548.814828][T11705] ? security_file_ioctl+0xa1/0xd0 [ 548.820013][T11705] __x64_sys_ioctl+0xe3/0x120 [ 548.824693][T11705] do_syscall_64+0xfe/0x140 [ 548.829187][T11705] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 548.835058][T11705] RIP: 0033:0x4596e7 [ 548.838931][T11705] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 548.858536][T11705] RSP: 002b:00007f0134a31a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 548.867155][T11705] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004596e7 [ 548.875269][T11705] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 548.883363][T11705] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 13:17:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, &(0x7f0000001180)=""/133, 0x85, 0x80010102, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x2) sched_rr_get_interval(r1, &(0x7f0000001240)) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") arch_prctl$ARCH_SET_GS(0x1001, 0x0) unshare(0x24020400) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0xa50901, 0x0) read$alg(r2, &(0x7f0000000180)=""/4096, 0x1000) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x200001, 0x0) ioctl$CAPI_GET_ERRCODE(r2, 0x80024321, &(0x7f00000000c0)) ioctl$SG_EMULATED_HOST(0xffffffffffffffff, 0x2203, &(0x7f0000000100)) [ 548.891463][T11705] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 548.899908][T11705] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 548.972471][T11721] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 549.006092][T11721] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:17:42 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0xd00, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:42 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0xe00, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x7000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:42 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x6c000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 549.025040][T11720] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 549.040456][T11720] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:17:43 executing program 5 (fault-call:1 fault-nth:24): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 549.139903][T11741] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 549.178688][T11741] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 549.190314][T11745] FAULT_INJECTION: forcing a failure. [ 549.190314][T11745] name failslab, interval 1, probability 0, space 0, times 0 [ 549.197403][T11742] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 549.207907][T11745] CPU: 1 PID: 11745 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 549.218672][T11742] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 549.223545][T11745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 549.223549][T11745] Call Trace: [ 549.223567][T11745] dump_stack+0x1d8/0x2f8 [ 549.223580][T11745] should_fail+0x555/0x770 [ 549.223593][T11745] __should_failslab+0x11a/0x160 [ 549.223602][T11745] ? __kernfs_new_node+0x97/0x6b0 [ 549.223611][T11745] should_failslab+0x9/0x20 [ 549.223619][T11745] kmem_cache_alloc+0x56/0x2e0 [ 549.223628][T11745] __kernfs_new_node+0x97/0x6b0 [ 549.223636][T11745] ? kernfs_add_one+0x49c/0x670 [ 549.223647][T11745] ? __kasan_check_write+0x14/0x20 [ 549.223662][T11745] kernfs_new_node+0x97/0x180 [ 549.299704][T11745] __kernfs_create_file+0x4a/0x2f0 [ 549.304816][T11745] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 549.310187][T11745] internal_create_group+0x4be/0xd90 [ 549.315535][T11745] sysfs_create_group+0x1f/0x30 [ 549.320377][T11745] loop_set_fd+0xcb2/0x1180 [ 549.324879][T11745] lo_ioctl+0xd5/0x2200 [ 549.329092][T11745] ? __kasan_slab_free+0x12a/0x1e0 [ 549.334195][T11745] ? kasan_slab_free+0xe/0x10 [ 549.338871][T11745] ? kfree+0x115/0x200 [ 549.343009][T11745] ? tomoyo_path_number_perm+0x4e1/0x640 [ 549.348641][T11745] ? tomoyo_file_ioctl+0x23/0x30 [ 549.353570][T11745] ? security_file_ioctl+0x6d/0xd0 [ 549.358667][T11745] ? __x64_sys_ioctl+0xa3/0x120 [ 549.363927][T11745] ? do_syscall_64+0xfe/0x140 [ 549.368694][T11745] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 549.374761][T11745] ? debug_check_no_obj_freed+0x505/0x5b0 [ 549.380472][T11745] ? trace_lock_release+0x135/0x1a0 [ 549.385933][T11745] ? debug_check_no_obj_freed+0x505/0x5b0 [ 549.391652][T11745] ? rcu_lock_release+0x9/0x30 [ 549.396428][T11745] ? trace_lock_release+0x135/0x1a0 [ 549.402120][T11745] ? rcu_lock_release+0x9/0x30 [ 549.406997][T11745] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 549.412624][T11745] ? lo_release+0x1f0/0x1f0 [ 549.417112][T11745] blkdev_ioctl+0x807/0x2990 [ 549.421821][T11745] ? tomoyo_path_number_perm+0x53e/0x640 [ 549.427611][T11745] block_ioctl+0xbd/0x100 [ 549.432168][T11745] ? blkdev_iopoll+0x100/0x100 [ 549.436988][T11745] do_vfs_ioctl+0x744/0x1730 [ 549.441601][T11745] ? __fget+0x431/0x510 [ 549.446014][T11745] ? tomoyo_file_ioctl+0x23/0x30 [ 549.451058][T11745] ? security_file_ioctl+0xa1/0xd0 [ 549.456442][T11745] __x64_sys_ioctl+0xe3/0x120 [ 549.461128][T11745] do_syscall_64+0xfe/0x140 [ 549.465629][T11745] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 549.471511][T11745] RIP: 0033:0x4596e7 [ 549.475392][T11745] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 549.495500][T11745] RSP: 002b:00007f0134a31a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 549.503903][T11745] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004596e7 [ 549.512139][T11745] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 549.520125][T11745] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 549.528210][T11745] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 549.536320][T11745] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:17:43 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x7, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:43 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x1100, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x8000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x74000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:43 executing program 5 (fault-call:1 fault-nth:25): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 549.792113][T11758] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 549.819585][T11759] FAULT_INJECTION: forcing a failure. [ 549.819585][T11759] name failslab, interval 1, probability 0, space 0, times 0 13:17:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) 13:17:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x7a000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 549.834610][T11758] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 549.838958][T11759] CPU: 1 PID: 11759 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 549.857626][T11759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 549.867686][T11759] Call Trace: [ 549.870986][T11759] dump_stack+0x1d8/0x2f8 [ 549.875339][T11759] should_fail+0x555/0x770 [ 549.879784][T11759] __should_failslab+0x11a/0x160 [ 549.884740][T11759] ? __kernfs_new_node+0x97/0x6b0 [ 549.889767][T11759] should_failslab+0x9/0x20 [ 549.894368][T11759] kmem_cache_alloc+0x56/0x2e0 [ 549.899176][T11759] __kernfs_new_node+0x97/0x6b0 [ 549.904011][T11759] ? __kasan_check_write+0x14/0x20 [ 549.909108][T11759] ? __mutex_unlock_slowpath+0x13c/0x5b0 [ 549.914734][T11759] ? mutex_unlock+0xd/0x10 [ 549.919147][T11759] ? kernfs_activate+0x213/0x230 [ 549.924066][T11759] kernfs_new_node+0x97/0x180 [ 549.928730][T11759] __kernfs_create_file+0x4a/0x2f0 [ 549.933832][T11759] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 549.939187][T11759] internal_create_group+0x4be/0xd90 [ 549.944460][T11759] sysfs_create_group+0x1f/0x30 [ 549.949298][T11759] loop_set_fd+0xcb2/0x1180 [ 549.953917][T11759] lo_ioctl+0xd5/0x2200 [ 549.958064][T11759] ? __kasan_slab_free+0x12a/0x1e0 [ 549.963155][T11759] ? kasan_slab_free+0xe/0x10 [ 549.967810][T11759] ? kfree+0x115/0x200 [ 549.971857][T11759] ? tomoyo_path_number_perm+0x4e1/0x640 [ 549.977503][T11759] ? tomoyo_file_ioctl+0x23/0x30 [ 549.982417][T11759] ? security_file_ioctl+0x6d/0xd0 [ 549.987514][T11759] ? __x64_sys_ioctl+0xa3/0x120 [ 549.992351][T11759] ? do_syscall_64+0xfe/0x140 [ 549.997038][T11759] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 550.003099][T11759] ? debug_check_no_obj_freed+0x505/0x5b0 [ 550.008800][T11759] ? trace_lock_release+0x135/0x1a0 [ 550.013977][T11759] ? debug_check_no_obj_freed+0x505/0x5b0 [ 550.019689][T11759] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 550.025561][T11759] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 550.031198][T11759] ? trace_hardirqs_on_caller+0x46/0x80 [ 550.036742][T11759] ? retint_kernel+0x2b/0x2b [ 550.041450][T11759] ? trace_hardirqs_on_caller+0x74/0x80 [ 550.047173][T11759] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 550.052785][T11759] ? rcu_lock_release+0x9/0x30 [ 550.057662][T11759] ? trace_lock_release+0x135/0x1a0 [ 550.062865][T11759] ? rcu_lock_release+0x9/0x30 [ 550.067611][T11759] ? trace_hardirqs_on+0x34/0x80 [ 550.072539][T11759] ? lo_release+0x1f0/0x1f0 [ 550.077139][T11759] blkdev_ioctl+0x807/0x2990 [ 550.081724][T11759] ? tomoyo_path_number_perm+0x53e/0x640 [ 550.087343][T11759] block_ioctl+0xbd/0x100 [ 550.091733][T11759] ? blkdev_iopoll+0x100/0x100 [ 550.096491][T11759] do_vfs_ioctl+0x744/0x1730 [ 550.101157][T11759] ? __fget+0x431/0x510 [ 550.105601][T11759] ? tomoyo_file_ioctl+0x23/0x30 [ 550.110805][T11759] ? security_file_ioctl+0xa1/0xd0 [ 550.115997][T11759] __x64_sys_ioctl+0xe3/0x120 [ 550.120708][T11759] do_syscall_64+0xfe/0x140 [ 550.125201][T11759] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 550.131083][T11759] RIP: 0033:0x4596e7 [ 550.134957][T11759] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 550.154652][T11759] RSP: 002b:00007f0134a31a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 550.163046][T11759] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004596e7 [ 550.171008][T11759] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 550.178972][T11759] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 13:17:44 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x1200, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x9000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 550.187277][T11759] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 550.195336][T11759] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:17:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x81000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:44 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x2500, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) r2 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x8589, 0x200) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b97000)={0x1, &(0x7f000048fff0)=[{0x6}]}, 0x10) getsockopt$sock_buf(r3, 0x1, 0x1a, 0x0, &(0x7f0000000000)) sendmsg(r3, &(0x7f0000002a80)={&(0x7f0000000100)=@llc={0x1a, 0x17, 0xffffffffffff5600, 0x0, 0x6, 0x6, @local}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001180)="a01700b4ac6c053f2bf49f1161cf16e8630e13c424670d47170d61d97a7ca4b53e7bdd69b6af850c0befa50b6c990d995089c014fcaba51c4cc37818e1d68f8b59ea8ac517709d20822c846153296cce0be076aed343747bbf0ef3623df78b4e5893208f2c3d020e2b7023ef5b8472127de41694446db09061013f35aab12ec51467c98e7174a5", 0x87}, {&(0x7f0000001240)="dd32f3f7a3f99a647a20ebe556289dbfad232d3354604c02a411df3367f62d00a9256e70a13bef03401b7dce98a3477bae08c91be95a525bf535b866c1f007a5b8293a38bdcbd3b34e622130d631eec7d5920250e9f6fa618d5a3990b53883f041ef382d73773fd7da791b808844d6bb9799461fa85f4d8772", 0x79}, {&(0x7f00000012c0)="67c3e42fde68e01fb9fde96b0900e589af2c619b8fd6654ab4983074a8d5dc7b10394948b0f9e60e6781c00fb3ec0ae891e000a20d5a115fd9879992e91b54a961b9d1c29096fa5bc350e5d64f16c29ee0ce0eabc461ce916444e7c727f42fe761b8e083e60864ff2495579ea9ee0ccbe21e1ba73ce6a1c6ea2e5a76107d3dc161af7515ad49", 0x86}, {&(0x7f0000001380)="d2a162271aeb96456ff00a1012ab733f45ed82dbcbf588369f7023cf463ebd3c8006e84d8c701ff429a85d676446dc797c007a", 0x33}, {&(0x7f00000013c0)="4dcf0c85a879235dd72af101f17c3e0068426d8c7ac379894b56bbb0676239a75402a52e167da4aca6b23fb97bcc52e73afa1e20ff81c20268010c2b97e49b02cc36936e88a1cf07c249e5cb797cf17ed11446dbac15bee1", 0x58}, {&(0x7f0000001440)="cfd777283ab81e0ff427354f3faa13f087bd58e9ff4117acfa422f985bdccbde455920914b31973d576c7e0ffec17f777aa5a9bd68f1ba2716a1064b3f67e26367e68afb83c7dd0cc2aebd2531e579c752fa8b4c5c3c2f79c5415d618408b4631035075f9d92d8ed0dc1b2a87fae603ab71a8b0d29e2dead72ee2e8e1f83438dbd2b283e8a88b6c79c746c633c17424a266331ae0e6a03f5ad64850c3eca0b", 0x9f}], 0x6, &(0x7f0000001580)=[{0xd8, 0x10f, 0x3, "e9b9eff760170f70e608de300ec4de23d48b9d3e58cb7fedb2a5b2b8e66aacb7712d45f01f2a874e1efe7da064db3aabd70106ff425e8dab854e30271eca24f032a3a3f1106cb3626a9a6f7d0f1d906bebf11d9b41c0af35583fc21bec94d64ff79e7603531e39995911e90cd7cab938a028a10e5215179179b4799a9c3b3267c6cf540ab61fd33b11d4756df9ef06c52fa620cdfeec692944cfb49e56f409e76af964cbce71e76f8532f43fa752842270e57daa3cfbcf68c76c7579c1763b436feb8a"}, {0x80, 0x1b, 0x2, "038528eae3d329640c42ebdc6b56c47360d63bf4a05b2a124e5861967022e379946ce90c63606333bd158545ac9149c7d5b1ed89d3e7496e70954d3247b85446bc0ed2db085e3fa180e56a83f815a3c3f77d572bb0733373fbf67dd6559deec33322786814810de88febfdca7a78d885"}, {0xc0, 0x116, 0x80, "39a7f4268840ee4315e21f8dbdffaf9d9bad4f95af0e609b4d5a266ab657e1ee5cb61723546e66df53685b8a1e68ffcc73d29a991dfd34d0c8db7fa29bbbd5084868e4f69abf0e87798bec477bdee8fb5815904b6cb3eb919a9934a3469a2127a341e966dca2c3cd84d6056794e4cfaade186fbbf00f97203acacfcf93556d43e06cc9450e2b1a8587cfaf9f755f9ed070b1b251764ec48fcd463b10ee07c5b2ba771972308607206e67ae259e9ab59d"}, {0xd8, 0x116, 0x6, "70983a1cb3171d9a9f0b797e319cea0d9f64f97ebe3011f52a43744a2e551f961b6acabf70f33abfb118305ab96f6dfb9997a5aa05e7da4a4b524940604374a995336008b570f89a11a4d1491724bca480bc7badca148e6ab5b905ac1579e1533bea0cabb255505493ba42667f8de03e7951f20576df6cfd1af35dff4667e652aab917caee4efc9bf164bd0d30d874b9ebeb55fd257077c677018606aaffa515ccacf6b03627be73012421bbab8a089eed52dce0f43211af18b3201543eb6e92281a7e265e84"}, {0x58, 0x115, 0x6, "81efa2cf6741b84d65b94cd45ac0a655ce9c089fa36e850f08a75b5eb9bdf39915adf75e8cf8a7f91e6cf753f6ec9d18a3aaf5066122133eab5f611a65dd7c353935ba4c65"}, {0xf0, 0x88, 0x10001, "409ad83449ccc1652dc89d35112949fa28adb59cdb4aff3212ee6b4f59cb980de7ef0640760abec3dfbf324cc4a3d7dd5349e54e62014161e755bfd3ea0b0512f151c9e012cce3b171c7d7881dd820f5bbd0772faa6af4188a379a912f0113b175486fdbcb7d5ac14e16d6685be9f33b3aa4149468c6d520779229daddf8182627d061ae5f176cec0041754abfe2c4a28aaca54dd2d40d09b1328156f8e42f08a3aabece50e928d26d2286f49654ca1c47827ef2d157be12d2a922289e41f3e71cab78d7afa99d4300785a5bd44c929c497af09afb83165a74"}, {0x30, 0x0, 0x4, "8630399060fb0fba217bc2a27f388fc4b0403b83fa9c6ff83a"}, {0x1010, 0x32b, 0x7a67, "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"}, {0x20, 0x84, 0x2, "089e3755aa763118a32250"}, {0x48, 0x104, 0xee60, "705d843b02386d9de68f8e5f386b472357fb3a6bc60b2c17b21cd62503eb05437f1d49287b6033591d88dadad52e79917cbf"}], 0x14e0}, 0x220100a4) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)=0x7) 13:17:44 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x7, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xa000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x88470000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:44 executing program 5 (fault-call:1 fault-nth:26): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:44 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x4000, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") pipe(&(0x7f0000000240)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, r2, 0x0, 0x10005, 0x0) setsockopt$inet_dccp_int(r1, 0x21, 0xa, &(0x7f0000000140)=0x8d95, 0x4) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) bind$inet(r4, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r3, 0x0, r4, 0x0, 0x10005, 0x0) setsockopt$inet_dccp_int(r3, 0x21, 0xa, &(0x7f0000000140)=0x8d95, 0x4) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000100)={0x0, 0xc0000, r3}) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000001180)={0x1, &(0x7f0000000140)=[{0x0}]}) ioctl$DRM_IOCTL_SWITCH_CTX(r5, 0x40086424, &(0x7f00000011c0)={r6, 0x1}) unshare(0x24020400) r7 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) modify_ldt$read_default(0x2, &(0x7f0000000080)=""/112, 0x70) read$alg(r7, &(0x7f0000000180)=""/4096, 0x1000) 13:17:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x88480000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:44 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x5c00, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xb000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) r3 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_ifreq(r3, 0x89f2, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) r4 = socket$inet6(0xa, 0x3, 0x20000000021) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r4, &(0x7f0000000000), 0xff77, 0x2000000, 0x0, 0x4d97) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e20, 0x80, @empty, 0xe68f}}, 0x1, 0x7, 0x1, 0x4, 0xffff}, &(0x7f0000000100)=0x98) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000280)={r5, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x29}}}, 0x80, 0x8, 0x5, 0x7, 0x8a}, 0x98) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, r2, 0x0, 0x10005, 0x0) setsockopt$inet_dccp_int(r1, 0x21, 0xa, &(0x7f0000000140)=0x8d95, 0x4) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) bind$inet(r7, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r6, 0x0, r7, 0x0, 0x10005, 0x0) setsockopt$inet_dccp_int(r6, 0x21, 0xa, &(0x7f0000000140)=0x8d95, 0x4) read$alg(r6, &(0x7f0000001180)=""/4096, 0x10000015f) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) bind$inet(r9, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r9, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r8, 0x0, r9, 0x0, 0x10005, 0x0) setsockopt$inet_dccp_int(r8, 0x21, 0xa, &(0x7f0000000140)=0x8d95, 0x4) ioctl$PPPIOCSMRU1(r8, 0x40047452, &(0x7f00000000c0)=0x4) [ 550.718986][T11807] FAULT_INJECTION: forcing a failure. [ 550.718986][T11807] name failslab, interval 1, probability 0, space 0, times 0 [ 550.739683][T11807] CPU: 0 PID: 11807 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 550.747601][T11807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 550.757990][T11807] Call Trace: [ 550.761283][T11807] dump_stack+0x1d8/0x2f8 [ 550.765605][T11807] should_fail+0x555/0x770 [ 550.770118][T11807] __should_failslab+0x11a/0x160 [ 550.775054][T11807] ? __kernfs_new_node+0x97/0x6b0 [ 550.780059][T11807] should_failslab+0x9/0x20 [ 550.784542][T11807] kmem_cache_alloc+0x56/0x2e0 [ 550.789370][T11807] __kernfs_new_node+0x97/0x6b0 [ 550.794196][T11807] ? __kasan_check_write+0x14/0x20 [ 550.799296][T11807] ? __mutex_unlock_slowpath+0x13c/0x5b0 [ 550.804913][T11807] ? mutex_unlock+0xd/0x10 [ 550.809307][T11807] ? kernfs_activate+0x213/0x230 [ 550.814224][T11807] kernfs_new_node+0x97/0x180 [ 550.819748][T11807] __kernfs_create_file+0x4a/0x2f0 [ 550.824981][T11807] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 550.830333][T11807] internal_create_group+0x4be/0xd90 [ 550.835606][T11807] sysfs_create_group+0x1f/0x30 [ 550.840434][T11807] loop_set_fd+0xcb2/0x1180 [ 550.845003][T11807] lo_ioctl+0xd5/0x2200 [ 550.849809][T11807] ? __kasan_slab_free+0x12a/0x1e0 [ 550.854916][T11807] ? kasan_slab_free+0xe/0x10 [ 550.859778][T11807] ? kfree+0x115/0x200 [ 550.863838][T11807] ? tomoyo_path_number_perm+0x4e1/0x640 [ 550.869449][T11807] ? tomoyo_file_ioctl+0x23/0x30 [ 550.874580][T11807] ? security_file_ioctl+0x6d/0xd0 [ 550.879974][T11807] ? __x64_sys_ioctl+0xa3/0x120 [ 550.885363][T11807] ? do_syscall_64+0xfe/0x140 [ 550.890078][T11807] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 550.896243][T11807] ? debug_check_no_obj_freed+0x505/0x5b0 [ 550.901959][T11807] ? trace_lock_release+0x135/0x1a0 [ 550.907138][T11807] ? debug_check_no_obj_freed+0x505/0x5b0 [ 550.912842][T11807] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 550.918276][T11807] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 550.923892][T11807] ? trace_hardirqs_on_caller+0x46/0x80 [ 550.929425][T11807] ? retint_kernel+0x2b/0x2b [ 550.933992][T11807] ? trace_hardirqs_on_caller+0x74/0x80 [ 550.939514][T11807] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 550.944968][T11807] ? rcu_lock_release+0x9/0x30 [ 550.949889][T11807] ? trace_lock_release+0x135/0x1a0 [ 550.955201][T11807] ? rcu_lock_release+0x9/0x30 [ 550.959950][T11807] ? trace_hardirqs_on+0x34/0x80 [ 550.965035][T11807] ? lo_release+0x1f0/0x1f0 [ 550.969527][T11807] blkdev_ioctl+0x807/0x2990 [ 550.974260][T11807] ? tomoyo_path_number_perm+0x53e/0x640 [ 550.980043][T11807] block_ioctl+0xbd/0x100 [ 550.984540][T11807] ? blkdev_iopoll+0x100/0x100 [ 550.990022][T11807] do_vfs_ioctl+0x744/0x1730 [ 550.994716][T11807] ? __fget+0x431/0x510 [ 550.998866][T11807] ? tomoyo_file_ioctl+0x23/0x30 [ 551.003803][T11807] ? security_file_ioctl+0xa1/0xd0 [ 551.008906][T11807] __x64_sys_ioctl+0xe3/0x120 [ 551.013686][T11807] do_syscall_64+0xfe/0x140 [ 551.018286][T11807] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 551.024718][T11807] RIP: 0033:0x4596e7 [ 551.028785][T11807] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 551.048653][T11807] RSP: 002b:00007f0134a31a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 551.057043][T11807] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004596e7 [ 551.065381][T11807] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 551.073511][T11807] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 551.081764][T11807] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 551.089729][T11807] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:17:45 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x1000000, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xc000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:45 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x7, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x88a8ffff, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:45 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x2000000, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xd000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:45 executing program 5 (fault-call:1 fault-nth:27): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x9effffff, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:45 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x25640c0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xe000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 551.543264][T11850] FAULT_INJECTION: forcing a failure. [ 551.543264][T11850] name failslab, interval 1, probability 0, space 0, times 0 [ 551.558624][T11850] CPU: 0 PID: 11850 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 551.566641][T11850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 551.576809][T11850] Call Trace: [ 551.580106][T11850] dump_stack+0x1d8/0x2f8 [ 551.584584][T11850] should_fail+0x555/0x770 [ 551.588991][T11850] __should_failslab+0x11a/0x160 [ 551.593951][T11850] ? kzalloc+0x26/0x40 [ 551.598012][T11850] should_failslab+0x9/0x20 [ 551.602662][T11850] __kmalloc+0x7a/0x340 [ 551.606828][T11850] kzalloc+0x26/0x40 [ 551.610730][T11850] kobject_get_path+0xa7/0x1d0 [ 551.615495][T11850] kobject_uevent_env+0x2f2/0x1260 [ 551.620608][T11850] kobject_uevent+0x1f/0x30 [ 551.625110][T11850] loop_set_fd+0xd21/0x1180 [ 551.629601][T11850] lo_ioctl+0xd5/0x2200 [ 551.633751][T11850] ? __kasan_slab_free+0x12a/0x1e0 [ 551.638861][T11850] ? kasan_slab_free+0xe/0x10 [ 551.643536][T11850] ? kfree+0x115/0x200 [ 551.647587][T11850] ? tomoyo_path_number_perm+0x4e1/0x640 [ 551.653200][T11850] ? tomoyo_file_ioctl+0x23/0x30 [ 551.658221][T11850] ? security_file_ioctl+0x6d/0xd0 [ 551.663337][T11850] ? __x64_sys_ioctl+0xa3/0x120 [ 551.668189][T11850] ? do_syscall_64+0xfe/0x140 [ 551.673045][T11850] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 551.679098][T11850] ? debug_check_no_obj_freed+0x505/0x5b0 [ 551.684803][T11850] ? trace_lock_release+0x135/0x1a0 [ 551.689989][T11850] ? debug_check_no_obj_freed+0x505/0x5b0 [ 551.695693][T11850] ? rcu_lock_release+0x9/0x30 [ 551.700454][T11850] ? trace_lock_release+0x135/0x1a0 [ 551.705632][T11850] ? rcu_lock_release+0x9/0x30 [ 551.710430][T11850] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 551.716040][T11850] ? lo_release+0x1f0/0x1f0 [ 551.720536][T11850] blkdev_ioctl+0x807/0x2990 [ 551.725115][T11850] ? tomoyo_path_number_perm+0x53e/0x640 [ 551.730750][T11850] block_ioctl+0xbd/0x100 [ 551.735070][T11850] ? blkdev_iopoll+0x100/0x100 [ 551.739829][T11850] do_vfs_ioctl+0x744/0x1730 [ 551.744401][T11850] ? __fget+0x431/0x510 [ 551.748539][T11850] ? tomoyo_file_ioctl+0x23/0x30 [ 551.753459][T11850] ? security_file_ioctl+0xa1/0xd0 [ 551.758551][T11850] __x64_sys_ioctl+0xe3/0x120 [ 551.763213][T11850] do_syscall_64+0xfe/0x140 [ 551.767715][T11850] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 551.773597][T11850] RIP: 0033:0x4596e7 [ 551.777479][T11850] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 551.797064][T11850] RSP: 002b:00007f0134a31a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 551.805453][T11850] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004596e7 [ 551.813536][T11850] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 551.821614][T11850] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 551.829577][T11850] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 551.837536][T11850] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:17:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xc3ffffff, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x20c441, 0x0) unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) socket$inet_sctp(0x2, 0x6, 0x84) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) 13:17:45 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x3000000, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xf000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:46 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {0x0}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:46 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xefffffff, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x10000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:46 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x4000000, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:46 executing program 5 (fault-call:1 fault-nth:28): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, r2, 0x0, 0x10005, 0x0) setsockopt$inet_dccp_int(r1, 0x21, 0xa, &(0x7f0000000140)=0x8d95, 0x4) write$char_usb(r1, &(0x7f0000000080)="552ec4bc4e9ff377e828862d1d36280b4a89298cfd57b23705e9625aa25dad0f43b5692a6e857e4f7ae9efc578278dcce9443ca84922258e1928459974357b626aebb4426d9e3d4cab3a3f59daed6f27643d63814de9a43616", 0x59) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r3, &(0x7f0000000180)=""/4096, 0x1000) 13:17:46 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x5000000, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:46 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xf0ffffff, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 552.380947][T11899] FAULT_INJECTION: forcing a failure. [ 552.380947][T11899] name failslab, interval 1, probability 0, space 0, times 0 [ 552.397780][T11899] CPU: 1 PID: 11899 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 552.405724][T11899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 552.415780][T11899] Call Trace: [ 552.419082][T11899] dump_stack+0x1d8/0x2f8 [ 552.423438][T11899] should_fail+0x555/0x770 [ 552.427872][T11899] __should_failslab+0x11a/0x160 [ 552.432928][T11899] ? __kernfs_new_node+0x97/0x6b0 [ 552.437947][T11899] should_failslab+0x9/0x20 [ 552.442537][T11899] kmem_cache_alloc+0x56/0x2e0 [ 552.447291][T11899] __kernfs_new_node+0x97/0x6b0 [ 552.452136][T11899] ? __kasan_check_write+0x14/0x20 [ 552.457502][T11899] ? __mutex_unlock_slowpath+0x13c/0x5b0 [ 552.463118][T11899] ? mutex_unlock+0xd/0x10 [ 552.467655][T11899] ? kernfs_activate+0x213/0x230 [ 552.472849][T11899] kernfs_new_node+0x97/0x180 [ 552.477671][T11899] __kernfs_create_file+0x4a/0x2f0 [ 552.482772][T11899] sysfs_add_file_mode_ns+0x2dc/0x3a0 [ 552.488134][T11899] internal_create_group+0x4be/0xd90 [ 552.494218][T11899] sysfs_create_group+0x1f/0x30 [ 552.499072][T11899] loop_set_fd+0xcb2/0x1180 [ 552.503686][T11899] lo_ioctl+0xd5/0x2200 [ 552.507840][T11899] ? __kasan_slab_free+0x12a/0x1e0 [ 552.513048][T11899] ? kasan_slab_free+0xe/0x10 [ 552.517721][T11899] ? kfree+0x115/0x200 [ 552.522031][T11899] ? tomoyo_path_number_perm+0x4e1/0x640 [ 552.527654][T11899] ? tomoyo_file_ioctl+0x23/0x30 [ 552.532715][T11899] ? security_file_ioctl+0x6d/0xd0 [ 552.537951][T11899] ? __x64_sys_ioctl+0xa3/0x120 [ 552.542785][T11899] ? do_syscall_64+0xfe/0x140 [ 552.547450][T11899] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 552.553500][T11899] ? debug_check_no_obj_freed+0x505/0x5b0 [ 552.559202][T11899] ? trace_lock_release+0x135/0x1a0 [ 552.564390][T11899] ? debug_check_no_obj_freed+0x505/0x5b0 [ 552.570106][T11899] ? rcu_lock_release+0x9/0x30 [ 552.574850][T11899] ? trace_lock_release+0x135/0x1a0 [ 552.580031][T11899] ? rcu_lock_release+0x9/0x30 [ 552.584773][T11899] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 552.590388][T11899] ? lo_release+0x1f0/0x1f0 [ 552.594884][T11899] blkdev_ioctl+0x807/0x2990 [ 552.599497][T11899] ? tomoyo_path_number_perm+0x53e/0x640 [ 552.605128][T11899] block_ioctl+0xbd/0x100 [ 552.609445][T11899] ? blkdev_iopoll+0x100/0x100 [ 552.614214][T11899] do_vfs_ioctl+0x744/0x1730 [ 552.618796][T11899] ? __fget+0x431/0x510 [ 552.622961][T11899] ? tomoyo_file_ioctl+0x23/0x30 [ 552.627877][T11899] ? security_file_ioctl+0xa1/0xd0 [ 552.632982][T11899] __x64_sys_ioctl+0xe3/0x120 [ 552.637660][T11899] do_syscall_64+0xfe/0x140 [ 552.642448][T11899] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 552.648334][T11899] RIP: 0033:0x4596e7 [ 552.652368][T11899] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 552.672204][T11899] RSP: 002b:00007f0134a31a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 13:17:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x11000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) fadvise64(r0, 0x0, 0x0, 0x2) [ 552.680598][T11899] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004596e7 [ 552.688669][T11899] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 552.696674][T11899] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 552.704627][T11899] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 552.712698][T11899] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:17:46 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x6000000, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x12000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 552.912861][T11927] validate_nla: 19 callbacks suppressed [ 552.912867][T11927] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 552.934015][T11927] net_ratelimit: 19 callbacks suppressed [ 552.934021][T11927] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:17:47 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {0x0}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xfeffffff, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:47 executing program 5 (fault-call:1 fault-nth:29): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000080), &(0x7f0000000100)=0x68) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r3, 0x0, 0x10005, 0x0) setsockopt$inet_dccp_int(r2, 0x21, 0xa, &(0x7f0000000140)=0x8d95, 0x4) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r5, 0x601, 0x0, 0x0, {0x9}}, 0x14}}, 0x0) sendmsg$TIPC_NL_SOCK_GET(r2, &(0x7f0000001300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1402410}, 0xc, &(0x7f00000012c0)={&(0x7f0000001180)={0x130, r5, 0xd20, 0x70bd29, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xe3b}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x800}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0x30, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5800000000000000}]}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_LINK={0x94, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x162}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8838}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}]}, 0x130}, 0x1, 0x0, 0x0, 0x20004080}, 0x1000) 13:17:47 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x7000000, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x20000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:47 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x8000000, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 553.238721][T11937] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 553.250032][T11941] FAULT_INJECTION: forcing a failure. [ 553.250032][T11941] name failslab, interval 1, probability 0, space 0, times 0 [ 553.256345][T11937] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 553.274056][T11941] CPU: 1 PID: 11941 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 13:17:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffa888, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 553.285743][T11941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 553.294642][T11940] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 553.295795][T11941] Call Trace: [ 553.295813][T11941] dump_stack+0x1d8/0x2f8 [ 553.295826][T11941] should_fail+0x555/0x770 [ 553.295841][T11941] __should_failslab+0x11a/0x160 [ 553.304686][T11940] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 553.307278][T11941] ? kzalloc+0x26/0x40 [ 553.307290][T11941] should_failslab+0x9/0x20 [ 553.307299][T11941] __kmalloc+0x7a/0x340 [ 553.307313][T11941] kzalloc+0x26/0x40 [ 553.352672][T11941] kobject_get_path+0xa7/0x1d0 [ 553.357421][T11941] kobject_uevent_env+0x2f2/0x1260 [ 553.362523][T11941] kobject_uevent+0x1f/0x30 [ 553.367019][T11941] loop_set_fd+0xd21/0x1180 [ 553.371504][T11941] lo_ioctl+0xd5/0x2200 [ 553.375642][T11941] ? __kasan_slab_free+0x12a/0x1e0 [ 553.380728][T11941] ? kasan_slab_free+0xe/0x10 [ 553.385400][T11941] ? kfree+0x115/0x200 [ 553.389563][T11941] ? tomoyo_path_number_perm+0x4e1/0x640 [ 553.395189][T11941] ? tomoyo_file_ioctl+0x23/0x30 [ 553.400120][T11941] ? security_file_ioctl+0x6d/0xd0 [ 553.405216][T11941] ? __x64_sys_ioctl+0xa3/0x120 [ 553.410049][T11941] ? do_syscall_64+0xfe/0x140 [ 553.414730][T11941] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 553.420814][T11941] ? debug_check_no_obj_freed+0x505/0x5b0 [ 553.426518][T11941] ? trace_lock_release+0x135/0x1a0 [ 553.431710][T11941] ? debug_check_no_obj_freed+0x505/0x5b0 [ 553.437414][T11941] ? rcu_lock_release+0x9/0x30 [ 553.442160][T11941] ? trace_lock_release+0x135/0x1a0 [ 553.447396][T11941] ? rcu_lock_release+0x9/0x30 [ 553.452168][T11941] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 553.457797][T11941] ? lo_release+0x1f0/0x1f0 [ 553.463755][T11941] blkdev_ioctl+0x807/0x2990 [ 553.468443][T11941] ? tomoyo_path_number_perm+0x53e/0x640 [ 553.474078][T11941] block_ioctl+0xbd/0x100 [ 553.478423][T11941] ? blkdev_iopoll+0x100/0x100 [ 553.483266][T11941] do_vfs_ioctl+0x744/0x1730 [ 553.487842][T11941] ? __fget+0x431/0x510 [ 553.491986][T11941] ? tomoyo_file_ioctl+0x23/0x30 [ 553.496906][T11941] ? security_file_ioctl+0xa1/0xd0 [ 553.501993][T11941] __x64_sys_ioctl+0xe3/0x120 [ 553.506650][T11941] do_syscall_64+0xfe/0x140 [ 553.511131][T11941] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 553.516997][T11941] RIP: 0033:0x4596e7 13:17:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x25000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xee9d2087ff074a21, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) [ 553.520883][T11941] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 553.540480][T11941] RSP: 002b:00007f0134a31a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 553.548875][T11941] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004596e7 [ 553.556835][T11941] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 553.564797][T11941] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 553.572749][T11941] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 553.580718][T11941] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:17:47 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x9000000, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 553.631928][T11953] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 553.654153][T11953] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 553.673559][T11959] netlink: 'syz-executor.4': attribute type 33 has an invalid length. 13:17:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x3f000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 553.682566][T11959] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 553.783516][T11970] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 553.810860][T11970] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:17:47 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {0x0}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff7f, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f00000000c0)={0x80000000, 0x400}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r2, &(0x7f0000000180)=""/4096, 0x1000) 13:17:47 executing program 5 (fault-call:1 fault-nth:30): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:47 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0xa000000, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x40000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:48 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0xb000000, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 554.076312][T11982] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 554.106937][T11986] FAULT_INJECTION: forcing a failure. [ 554.106937][T11986] name failslab, interval 1, probability 0, space 0, times 0 [ 554.113050][T11982] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 554.128649][T11986] CPU: 0 PID: 11986 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 554.136765][T11984] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 554.142622][T11986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 554.142626][T11986] Call Trace: [ 554.142647][T11986] dump_stack+0x1d8/0x2f8 [ 554.142660][T11986] should_fail+0x555/0x770 13:17:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x48000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 554.142672][T11986] __should_failslab+0x11a/0x160 [ 554.142684][T11986] should_failslab+0x9/0x20 [ 554.142694][T11986] kmem_cache_alloc_trace+0x5d/0x2f0 [ 554.142703][T11986] ? kobject_uevent_env+0x2cd/0x1260 [ 554.142710][T11986] ? dev_uevent_filter+0xb0/0xb0 [ 554.142719][T11986] kobject_uevent_env+0x2cd/0x1260 [ 554.142734][T11986] kobject_uevent+0x1f/0x30 [ 554.142744][T11986] loop_set_fd+0xd21/0x1180 [ 554.142760][T11986] lo_ioctl+0xd5/0x2200 [ 554.142768][T11986] ? __kasan_slab_free+0x12a/0x1e0 [ 554.142774][T11986] ? kasan_slab_free+0xe/0x10 [ 554.142781][T11986] ? kfree+0x115/0x200 [ 554.142790][T11986] ? tomoyo_path_number_perm+0x4e1/0x640 [ 554.142798][T11986] ? tomoyo_file_ioctl+0x23/0x30 [ 554.142805][T11986] ? security_file_ioctl+0x6d/0xd0 [ 554.142820][T11986] ? __x64_sys_ioctl+0xa3/0x120 [ 554.153609][T11984] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 554.161031][T11986] ? do_syscall_64+0xfe/0x140 [ 554.161041][T11986] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 554.161053][T11986] ? debug_check_no_obj_freed+0x505/0x5b0 [ 554.161065][T11986] ? trace_lock_release+0x135/0x1a0 [ 554.161071][T11986] ? debug_check_no_obj_freed+0x505/0x5b0 [ 554.161078][T11986] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 554.161086][T11986] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 554.161092][T11986] ? trace_hardirqs_on_caller+0x46/0x80 [ 554.161100][T11986] ? retint_kernel+0x2b/0x2b [ 554.161116][T11986] ? trace_hardirqs_on_caller+0x74/0x80 [ 554.319496][T11986] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 554.324945][T11986] ? rcu_lock_release+0x9/0x30 [ 554.329823][T11986] ? trace_lock_release+0x135/0x1a0 [ 554.335011][T11986] ? rcu_lock_release+0x9/0x30 [ 554.339760][T11986] ? trace_hardirqs_on+0x34/0x80 [ 554.344706][T11986] ? lo_release+0x1f0/0x1f0 [ 554.349205][T11986] blkdev_ioctl+0x807/0x2990 [ 554.353783][T11986] ? tomoyo_path_number_perm+0x53e/0x640 [ 554.359409][T11986] block_ioctl+0xbd/0x100 [ 554.363727][T11986] ? blkdev_iopoll+0x100/0x100 [ 554.368471][T11986] do_vfs_ioctl+0x744/0x1730 [ 554.373038][T11986] ? __fget+0x431/0x510 [ 554.377172][T11986] ? tomoyo_file_ioctl+0x23/0x30 [ 554.382090][T11986] ? security_file_ioctl+0xa1/0xd0 [ 554.387206][T11986] __x64_sys_ioctl+0xe3/0x120 [ 554.391864][T11986] do_syscall_64+0xfe/0x140 [ 554.396372][T11986] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 554.402245][T11986] RIP: 0033:0x4596e7 [ 554.406132][T11986] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:17:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff9e, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x60000, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) [ 554.425986][T11986] RSP: 002b:00007f0134a31a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 554.434445][T11986] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004596e7 [ 554.442598][T11986] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 554.450563][T11986] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 554.458579][T11986] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 554.466538][T11986] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:17:48 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0xc000000, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 554.529402][T11995] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 554.551394][T11995] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:17:48 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0xd000000, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 554.582399][T12001] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 554.602847][T12001] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:17:48 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x7, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x4c000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000001180)='/dev/zero\x00', 0x40000, 0x0) getsockname$packet(r4, &(0x7f00000011c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001200)=0x14) splice(r2, 0x0, r3, 0x0, 0x10005, 0x0) setsockopt$inet_dccp_int(r2, 0x21, 0xa, &(0x7f0000000140)=0x8d95, 0x4) setsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f0000000100)=0x12, 0x4) r5 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_ifreq(r5, 0x89f2, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r5, 0x84, 0x20, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 13:17:48 executing program 5 (fault-call:1 fault-nth:31): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffffc3, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:48 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0xe000000, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffffef, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:48 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x10000000, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x60000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 555.007230][T12022] FAULT_INJECTION: forcing a failure. [ 555.007230][T12022] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 555.020452][T12022] CPU: 0 PID: 12022 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 555.028330][T12022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 555.038373][T12022] Call Trace: [ 555.041664][T12022] dump_stack+0x1d8/0x2f8 [ 555.045989][T12022] should_fail+0x555/0x770 [ 555.050394][T12022] should_fail_alloc_page+0x55/0x60 [ 555.055572][T12022] prepare_alloc_pages+0x283/0x470 [ 555.060670][T12022] __alloc_pages_nodemask+0xb2/0x5d0 [ 555.065941][T12022] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 555.071390][T12022] kmem_getpages+0x56/0xa20 [ 555.075880][T12022] cache_grow_begin+0x7e/0x2c0 [ 555.080893][T12022] cache_alloc_refill+0x311/0x3f0 [ 555.086020][T12022] ? check_preemption_disabled+0xb7/0x2a0 [ 555.091728][T12022] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 555.097222][T12022] ? kobject_uevent_env+0x2cd/0x1260 [ 555.102499][T12022] ? dev_uevent_filter+0xb0/0xb0 [ 555.107551][T12022] kobject_uevent_env+0x2cd/0x1260 [ 555.112667][T12022] kobject_uevent+0x1f/0x30 [ 555.117155][T12022] loop_set_fd+0xd21/0x1180 [ 555.121645][T12022] lo_ioctl+0xd5/0x2200 [ 555.125784][T12022] ? _raw_spin_unlock_irq+0x69/0x80 [ 555.130964][T12022] ? finish_lock_switch+0x31/0x40 [ 555.135972][T12022] ? finish_task_switch+0x251/0x550 [ 555.141271][T12022] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 555.146712][T12022] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 555.152329][T12022] ? trace_hardirqs_on_caller+0x46/0x80 [ 555.157853][T12022] ? retint_kernel+0x2b/0x2b [ 555.162425][T12022] ? trace_hardirqs_on_caller+0x74/0x80 [ 555.167966][T12022] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 555.173406][T12022] ? check_preemption_disabled+0xa9/0x2a0 [ 555.179111][T12022] ? retint_kernel+0x2b/0x2b [ 555.183680][T12022] ? blkdev_ioctl+0x47/0x2990 [ 555.188348][T12022] ? lo_release+0x1f0/0x1f0 [ 555.192831][T12022] blkdev_ioctl+0x807/0x2990 [ 555.197416][T12022] ? tomoyo_path_number_perm+0x53e/0x640 [ 555.203048][T12022] block_ioctl+0xbd/0x100 [ 555.207357][T12022] ? blkdev_iopoll+0x100/0x100 [ 555.212101][T12022] do_vfs_ioctl+0x744/0x1730 [ 555.216668][T12022] ? __fget+0x431/0x510 [ 555.220803][T12022] ? tomoyo_file_ioctl+0x23/0x30 [ 555.225733][T12022] ? security_file_ioctl+0xa1/0xd0 [ 555.230825][T12022] __x64_sys_ioctl+0xe3/0x120 [ 555.235491][T12022] do_syscall_64+0xfe/0x140 [ 555.240005][T12022] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 555.246415][T12022] RIP: 0033:0x4596e7 [ 555.250293][T12022] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 555.269895][T12022] RSP: 002b:00007f0134a31a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 555.278304][T12022] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004596e7 [ 555.287427][T12022] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 555.295381][T12022] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 13:17:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008914, &(0x7f0000000080)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) [ 555.303448][T12022] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 555.311425][T12022] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:17:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x630d0000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:49 executing program 5 (fault-call:1 fault-nth:32): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 555.520278][T12060] FAULT_INJECTION: forcing a failure. [ 555.520278][T12060] name failslab, interval 1, probability 0, space 0, times 0 [ 555.535869][T12060] CPU: 1 PID: 12060 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 555.543938][T12060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 555.554039][T12060] Call Trace: [ 555.557313][T12060] dump_stack+0x1d8/0x2f8 [ 555.561624][T12060] should_fail+0x555/0x770 [ 555.566016][T12060] __should_failslab+0x11a/0x160 [ 555.570956][T12060] ? kzalloc+0x26/0x40 [ 555.575000][T12060] should_failslab+0x9/0x20 [ 555.579475][T12060] __kmalloc+0x7a/0x340 [ 555.583624][T12060] kzalloc+0x26/0x40 [ 555.587505][T12060] kobject_get_path+0xa7/0x1d0 [ 555.592241][T12060] kobject_uevent_env+0x2f2/0x1260 [ 555.597329][T12060] kobject_uevent+0x1f/0x30 [ 555.601807][T12060] loop_set_fd+0xd21/0x1180 [ 555.606306][T12060] lo_ioctl+0xd5/0x2200 [ 555.610443][T12060] ? __kasan_slab_free+0x12a/0x1e0 [ 555.615533][T12060] ? kasan_slab_free+0xe/0x10 [ 555.620186][T12060] ? kfree+0x115/0x200 [ 555.624243][T12060] ? tomoyo_path_number_perm+0x4e1/0x640 [ 555.629848][T12060] ? tomoyo_file_ioctl+0x23/0x30 [ 555.634755][T12060] ? security_file_ioctl+0x6d/0xd0 [ 555.639851][T12060] ? __x64_sys_ioctl+0xa3/0x120 [ 555.644676][T12060] ? do_syscall_64+0xfe/0x140 [ 555.649323][T12060] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 555.655383][T12060] ? debug_check_no_obj_freed+0x505/0x5b0 [ 555.661079][T12060] ? trace_lock_release+0x135/0x1a0 [ 555.666248][T12060] ? debug_check_no_obj_freed+0x505/0x5b0 [ 555.671940][T12060] ? rcu_lock_release+0x9/0x30 [ 555.676687][T12060] ? trace_lock_release+0x135/0x1a0 [ 555.681858][T12060] ? rcu_lock_release+0x9/0x30 [ 555.686596][T12060] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 555.692204][T12060] ? lo_release+0x1f0/0x1f0 [ 555.696681][T12060] blkdev_ioctl+0x807/0x2990 [ 555.701246][T12060] ? tomoyo_path_number_perm+0x53e/0x640 [ 555.706882][T12060] block_ioctl+0xbd/0x100 [ 555.711192][T12060] ? blkdev_iopoll+0x100/0x100 [ 555.715931][T12060] do_vfs_ioctl+0x744/0x1730 [ 555.720505][T12060] ? __fget+0x431/0x510 [ 555.725224][T12060] ? tomoyo_file_ioctl+0x23/0x30 [ 555.730145][T12060] ? security_file_ioctl+0xa1/0xd0 [ 555.735257][T12060] __x64_sys_ioctl+0xe3/0x120 [ 555.739970][T12060] do_syscall_64+0xfe/0x140 [ 555.744478][T12060] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 555.750348][T12060] RIP: 0033:0x4596e7 [ 555.754222][T12060] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 555.774291][T12060] RSP: 002b:00007f0134a31a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 555.782688][T12060] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004596e7 [ 555.790757][T12060] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 555.798714][T12060] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 555.806665][T12060] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 13:17:49 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x7, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:49 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x11000000, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/dsp\x00', 0x917100, 0x0) ioctl$SIOCGETNODEID(r1, 0x89e1, &(0x7f0000001400)={0x4}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x880000, 0x0) read$alg(r2, &(0x7f0000000180)=""/4096, 0x1000) sysfs$2(0x2, 0x9, &(0x7f0000000080)=""/97) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x800) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001180)={r3, 0x14, 0x1, 0x9, &(0x7f0000000140)=[0x0, 0x0], 0x2}, 0x20) 13:17:49 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xfffffff0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x65580000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 555.814844][T12060] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:17:49 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x12000000, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:49 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xfffffffe, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x68000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:49 executing program 5 (fault-call:1 fault-nth:33): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(0xffffffffffffffff, 0xc05c5340, &(0x7f0000001200)={0x71d, 0x1, 0x1ff, {}, 0x8000, 0x4}) setsockopt$inet_dccp_int(r1, 0x21, 0xa, &(0x7f0000000140)=0x8d95, 0x4) r4 = getpgrp(0xffffffffffffffff) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) write$FUSE_LK(r1, &(0x7f00000011c0)={0x28, 0x0, 0x6, {{0x6, 0xffffffff, 0x0, r4}}}, 0x28) unshare(0x24020400) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r5, &(0x7f0000000180)=""/4096, 0x1000) recvmsg(0xffffffffffffffff, &(0x7f00000027c0)={&(0x7f0000001280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000002640)=[{&(0x7f0000001300)=""/159, 0x9f}, {&(0x7f00000013c0)=""/116, 0x74}, {&(0x7f0000001440)=""/173, 0xad}, {&(0x7f0000001500)=""/55, 0x37}, {&(0x7f0000001540)=""/71, 0x47}, {&(0x7f00000015c0)=""/4096, 0x1000}, {&(0x7f00000025c0)=""/85, 0x55}], 0x7, &(0x7f00000026c0)=""/201, 0xc9}, 0x2141) r6 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x400, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') sendmsg$FOU_CMD_ADD(r7, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000540)={0x24, r8, 0x101, 0x0, 0x0, {}, [@FOU_ATTR_TYPE={0x8}, @FOU_ATTR_AF={0x8, 0x2, 0xa}]}, 0x24}}, 0x0) r9 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x9, 0x0) ioctl$IMCTRLREQ(r9, 0x80044945, &(0x7f00000001c0)={0x4009, 0x9, 0x6, 0x6}) r10 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r10, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1e}}}, 0x24) accept4$packet(r9, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000580)=0x14, 0x800) bind$can_raw(r10, &(0x7f00000005c0)={0x1d, r11}, 0x10) sendmsg$FOU_CMD_DEL(r6, &(0x7f0000001180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r8, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_IFINDEX={0x8, 0xb, r11}]}, 0x24}, 0x1, 0x0, 0x0, 0x18000}, 0x11) 13:17:49 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x40030000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:49 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x25000000, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 556.089400][T12093] FAULT_INJECTION: forcing a failure. [ 556.089400][T12093] name failslab, interval 1, probability 0, space 0, times 0 [ 556.105304][T12093] CPU: 0 PID: 12093 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 556.113223][T12093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 556.123381][T12093] Call Trace: [ 556.126656][T12093] dump_stack+0x1d8/0x2f8 [ 556.131084][T12093] should_fail+0x555/0x770 [ 556.135490][T12093] __should_failslab+0x11a/0x160 [ 556.140408][T12093] ? skb_clone+0x1cc/0x380 [ 556.144812][T12093] should_failslab+0x9/0x20 [ 556.149445][T12093] kmem_cache_alloc+0x56/0x2e0 [ 556.154359][T12093] skb_clone+0x1cc/0x380 [ 556.158591][T12093] netlink_broadcast_filtered+0x619/0x1090 [ 556.164392][T12093] netlink_broadcast+0x3a/0x50 [ 556.169245][T12093] kobject_uevent_env+0xcf0/0x1260 [ 556.174336][T12093] kobject_uevent+0x1f/0x30 [ 556.178888][T12093] loop_set_fd+0xd21/0x1180 [ 556.183438][T12093] lo_ioctl+0xd5/0x2200 [ 556.187657][T12093] ? __kasan_slab_free+0x12a/0x1e0 [ 556.192744][T12093] ? kasan_slab_free+0xe/0x10 [ 556.197518][T12093] ? kfree+0x115/0x200 [ 556.201603][T12093] ? tomoyo_path_number_perm+0x4e1/0x640 [ 556.207235][T12093] ? tomoyo_file_ioctl+0x23/0x30 [ 556.212628][T12093] ? security_file_ioctl+0x6d/0xd0 [ 556.217735][T12093] ? __x64_sys_ioctl+0xa3/0x120 [ 556.223538][T12093] ? do_syscall_64+0xfe/0x140 [ 556.228193][T12093] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 556.234267][T12093] ? debug_check_no_obj_freed+0x505/0x5b0 [ 556.239973][T12093] ? trace_lock_release+0x135/0x1a0 [ 556.245172][T12093] ? debug_check_no_obj_freed+0x505/0x5b0 [ 556.250994][T12093] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 556.256456][T12093] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 556.262081][T12093] ? trace_hardirqs_on_caller+0x46/0x80 [ 556.267827][T12093] ? retint_kernel+0x2b/0x2b [ 556.272400][T12093] ? trace_hardirqs_on_caller+0x74/0x80 [ 556.278065][T12093] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 556.283529][T12093] ? rcu_lock_release+0x9/0x30 [ 556.288274][T12093] ? trace_lock_release+0x135/0x1a0 [ 556.293468][T12093] ? rcu_lock_release+0x9/0x30 [ 556.298212][T12093] ? trace_hardirqs_on+0x34/0x80 [ 556.303136][T12093] ? lo_release+0x1f0/0x1f0 [ 556.307632][T12093] blkdev_ioctl+0x807/0x2990 [ 556.312201][T12093] ? tomoyo_path_number_perm+0x53e/0x640 [ 556.317814][T12093] block_ioctl+0xbd/0x100 [ 556.322132][T12093] ? blkdev_iopoll+0x100/0x100 [ 556.326883][T12093] do_vfs_ioctl+0x744/0x1730 [ 556.331467][T12093] ? __fget+0x431/0x510 [ 556.335603][T12093] ? tomoyo_file_ioctl+0x23/0x30 [ 556.340529][T12093] ? security_file_ioctl+0xa1/0xd0 [ 556.345631][T12093] __x64_sys_ioctl+0xe3/0x120 [ 556.350299][T12093] do_syscall_64+0xfe/0x140 [ 556.354904][T12093] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 556.360794][T12093] RIP: 0033:0x4596e7 [ 556.364678][T12093] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 556.384525][T12093] RSP: 002b:00007f0134a31a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 556.392922][T12093] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004596e7 [ 556.401022][T12093] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 556.409105][T12093] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 556.417059][T12093] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 556.425295][T12093] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:17:50 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x7, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x6c000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x1, &(0x7f0000000100)=[{&(0x7f0000001180)="9dae295e2b3fa5f3b25ef767f013b4de53d1a51d2246795945e98408c8d0b14f9bcc184a8690513bd6a9c09902cbbd29ff018306d79f0c758c50ae0eebd731b8f0cf8d70abd59413c447f54ed1619d86aa99aebcfd78f741184df537943008e6e0d8781262f050e87753cf8cb68f2a2c15f00a1b19aa371a96694f25a12146f820538688fd17caeaf43722dd194111f05b11ce690c777abe172dfa31859d49cd7a7096e61cba4b78d8fa5c601e462e46d6c356aa97338f2886709a373e912d4e3657b31bb3f5c38e59a06677e4bbdb1d12715baf5b7440fb33c3bc06cd5d8bf7ce917235509248cadb3aea4763234e", 0xef, 0xfff}], 0x2040000, &(0x7f0000001280)={[{@gqnoenforce='gqnoenforce'}, {@grpquota='grpquota'}, {@uquota='uquota'}, {@gquota='gquota'}, {@wsync='wsync'}, {@filestreams='filestreams'}, {@wsync='wsync'}, {@nobarrier='nobarrier'}, {@gqnoenforce='gqnoenforce'}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@smackfsroot={'smackfsroot', 0x3d, ']-bdev:'}}, {@audit='audit'}, {@smackfsfloor={'smackfsfloor'}}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xc02040, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) 13:17:50 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x40000000, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x100000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:50 executing program 5 (fault-call:1 fault-nth:34): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:50 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x5c000000, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x200000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x74000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 556.788579][T12112] FAULT_INJECTION: forcing a failure. [ 556.788579][T12112] name failslab, interval 1, probability 0, space 0, times 0 [ 556.820913][T12112] CPU: 0 PID: 12112 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 556.828843][T12112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 556.838890][T12112] Call Trace: [ 556.838911][T12112] dump_stack+0x1d8/0x2f8 [ 556.838924][T12112] should_fail+0x555/0x770 [ 556.838937][T12112] __should_failslab+0x11a/0x160 [ 556.838947][T12112] ? getname_flags+0xba/0x640 [ 556.838956][T12112] should_failslab+0x9/0x20 [ 556.838964][T12112] kmem_cache_alloc+0x56/0x2e0 [ 556.838972][T12112] ? __kasan_check_write+0x14/0x20 [ 556.838983][T12112] getname_flags+0xba/0x640 [ 556.838997][T12112] do_mkdirat+0x3c/0x320 [ 556.850989][T12112] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 556.850996][T12112] ? trace_hardirqs_off_caller+0x58/0x80 [ 556.851005][T12112] ? do_syscall_64+0x1d/0x140 [ 556.851020][T12112] __x64_sys_mkdir+0x60/0x70 [ 556.851028][T12112] do_syscall_64+0xfe/0x140 [ 556.851039][T12112] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 556.851052][T12112] RIP: 0033:0x458c97 [ 556.860631][T12112] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:17:50 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0xc0405602, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x300000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x7a000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 556.860636][T12112] RSP: 002b:00007f0134a31a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 556.860645][T12112] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458c97 [ 556.860655][T12112] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 556.869874][T12112] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 556.869880][T12112] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 556.869885][T12112] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:17:51 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {0x0}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x400000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x81000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:51 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x1000000000000, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x400000, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f00000000c0)=0x4) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) 13:17:51 executing program 5 (fault-call:1 fault-nth:35): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:51 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x100000000000000, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x88470000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x500000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) futex(&(0x7f0000000080), 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x89f2, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000000)=@sack_info={r4, 0x0, 0xffff}, 0xc) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={r4, 0x7}, 0x8) unshare(0x24020400) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r5, &(0x7f0000000180)=""/4096, 0x1000) [ 557.674710][T12144] FAULT_INJECTION: forcing a failure. [ 557.674710][T12144] name failslab, interval 1, probability 0, space 0, times 0 [ 557.711052][T12144] CPU: 1 PID: 12144 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 557.718986][T12144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 557.729047][T12144] Call Trace: [ 557.732359][T12144] dump_stack+0x1d8/0x2f8 [ 557.736724][T12144] should_fail+0x555/0x770 [ 557.742382][T12144] __should_failslab+0x11a/0x160 [ 557.747350][T12144] ? skb_clone+0x1cc/0x380 [ 557.751777][T12144] should_failslab+0x9/0x20 [ 557.756284][T12144] kmem_cache_alloc+0x56/0x2e0 [ 557.761055][T12144] skb_clone+0x1cc/0x380 [ 557.766080][T12144] netlink_broadcast_filtered+0x619/0x1090 [ 557.771890][T12144] netlink_broadcast+0x3a/0x50 [ 557.776652][T12144] kobject_uevent_env+0xcf0/0x1260 [ 557.781766][T12144] kobject_uevent+0x1f/0x30 [ 557.786269][T12144] loop_set_fd+0xd21/0x1180 [ 557.790775][T12144] lo_ioctl+0xd5/0x2200 [ 557.795970][T12144] ? __kasan_slab_free+0x12a/0x1e0 [ 557.801072][T12144] ? kasan_slab_free+0xe/0x10 [ 557.805832][T12144] ? kfree+0x115/0x200 [ 557.809900][T12144] ? tomoyo_path_number_perm+0x4e1/0x640 [ 557.815550][T12144] ? tomoyo_file_ioctl+0x23/0x30 [ 557.820490][T12144] ? security_file_ioctl+0x6d/0xd0 [ 557.825598][T12144] ? __x64_sys_ioctl+0xa3/0x120 [ 557.830442][T12144] ? do_syscall_64+0xfe/0x140 [ 557.835117][T12144] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 557.841184][T12144] ? debug_check_no_obj_freed+0x505/0x5b0 [ 557.847055][T12144] ? trace_lock_release+0x135/0x1a0 [ 557.852270][T12144] ? debug_check_no_obj_freed+0x505/0x5b0 [ 557.858006][T12144] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 557.863470][T12144] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 557.869106][T12144] ? trace_hardirqs_on_caller+0x46/0x80 [ 557.874649][T12144] ? retint_kernel+0x2b/0x2b [ 557.879237][T12144] ? trace_hardirqs_on_caller+0x74/0x80 [ 557.884787][T12144] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 557.890247][T12144] ? rcu_lock_release+0x9/0x30 [ 557.895007][T12144] ? trace_lock_release+0x135/0x1a0 [ 557.900197][T12144] ? rcu_lock_release+0x9/0x30 [ 557.904964][T12144] ? trace_hardirqs_on+0x34/0x80 [ 557.909899][T12144] ? lo_release+0x1f0/0x1f0 [ 557.914396][T12144] blkdev_ioctl+0x807/0x2990 [ 557.918984][T12144] ? tomoyo_path_number_perm+0x53e/0x640 [ 557.924622][T12144] block_ioctl+0xbd/0x100 [ 557.928987][T12144] ? blkdev_iopoll+0x100/0x100 [ 557.933746][T12144] do_vfs_ioctl+0x744/0x1730 [ 557.938326][T12144] ? __fget+0x431/0x510 [ 557.942482][T12144] ? tomoyo_file_ioctl+0x23/0x30 [ 557.947414][T12144] ? security_file_ioctl+0xa1/0xd0 [ 557.952610][T12144] __x64_sys_ioctl+0xe3/0x120 [ 557.957286][T12144] do_syscall_64+0xfe/0x140 [ 557.961908][T12144] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 557.967800][T12144] RIP: 0033:0x4596e7 [ 557.971706][T12144] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 557.991321][T12144] RSP: 002b:00007f0134a31a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 557.999731][T12144] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 00000000004596e7 [ 558.007697][T12144] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 558.015661][T12144] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 558.023629][T12144] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 558.031597][T12144] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 558.064873][T12154] validate_nla: 23 callbacks suppressed 13:17:51 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x200000000000000, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 558.064879][T12154] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 558.095661][T12154] net_ratelimit: 19 callbacks suppressed [ 558.095667][T12154] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:17:52 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x25640c000000000, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 558.132345][T12156] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 558.165193][T12156] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:17:52 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {0x0}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:52 executing program 5 (fault-call:1 fault-nth:36): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:52 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x600000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x88480000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:52 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x300000000000000, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000080)) 13:17:52 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x400000000000000, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 558.503754][T12168] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 558.512192][T12171] FAULT_INJECTION: forcing a failure. [ 558.512192][T12171] name failslab, interval 1, probability 0, space 0, times 0 [ 558.527622][T12168] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 558.534641][T12171] CPU: 1 PID: 12171 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 558.550756][T12171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 558.550760][T12171] Call Trace: [ 558.550777][T12171] dump_stack+0x1d8/0x2f8 [ 558.550796][T12171] should_fail+0x555/0x770 [ 558.550808][T12171] __should_failslab+0x11a/0x160 [ 558.550819][T12171] ? getname_flags+0xba/0x640 [ 558.550835][T12171] should_failslab+0x9/0x20 [ 558.568502][T12171] kmem_cache_alloc+0x56/0x2e0 [ 558.568512][T12171] ? __kasan_check_write+0x14/0x20 [ 558.568524][T12171] getname_flags+0xba/0x640 [ 558.568534][T12171] do_mkdirat+0x3c/0x320 [ 558.568547][T12171] ? trace_irq_disable_rcuidle+0x23/0x1e0 [ 558.577874][T12171] ? trace_hardirqs_off_caller+0x58/0x80 [ 558.577885][T12171] ? do_syscall_64+0x1d/0x140 [ 558.577895][T12171] __x64_sys_mkdir+0x60/0x70 [ 558.577909][T12171] do_syscall_64+0xfe/0x140 [ 558.577921][T12171] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 558.577933][T12171] RIP: 0033:0x458c97 [ 558.641146][T12171] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 558.660747][T12171] RSP: 002b:00007f0134a31a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 558.669158][T12171] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458c97 [ 558.677126][T12171] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 558.685191][T12171] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 558.693191][T12171] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 13:17:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x88a8ffff, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 558.701163][T12171] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 558.722589][T12173] netlink: 'syz-executor.4': attribute type 33 has an invalid length. 13:17:52 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x500000000000000, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:52 executing program 5 (fault-call:1 fault-nth:37): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 558.743872][T12173] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:17:52 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x600000000000000, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:52 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x700000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 558.806153][T12183] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 558.847765][T12183] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 558.883330][T12187] FAULT_INJECTION: forcing a failure. [ 558.883330][T12187] name failslab, interval 1, probability 0, space 0, times 0 [ 558.897525][T12187] CPU: 0 PID: 12187 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 558.905451][T12187] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 558.915520][T12187] Call Trace: [ 558.918821][T12187] dump_stack+0x1d8/0x2f8 [ 558.923178][T12187] should_fail+0x555/0x770 [ 558.927622][T12187] __should_failslab+0x11a/0x160 [ 558.932573][T12187] ? ext4_alloc_inode+0x1f/0x560 [ 558.937524][T12187] should_failslab+0x9/0x20 [ 558.942045][T12187] kmem_cache_alloc+0x56/0x2e0 [ 558.946821][T12187] ? retint_kernel+0x2b/0x2b [ 558.951432][T12187] ? set_qf_name+0x3c0/0x3c0 [ 558.956037][T12187] ext4_alloc_inode+0x1f/0x560 [ 558.960816][T12187] ? set_qf_name+0x3c0/0x3c0 [ 558.965425][T12187] new_inode_pseudo+0x68/0x240 [ 558.970674][T12187] new_inode+0x28/0x1c0 [ 558.974848][T12187] ? trace_ext4_request_inode+0x28b/0x2d0 [ 558.980585][T12187] __ext4_new_inode+0x43d/0x5650 [ 558.986423][T12187] ? memset+0x31/0x40 [ 558.990421][T12187] ? smk_curacc+0xa3/0xe0 [ 558.994771][T12187] ext4_mkdir+0x3f5/0x1450 [ 558.999211][T12187] ? security_inode_permission+0xdd/0x120 [ 559.005049][T12187] vfs_mkdir+0x43f/0x610 [ 559.009555][T12187] do_mkdirat+0x1d7/0x320 [ 559.014013][T12187] __x64_sys_mkdir+0x60/0x70 [ 559.018630][T12187] do_syscall_64+0xfe/0x140 [ 559.023150][T12187] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 559.029050][T12187] RIP: 0033:0x458c97 [ 559.032946][T12187] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 559.052557][T12187] RSP: 002b:00007f0134a31a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 559.061246][T12187] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458c97 [ 559.069227][T12187] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 559.077217][T12187] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 559.085312][T12187] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 559.093295][T12187] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 559.106512][T12191] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 559.125149][T12191] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:17:53 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {0x0}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:53 executing program 5 (fault-call:1 fault-nth:38): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x800000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x9effffff, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:53 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x700000000000000, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 559.365869][T12199] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 559.377343][T12199] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 559.403657][T12198] FAULT_INJECTION: forcing a failure. [ 559.403657][T12198] name failslab, interval 1, probability 0, space 0, times 0 13:17:53 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x800000000000000, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 559.437575][T12198] CPU: 1 PID: 12198 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 559.445526][T12198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 559.455591][T12198] Call Trace: [ 559.458898][T12198] dump_stack+0x1d8/0x2f8 [ 559.463396][T12198] should_fail+0x555/0x770 [ 559.467940][T12198] __should_failslab+0x11a/0x160 [ 559.472906][T12198] ? __d_alloc+0x2d/0x6e0 [ 559.477272][T12198] should_failslab+0x9/0x20 [ 559.481802][T12198] kmem_cache_alloc+0x56/0x2e0 13:17:53 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x900000000000000, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 559.486573][T12198] __d_alloc+0x2d/0x6e0 [ 559.490743][T12198] d_alloc+0x4e/0x1d0 [ 559.494742][T12198] __lookup_hash+0xe5/0x290 [ 559.500747][T12198] filename_create+0x14f/0x670 [ 559.505992][T12198] ? getname_flags+0x214/0x640 [ 559.510768][T12198] do_mkdirat+0x5a/0x320 [ 559.515019][T12198] ? trace_hardirqs_off_caller+0x58/0x80 [ 559.520660][T12198] __x64_sys_mkdir+0x60/0x70 [ 559.525257][T12198] do_syscall_64+0xfe/0x140 [ 559.529766][T12198] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 559.535663][T12198] RIP: 0033:0x458c97 [ 559.539556][T12198] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 559.559162][T12198] RSP: 002b:00007f0134a31a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 559.567571][T12198] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458c97 [ 559.578502][T12198] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 13:17:53 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0xa00000000000000, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x900000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 559.586469][T12198] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 559.594446][T12198] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 559.602501][T12198] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 559.622129][T12203] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 559.664025][T12203] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:17:53 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0xb00000000000000, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xc3ffffff, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:53 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0xc00000000000000, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 559.735596][T12214] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 559.767610][T12214] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 559.830256][T12218] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 559.847264][T12218] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:17:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xa00000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:54 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x7, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:54 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0xd00000000000000, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:54 executing program 5 (fault-call:1 fault-nth:39): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xefffffff, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:54 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0xe00000000000000, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xb00000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 560.200488][T12227] FAULT_INJECTION: forcing a failure. [ 560.200488][T12227] name failslab, interval 1, probability 0, space 0, times 0 13:17:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xf0ffffff, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 560.287837][T12227] CPU: 1 PID: 12227 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 560.296907][T12227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 560.296912][T12227] Call Trace: [ 560.296931][T12227] dump_stack+0x1d8/0x2f8 [ 560.296946][T12227] should_fail+0x555/0x770 [ 560.296961][T12227] __should_failslab+0x11a/0x160 [ 560.323968][T12227] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 560.329682][T12227] should_failslab+0x9/0x20 [ 560.329692][T12227] __kmalloc+0x7a/0x340 [ 560.329703][T12227] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 560.329716][T12227] tomoyo_realpath_from_path+0xdc/0x7c0 [ 560.349775][T12227] tomoyo_path_number_perm+0x166/0x640 [ 560.355284][T12227] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 560.360926][T12227] ? trace_kmem_cache_free+0xa0/0x110 [ 560.366316][T12227] tomoyo_path_mkdir+0x9c/0xc0 [ 560.371089][T12227] security_path_mkdir+0xed/0x170 [ 560.376122][T12227] do_mkdirat+0x15c/0x320 [ 560.380455][T12227] __x64_sys_mkdir+0x60/0x70 [ 560.385055][T12227] do_syscall_64+0xfe/0x140 [ 560.389559][T12227] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 560.395450][T12227] RIP: 0033:0x458c97 [ 560.399348][T12227] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 560.418961][T12227] RSP: 002b:00007f0134a31a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 560.427495][T12227] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458c97 13:17:54 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x1000000000000000, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:54 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x1100000000000000, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 560.435478][T12227] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 560.443617][T12227] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 560.451802][T12227] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 560.459782][T12227] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:17:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xc00000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xfeffffff, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xd00000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 560.632431][T12227] ERROR: Out of memory at tomoyo_realpath_from_path. 13:17:54 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x7, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:54 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x1200000000000000, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xffffa888, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xe00000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:54 executing program 5 (fault-call:1 fault-nth:40): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 561.101410][T12258] FAULT_INJECTION: forcing a failure. [ 561.101410][T12258] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 561.114652][T12258] CPU: 1 PID: 12258 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 561.122542][T12258] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 561.132596][T12258] Call Trace: [ 561.135894][T12258] dump_stack+0x1d8/0x2f8 [ 561.140253][T12258] should_fail+0x555/0x770 [ 561.140269][T12258] should_fail_alloc_page+0x55/0x60 [ 561.140277][T12258] prepare_alloc_pages+0x283/0x470 [ 561.140292][T12258] __alloc_pages_nodemask+0xb2/0x5d0 [ 561.149884][T12258] ? rcu_lock_release+0x26/0x30 [ 561.149893][T12258] ? is_bpf_text_address+0x398/0x3b0 [ 561.149907][T12258] kmem_getpages+0x56/0xa20 [ 561.174864][T12258] cache_grow_begin+0x7e/0x2c0 [ 561.179630][T12258] cache_alloc_refill+0x311/0x3f0 [ 561.184647][T12258] ? check_preemption_disabled+0xb7/0x2a0 [ 561.190361][T12258] __kmalloc+0x318/0x340 [ 561.194595][T12258] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 561.200309][T12258] tomoyo_realpath_from_path+0xdc/0x7c0 [ 561.205852][T12258] tomoyo_path_number_perm+0x166/0x640 [ 561.211496][T12258] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 561.217130][T12258] ? trace_kmem_cache_free+0xa0/0x110 [ 561.222500][T12258] tomoyo_path_mkdir+0x9c/0xc0 [ 561.227264][T12258] security_path_mkdir+0xed/0x170 [ 561.232283][T12258] do_mkdirat+0x15c/0x320 [ 561.236607][T12258] __x64_sys_mkdir+0x60/0x70 [ 561.241195][T12258] do_syscall_64+0xfe/0x140 [ 561.245694][T12258] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 561.251578][T12258] RIP: 0033:0x458c97 [ 561.255465][T12258] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 561.275063][T12258] RSP: 002b:00007f0134a31a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 561.283622][T12258] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458c97 [ 561.291611][T12258] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 13:17:55 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x2500000000000000, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xffffff7f, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:55 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xf00000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 561.299858][T12258] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 561.307838][T12258] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 561.315815][T12258] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:17:55 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x4000000000000000, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:55 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x1000000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xffffff9e, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:55 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x5c00000000000000, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:55 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x7, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:55 executing program 5 (fault-call:1 fault-nth:41): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:55 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x1100000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xffffffc3, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:55 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0xffffffff00000000, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 561.952560][T12281] FAULT_INJECTION: forcing a failure. [ 561.952560][T12281] name failslab, interval 1, probability 0, space 0, times 0 [ 562.000946][T12281] CPU: 0 PID: 12281 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 562.008871][T12281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 562.018934][T12281] Call Trace: [ 562.022238][T12281] dump_stack+0x1d8/0x2f8 [ 562.026568][T12281] should_fail+0x555/0x770 [ 562.030979][T12281] __should_failslab+0x11a/0x160 [ 562.035919][T12281] ? kcalloc+0x2f/0x50 [ 562.039996][T12281] should_failslab+0x9/0x20 [ 562.044501][T12281] __kmalloc+0x7a/0x340 [ 562.048666][T12281] ? debug_check_no_obj_freed+0x505/0x5b0 [ 562.054394][T12281] kcalloc+0x2f/0x50 [ 562.058294][T12281] ext4_find_extent+0x216/0xaa0 [ 562.063150][T12281] ? trace_ext4_ext_map_blocks_enter+0x2ca/0x310 [ 562.069471][T12281] ext4_ext_map_blocks+0x170/0x7180 [ 562.074677][T12281] ? __kasan_check_read+0x11/0x20 [ 562.079712][T12281] ? mark_buffer_dirty+0x280/0x2e0 [ 562.084833][T12281] ? ext4_es_lookup_extent+0x4a7/0x5a0 [ 562.090293][T12281] ? trace_lock_acquire+0x159/0x1d0 [ 562.095508][T12281] ? __kasan_check_write+0x14/0x20 [ 562.100631][T12281] ext4_map_blocks+0x8f2/0x1e50 [ 562.105494][T12281] ? __kasan_check_write+0x14/0x20 [ 562.110630][T12281] ext4_getblk+0xae/0x460 [ 562.114972][T12281] ext4_bread+0x4a/0x240 [ 562.119225][T12281] ext4_append+0x175/0x310 [ 562.123655][T12281] ext4_mkdir+0x7ad/0x1450 [ 562.128078][T12281] vfs_mkdir+0x43f/0x610 [ 562.132314][T12281] do_mkdirat+0x1d7/0x320 [ 562.136644][T12281] __x64_sys_mkdir+0x60/0x70 [ 562.141238][T12281] do_syscall_64+0xfe/0x140 [ 562.145749][T12281] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 562.151641][T12281] RIP: 0033:0x458c97 [ 562.155538][T12281] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 562.175138][T12281] RSP: 002b:00007f0134a31a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 562.183561][T12281] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458c97 [ 562.191530][T12281] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 13:17:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x1200000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xffffffef, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:56 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84507255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) [ 562.199502][T12281] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 562.207475][T12281] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 562.215443][T12281] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:17:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xfffffff0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2000000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:56 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf5e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xfffffffe, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:56 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {0x0}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x2500000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:56 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de5ea002f0ee1528d35b1f6ce2b535d9"}) 13:17:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x40030000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:56 executing program 5 (fault-call:1 fault-nth:42): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x100000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:56 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea003f0ee1528d35b1f6ce2b535d9"}) 13:17:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x3f00000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 562.835762][T12315] FAULT_INJECTION: forcing a failure. [ 562.835762][T12315] name failslab, interval 1, probability 0, space 0, times 0 [ 562.873095][T12315] CPU: 0 PID: 12315 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 562.881022][T12315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 562.891077][T12315] Call Trace: [ 562.894372][T12315] dump_stack+0x1d8/0x2f8 [ 562.898709][T12315] should_fail+0x555/0x770 [ 562.903140][T12315] __should_failslab+0x11a/0x160 [ 562.908084][T12315] ? tomoyo_encode2+0x273/0x5a0 [ 562.912934][T12315] should_failslab+0x9/0x20 [ 562.917436][T12315] __kmalloc+0x7a/0x340 [ 562.921589][T12315] tomoyo_encode2+0x273/0x5a0 [ 562.926266][T12315] tomoyo_realpath_from_path+0x769/0x7c0 [ 562.926279][T12315] tomoyo_path_number_perm+0x166/0x640 [ 562.926292][T12315] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 562.942979][T12315] ? trace_hardirqs_on+0x34/0x80 [ 562.947927][T12315] ? trace_kmem_cache_free+0xa0/0x110 [ 562.953297][T12315] tomoyo_path_mkdir+0x9c/0xc0 [ 562.953312][T12315] security_path_mkdir+0xed/0x170 [ 562.963075][T12315] do_mkdirat+0x15c/0x320 [ 562.967415][T12315] __x64_sys_mkdir+0x60/0x70 [ 562.972009][T12315] do_syscall_64+0xfe/0x140 [ 562.976515][T12315] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 562.982404][T12315] RIP: 0033:0x458c97 13:17:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x4000000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x200000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:56 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea004f0ee1528d35b1f6ce2b535d9"}) [ 562.982414][T12315] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 562.982417][T12315] RSP: 002b:00007f0134a31a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 562.982424][T12315] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458c97 [ 562.982428][T12315] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 13:17:56 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea005f0ee1528d35b1f6ce2b535d9"}) [ 562.982432][T12315] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 562.982437][T12315] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 562.982442][T12315] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 563.006979][T12315] ERROR: Out of memory at tomoyo_realpath_from_path. [ 563.075759][T12333] validate_nla: 25 callbacks suppressed [ 563.075764][T12333] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 563.103743][T12333] net_ratelimit: 25 callbacks suppressed [ 563.103749][T12333] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 563.127786][T12336] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 563.139934][T12336] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:17:57 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {0x0}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:57 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea006f0ee1528d35b1f6ce2b535d9"}) 13:17:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x300000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:57 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x4800000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:57 executing program 5 (fault-call:1 fault-nth:43): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:57 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) setsockopt$inet_dccp_int(r0, 0x21, 0xa, &(0x7f0000000140)=0x8d95, 0x4) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0x9, 0x0, 0x0, 0x8}) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000000c0)={0xd3, r2, 0xc2fb1b2fd795685a, 0x1}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r4, &(0x7f0000000180)=""/4096, 0x1000) 13:17:57 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea008f0ee1528d35b1f6ce2b535d9"}) [ 563.665047][T12346] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 563.674260][T12346] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 563.697178][T12343] FAULT_INJECTION: forcing a failure. [ 563.697178][T12343] name failslab, interval 1, probability 0, space 0, times 0 [ 563.713044][T12344] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 563.721573][T12343] CPU: 0 PID: 12343 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 563.729462][T12343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 563.729466][T12343] Call Trace: [ 563.729482][T12343] dump_stack+0x1d8/0x2f8 [ 563.729496][T12343] should_fail+0x555/0x770 [ 563.729511][T12343] __should_failslab+0x11a/0x160 [ 563.756473][T12343] ? security_inode_alloc+0x36/0x1e0 13:17:57 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea067f0ee1528d35b1f6ce2b535d9"}) [ 563.761747][T12343] should_failslab+0x9/0x20 [ 563.761756][T12343] kmem_cache_alloc+0x56/0x2e0 [ 563.761767][T12343] security_inode_alloc+0x36/0x1e0 [ 563.761777][T12343] inode_init_always+0x3b5/0x8d0 [ 563.761787][T12343] ? set_qf_name+0x3c0/0x3c0 [ 563.761795][T12343] new_inode_pseudo+0x7f/0x240 [ 563.761802][T12343] new_inode+0x28/0x1c0 [ 563.761813][T12343] ? trace_ext4_request_inode+0x28b/0x2d0 [ 563.761821][T12343] __ext4_new_inode+0x43d/0x5650 [ 563.761830][T12343] ? memset+0x31/0x40 [ 563.761845][T12343] ? smk_curacc+0xa3/0xe0 13:17:57 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee5e28d35b1f6ce2b535d9"}) 13:17:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x400000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:57 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x4c00000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 563.771186][T12343] ext4_mkdir+0x3f5/0x1450 [ 563.771202][T12343] ? security_inode_permission+0xdd/0x120 [ 563.771215][T12343] vfs_mkdir+0x43f/0x610 [ 563.771225][T12343] do_mkdirat+0x1d7/0x320 [ 563.771235][T12343] __x64_sys_mkdir+0x60/0x70 [ 563.771246][T12343] do_syscall_64+0xfe/0x140 [ 563.771258][T12343] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 563.771269][T12343] RIP: 0033:0x458c97 [ 563.781369][T12343] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 563.781376][T12343] RSP: 002b:00007f0134a31a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 563.781385][T12343] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458c97 [ 563.781390][T12343] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 563.781395][T12343] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 563.781399][T12343] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 563.781404][T12343] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 563.791889][T12344] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:17:57 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f23e2b535d9"}) [ 563.970805][T12361] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 564.003721][T12361] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 564.030046][T12362] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 564.051091][T12362] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:17:58 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {0x0}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:58 executing program 2: open$dir(&(0x7f0000000080)='./file0\x00', 0x202000, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) 13:17:58 executing program 5 (fault-call:1 fault-nth:44): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:58 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f25e2b535d9"}) 13:17:58 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x5711000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x500000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 564.546460][T12376] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 564.558096][T12373] FAULT_INJECTION: forcing a failure. [ 564.558096][T12373] name failslab, interval 1, probability 0, space 0, times 0 [ 564.565523][T12376] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 564.592643][T12373] CPU: 0 PID: 12373 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 564.600549][T12373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 564.600553][T12373] Call Trace: [ 564.600574][T12373] dump_stack+0x1d8/0x2f8 [ 564.600592][T12373] should_fail+0x555/0x770 [ 564.613931][T12373] __should_failslab+0x11a/0x160 [ 564.613943][T12373] ? smack_inode_init_security+0x3cf/0x490 [ 564.613952][T12373] should_failslab+0x9/0x20 [ 564.613966][T12373] __kmalloc_track_caller+0x79/0x340 [ 564.622699][T12373] kstrdup+0x34/0x70 [ 564.622711][T12373] smack_inode_init_security+0x3cf/0x490 [ 564.622722][T12373] security_inode_init_security+0xfe/0x310 [ 564.622729][T12373] ? ext4_init_security+0x40/0x40 [ 564.622741][T12373] ext4_init_security+0x34/0x40 [ 564.622754][T12373] __ext4_new_inode+0x446c/0x5650 [ 564.674882][T12373] ? smk_curacc+0xa3/0xe0 [ 564.679212][T12373] ext4_mkdir+0x3f5/0x1450 [ 564.683630][T12373] ? security_inode_permission+0xdd/0x120 [ 564.689346][T12373] vfs_mkdir+0x43f/0x610 [ 564.693585][T12373] do_mkdirat+0x1d7/0x320 [ 564.697912][T12373] __x64_sys_mkdir+0x60/0x70 [ 564.702509][T12373] do_syscall_64+0xfe/0x140 [ 564.707006][T12373] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 564.712893][T12373] RIP: 0033:0x458c97 [ 564.716784][T12373] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 564.736389][T12373] RSP: 002b:00007f0134a31a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 13:17:58 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f2ae2b535d9"}) 13:17:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1ff, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x400440, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sD\x0e\xa0=\x04\xbf\xbc\xac2\x00', 0x658241, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0xffff, 0x2000) [ 564.744796][T12373] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458c97 [ 564.752764][T12373] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 564.760729][T12373] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 564.768693][T12373] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 564.776657][T12373] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:17:58 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x6000000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x10880, 0x0) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f00000000c0)=0x6ad, 0x4) unshare(0x24020400) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r2, &(0x7f0000000180)=""/4096, 0x1000) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b97000)={0x1, &(0x7f000048fff0)=[{0x6}]}, 0x10) getsockopt$sock_buf(r3, 0x1, 0x1a, 0x0, &(0x7f0000000000)) dup2(r3, r0) [ 564.790880][T12375] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 564.799600][T12375] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:17:58 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f2be2b535d9"}) 13:17:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x600000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 564.868414][T12387] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 564.887296][T12387] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 564.950358][T12393] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 564.976580][T12393] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:17:59 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x7, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:17:59 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f2de2b535d9"}) 13:17:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x6558000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:59 executing program 5 (fault-call:1 fault-nth:45): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:17:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r3, 0x0, 0x10005, 0x0) setsockopt$inet_dccp_int(r2, 0x21, 0xa, &(0x7f0000000140)=0x8d95, 0x4) ioctl$SG_SET_KEEP_ORPHAN(r2, 0x2287, &(0x7f0000000080)=0x2af) 13:17:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x700000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x6800000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b97000)={0x1, &(0x7f000048fff0)=[{0x6}]}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x1a, 0x0, &(0x7f0000000000)) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x2a}}, 0x10) 13:17:59 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f2ee2b535d9"}) [ 565.449356][T12406] FAULT_INJECTION: forcing a failure. [ 565.449356][T12406] name failslab, interval 1, probability 0, space 0, times 0 [ 565.492195][T12406] CPU: 0 PID: 12406 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 565.500132][T12406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 565.500136][T12406] Call Trace: [ 565.500156][T12406] dump_stack+0x1d8/0x2f8 [ 565.500168][T12406] should_fail+0x555/0x770 [ 565.500184][T12406] __should_failslab+0x11a/0x160 [ 565.517900][T12406] ? ext4_mb_new_blocks+0x2ac/0x2cc0 [ 565.517912][T12406] should_failslab+0x9/0x20 [ 565.517927][T12406] kmem_cache_alloc+0x56/0x2e0 [ 565.541765][T12406] ext4_mb_new_blocks+0x2ac/0x2cc0 [ 565.546878][T12406] ? retint_kernel+0x2b/0x2b [ 565.551478][T12406] ? ext4_ext_search_right+0x4cb/0x940 [ 565.556932][T12406] ? ext4_find_extent+0x8e0/0xaa0 [ 565.561954][T12406] ? ext4_inode_to_goal_block+0x27b/0x3b0 [ 565.567686][T12406] ext4_ext_map_blocks+0x4b9a/0x7180 [ 565.572978][T12406] ? __kasan_check_read+0x11/0x20 [ 565.577995][T12406] ? mark_buffer_dirty+0x280/0x2e0 [ 565.583099][T12406] ? ext4_es_lookup_extent+0x4a7/0x5a0 [ 565.588551][T12406] ext4_map_blocks+0x8f2/0x1e50 [ 565.593385][T12406] ? retint_kernel+0x2b/0x2b [ 565.597954][T12406] ? trace_ext4_allocate_inode+0x2ad/0x300 [ 565.603738][T12406] ? __kasan_check_write+0x14/0x20 [ 565.608832][T12406] ext4_getblk+0xae/0x460 [ 565.613141][T12406] ext4_bread+0x4a/0x240 [ 565.617362][T12406] ext4_append+0x175/0x310 [ 565.621760][T12406] ext4_mkdir+0x7ad/0x1450 [ 565.626161][T12406] vfs_mkdir+0x43f/0x610 [ 565.630383][T12406] do_mkdirat+0x1d7/0x320 [ 565.634691][T12406] __x64_sys_mkdir+0x60/0x70 [ 565.639259][T12406] do_syscall_64+0xfe/0x140 [ 565.643742][T12406] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 565.649609][T12406] RIP: 0033:0x458c97 [ 565.653485][T12406] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 565.673067][T12406] RSP: 002b:00007f0134a31a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 565.681453][T12406] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458c97 13:17:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x800000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x6c00000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:17:59 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f30e2b535d9"}) [ 565.689416][T12406] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 565.697371][T12406] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 565.705320][T12406] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 565.713269][T12406] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:18:00 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x7, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:18:00 executing program 5 (fault-call:1 fault-nth:46): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x900000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:00 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f48e2b535d9"}) 13:18:00 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x7400000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f00000021c0)={0x13, 0xa, &(0x7f0000000080)=@raw=[@ldst={0x0, 0x3, 0x0, 0x0, 0x0, 0xc}, @call={0x85, 0x0, 0x0, 0x4a}, @jmp={0x5, 0xf8f8, 0x3, 0x0, 0x2, 0xc, 0x8}, @ldst={0x0, 0x3, 0x4, 0xb, 0x6, 0x4, 0x18}, @alu={0x4, 0x7190, 0xc, 0xa, 0x6, 0x2f, 0x1}, @ldst={0x0, 0x2, 0x2, 0x6, 0xe, 0xffffffffffffffa4, 0x1}, @ldst={0x0, 0x3, 0x1, 0x9, 0x0, 0x2, 0xffffffffffffffff}, @jmp={0x5, 0x6, 0x3a3cc04fa1ee2683, 0x8, 0x1, 0xffffffffffffffff, 0xfffffffffffffff0}, @initr0={0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x7c3}], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000001180)=""/4096, 0xc0f00, 0x0, [], 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0xa, 0x1}, 0x8, 0x10, &(0x7f0000002180)={0x2, 0x5, 0x7f, 0x8807}, 0x10}, 0x70) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) r2 = syz_open_dev$radio(&(0x7f0000002240)='/dev/radio#\x00', 0x0, 0x2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000000)=@sack_info={r5, 0x0, 0xffff}, 0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000002280)={r5, 0x7, 0x2, [0x7fff, 0x9]}, &(0x7f00000022c0)=0xc) 13:18:00 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f4ce2b535d9"}) 13:18:00 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x7a00000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xa00000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xb00000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:00 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f58e2b535d9"}) [ 566.412910][T12447] FAULT_INJECTION: forcing a failure. [ 566.412910][T12447] name failslab, interval 1, probability 0, space 0, times 0 13:18:00 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x8000000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 566.461867][T12447] CPU: 1 PID: 12447 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 566.469792][T12447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 566.479850][T12447] Call Trace: [ 566.483149][T12447] dump_stack+0x1d8/0x2f8 [ 566.487494][T12447] should_fail+0x555/0x770 [ 566.491922][T12447] __should_failslab+0x11a/0x160 [ 566.496892][T12447] ? kzalloc+0x1f/0x40 [ 566.500992][T12447] should_failslab+0x9/0x20 [ 566.505506][T12447] __kmalloc+0x7a/0x340 [ 566.509674][T12447] kzalloc+0x1f/0x40 [ 566.513576][T12447] smk_parse_smack+0x197/0x230 [ 566.518349][T12447] smk_import_entry+0x27/0x590 [ 566.523131][T12447] smack_d_instantiate+0x78f/0xd70 [ 566.528249][T12447] ? lockdep_init_map+0x2a/0x680 [ 566.533201][T12447] security_d_instantiate+0xa5/0x100 [ 566.538495][T12447] d_instantiate_new+0x65/0x130 [ 566.543357][T12447] ext4_mkdir+0xfa9/0x1450 [ 566.547794][T12447] vfs_mkdir+0x43f/0x610 [ 566.552054][T12447] do_mkdirat+0x1d7/0x320 [ 566.556400][T12447] __x64_sys_mkdir+0x60/0x70 [ 566.561001][T12447] do_syscall_64+0xfe/0x140 [ 566.565517][T12447] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 566.571411][T12447] RIP: 0033:0x458c97 [ 566.575313][T12447] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 566.594955][T12447] RSP: 002b:00007f0134a31a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 566.603390][T12447] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458c97 [ 566.611364][T12447] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 566.619352][T12447] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 566.627328][T12447] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 566.635566][T12447] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:18:01 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x7, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:18:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xc00000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x8100000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:01 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f68e2b535d9"}) 13:18:01 executing program 5 (fault-call:1 fault-nth:47): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:01 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f74e2b535d9"}) [ 567.219568][T12468] FAULT_INJECTION: forcing a failure. [ 567.219568][T12468] name failslab, interval 1, probability 0, space 0, times 0 [ 567.253200][T12468] CPU: 0 PID: 12468 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 567.261114][T12468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 567.271171][T12468] Call Trace: [ 567.274465][T12468] dump_stack+0x1d8/0x2f8 [ 567.278806][T12468] should_fail+0x555/0x770 [ 567.283241][T12468] __should_failslab+0x11a/0x160 [ 567.288195][T12468] ? kcalloc+0x2f/0x50 [ 567.292279][T12468] should_failslab+0x9/0x20 [ 567.296795][T12468] __kmalloc+0x7a/0x340 [ 567.300975][T12468] ? debug_check_no_obj_freed+0x505/0x5b0 [ 567.306702][T12468] kcalloc+0x2f/0x50 [ 567.310611][T12468] ext4_find_extent+0x216/0xaa0 [ 567.315480][T12468] ? trace_ext4_ext_map_blocks_enter+0x2ca/0x310 [ 567.321830][T12468] ext4_ext_map_blocks+0x170/0x7180 [ 567.327040][T12468] ? __kasan_check_read+0x11/0x20 [ 567.332080][T12468] ? mark_buffer_dirty+0x280/0x2e0 [ 567.337194][T12468] ? ext4_es_lookup_extent+0x4a7/0x5a0 [ 567.337209][T12468] ? trace_lock_acquire+0x159/0x1d0 [ 567.337225][T12468] ? __kasan_check_write+0x14/0x20 [ 567.352967][T12468] ext4_map_blocks+0x8f2/0x1e50 [ 567.357838][T12468] ? __kasan_check_write+0x14/0x20 [ 567.362965][T12468] ext4_getblk+0xae/0x460 [ 567.367295][T12468] ext4_bread+0x4a/0x240 [ 567.367305][T12468] ext4_append+0x175/0x310 [ 567.367317][T12468] ext4_mkdir+0x7ad/0x1450 [ 567.380371][T12468] vfs_mkdir+0x43f/0x610 [ 567.384622][T12468] do_mkdirat+0x1d7/0x320 [ 567.388956][T12468] __x64_sys_mkdir+0x60/0x70 [ 567.393545][T12468] do_syscall_64+0xfe/0x140 [ 567.398055][T12468] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 567.403948][T12468] RIP: 0033:0x458c97 [ 567.407846][T12468] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 567.427520][T12468] RSP: 002b:00007f0134a31a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 567.435950][T12468] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458c97 [ 567.443925][T12468] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 567.451900][T12468] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 567.459875][T12468] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 13:18:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x8847000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xd00000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 567.467861][T12468] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:18:01 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f7ae2b535d9"}) 13:18:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xe00000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x8848000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:01 executing program 5 (fault-call:1 fault-nth:48): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 567.683217][T12487] FAULT_INJECTION: forcing a failure. [ 567.683217][T12487] name failslab, interval 1, probability 0, space 0, times 0 [ 567.716263][T12487] CPU: 0 PID: 12487 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 567.724315][T12487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 567.734369][T12487] Call Trace: [ 567.737673][T12487] dump_stack+0x1d8/0x2f8 [ 567.742017][T12487] should_fail+0x555/0x770 [ 567.746438][T12487] __should_failslab+0x11a/0x160 [ 567.751384][T12487] ? ext4_mb_new_blocks+0x2ac/0x2cc0 [ 567.756676][T12487] should_failslab+0x9/0x20 [ 567.761198][T12487] kmem_cache_alloc+0x56/0x2e0 [ 567.765968][T12487] ext4_mb_new_blocks+0x2ac/0x2cc0 [ 567.771088][T12487] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 567.776549][T12487] ? check_preemption_disabled+0xa9/0x2a0 [ 567.782277][T12487] ? retint_kernel+0x2b/0x2b [ 567.786876][T12487] ? ext4_ext_map_blocks+0x19d0/0x7180 [ 567.792344][T12487] ? ext4_inode_to_goal_block+0x27b/0x3b0 [ 567.798085][T12487] ext4_ext_map_blocks+0x4b9a/0x7180 [ 567.803380][T12487] ? __kasan_check_read+0x11/0x20 [ 567.808415][T12487] ? mark_buffer_dirty+0x280/0x2e0 [ 567.813540][T12487] ? ext4_es_lookup_extent+0x4a7/0x5a0 [ 567.819026][T12487] ext4_map_blocks+0x8f2/0x1e50 [ 567.823896][T12487] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 567.829368][T12487] ? retint_kernel+0x2b/0x2b [ 567.833970][T12487] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 567.839446][T12487] ext4_getblk+0xae/0x460 [ 567.843787][T12487] ext4_bread+0x4a/0x240 [ 567.848048][T12487] ext4_append+0x175/0x310 [ 567.852476][T12487] ext4_mkdir+0x7ad/0x1450 [ 567.856912][T12487] vfs_mkdir+0x43f/0x610 [ 567.861176][T12487] do_mkdirat+0x1d7/0x320 [ 567.865517][T12487] __x64_sys_mkdir+0x60/0x70 [ 567.870121][T12487] do_syscall_64+0xfe/0x140 [ 567.874637][T12487] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 567.880531][T12487] RIP: 0033:0x458c97 [ 567.884436][T12487] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 567.904053][T12487] RSP: 002b:00007f0134a31a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 567.912473][T12487] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458c97 [ 567.920450][T12487] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 567.928436][T12487] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 567.936410][T12487] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 567.944389][T12487] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:18:01 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{0x0}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:18:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xf00000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:01 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x2}) 13:18:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x88a8ffff00000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:01 executing program 5 (fault-call:1 fault-nth:49): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x1000000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x9effffff00000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:01 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x3}) [ 568.086725][T12500] FAULT_INJECTION: forcing a failure. [ 568.086725][T12500] name failslab, interval 1, probability 0, space 0, times 0 [ 568.087225][T12505] validate_nla: 20 callbacks suppressed [ 568.087231][T12505] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 568.134078][T12500] CPU: 1 PID: 12500 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 568.142001][T12500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 568.152064][T12500] Call Trace: [ 568.155367][T12500] dump_stack+0x1d8/0x2f8 [ 568.158337][T12505] net_ratelimit: 20 callbacks suppressed [ 568.158344][T12505] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 568.159700][T12500] should_fail+0x555/0x770 [ 568.159713][T12500] __should_failslab+0x11a/0x160 [ 568.159728][T12500] ? ext4_mb_new_blocks+0x2ac/0x2cc0 [ 568.173148][T12506] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 568.180526][T12500] should_failslab+0x9/0x20 [ 568.180537][T12500] kmem_cache_alloc+0x56/0x2e0 [ 568.180550][T12500] ext4_mb_new_blocks+0x2ac/0x2cc0 [ 568.180557][T12500] ? trace_kmalloc+0xbb/0x130 [ 568.180571][T12500] ? kcalloc+0x2f/0x50 [ 568.208374][T12506] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 568.212546][T12500] ? __kmalloc+0x26c/0x340 [ 568.212555][T12500] ? kcalloc+0x2f/0x50 [ 568.212565][T12500] ? ext4_ext_search_right+0x4cb/0x940 [ 568.212573][T12500] ? ext4_find_extent+0x8e0/0xaa0 [ 568.212586][T12500] ? ext4_inode_to_goal_block+0x27b/0x3b0 [ 568.266142][T12500] ext4_ext_map_blocks+0x4b9a/0x7180 [ 568.271441][T12500] ? __kasan_check_read+0x11/0x20 [ 568.276471][T12500] ? mark_buffer_dirty+0x280/0x2e0 [ 568.281599][T12500] ? ext4_es_lookup_extent+0x4a7/0x5a0 [ 568.287077][T12500] ext4_map_blocks+0x8f2/0x1e50 [ 568.291945][T12500] ? __kasan_check_write+0x14/0x20 [ 568.297069][T12500] ext4_getblk+0xae/0x460 [ 568.301415][T12500] ext4_bread+0x4a/0x240 [ 568.305676][T12500] ext4_append+0x175/0x310 [ 568.310110][T12500] ext4_mkdir+0x7ad/0x1450 [ 568.314573][T12500] vfs_mkdir+0x43f/0x610 [ 568.318852][T12500] do_mkdirat+0x1d7/0x320 [ 568.323197][T12500] __x64_sys_mkdir+0x60/0x70 [ 568.327802][T12500] do_syscall_64+0xfe/0x140 [ 568.332320][T12500] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 568.338214][T12500] RIP: 0033:0x458c97 [ 568.342118][T12500] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 568.361727][T12500] RSP: 002b:00007f0134a31a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 568.370143][T12500] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458c97 [ 568.378142][T12500] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 13:18:02 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xc3ffffff00000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x1100000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 568.386121][T12500] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 568.394099][T12500] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 568.402079][T12500] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:18:02 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x4}) 13:18:02 executing program 5 (fault-call:1 fault-nth:50): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 568.443604][T12512] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 568.467562][T12512] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 568.527485][T12518] FAULT_INJECTION: forcing a failure. [ 568.527485][T12518] name failslab, interval 1, probability 0, space 0, times 0 [ 568.540303][T12515] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 568.563962][T12515] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 568.590856][T12518] CPU: 1 PID: 12518 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 568.598781][T12518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 568.608839][T12518] Call Trace: [ 568.612132][T12518] dump_stack+0x1d8/0x2f8 [ 568.616462][T12518] should_fail+0x555/0x770 [ 568.620877][T12518] __should_failslab+0x11a/0x160 [ 568.625837][T12518] should_failslab+0x9/0x20 [ 568.630340][T12518] kmem_cache_alloc_trace+0x5d/0x2f0 [ 568.635620][T12518] ? copy_mount_options+0x5f/0x3c0 [ 568.640741][T12518] copy_mount_options+0x5f/0x3c0 [ 568.645694][T12518] ksys_mount+0xa0/0x100 [ 568.649945][T12518] __x64_sys_mount+0xbf/0xd0 [ 568.654549][T12518] do_syscall_64+0xfe/0x140 [ 568.659058][T12518] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 568.664947][T12518] RIP: 0033:0x45c2ca [ 568.668838][T12518] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 568.688440][T12518] RSP: 002b:00007f0134a31a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 568.696850][T12518] RAX: ffffffffffffffda RBX: 00007f0134a31b40 RCX: 000000000045c2ca [ 568.704821][T12518] RDX: 00007f0134a31ae0 RSI: 0000000020000100 RDI: 00007f0134a31b00 [ 568.712788][T12518] RBP: 0000000000000001 R08: 00007f0134a31b40 R09: 00007f0134a31ae0 [ 568.720769][T12518] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 568.728735][T12518] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:18:02 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{0x0}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:18:02 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x5}) 13:18:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x1200000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:02 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xefffffff00000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:02 executing program 5 (fault-call:1 fault-nth:51): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:02 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x6}) [ 568.923794][T12523] netlink: 'syz-executor.4': attribute type 33 has an invalid length. 13:18:02 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xf0ffffff00000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 568.980571][T12523] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 569.001026][T12533] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 569.012004][T12531] FAULT_INJECTION: forcing a failure. [ 569.012004][T12531] name failslab, interval 1, probability 0, space 0, times 0 [ 569.034986][T12533] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 569.042440][T12531] CPU: 0 PID: 12531 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 569.057999][T12531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 569.068050][T12531] Call Trace: [ 569.068065][T12531] dump_stack+0x1d8/0x2f8 [ 569.068078][T12531] should_fail+0x555/0x770 [ 569.068090][T12531] __should_failslab+0x11a/0x160 [ 569.068106][T12531] should_failslab+0x9/0x20 [ 569.089534][T12531] kmem_cache_alloc_trace+0x5d/0x2f0 [ 569.094825][T12531] ? smack_d_instantiate+0x962/0xd70 [ 569.100109][T12531] smack_d_instantiate+0x962/0xd70 [ 569.100129][T12531] ? lockdep_init_map+0x2a/0x680 [ 569.110156][T12531] security_d_instantiate+0xa5/0x100 [ 569.115457][T12531] d_instantiate_new+0x65/0x130 [ 569.120309][T12531] ext4_mkdir+0xfa9/0x1450 [ 569.124734][T12531] vfs_mkdir+0x43f/0x610 [ 569.128976][T12531] do_mkdirat+0x1d7/0x320 [ 569.128988][T12531] __x64_sys_mkdir+0x60/0x70 [ 569.137906][T12531] do_syscall_64+0xfe/0x140 [ 569.142416][T12531] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 569.148336][T12531] RIP: 0033:0x458c97 [ 569.152231][T12531] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 569.171836][T12531] RSP: 002b:00007f0134a31a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 13:18:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x2000000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:03 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x7}) [ 569.180245][T12531] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458c97 [ 569.188221][T12531] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 569.196202][T12531] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 569.204183][T12531] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 569.212160][T12531] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 569.252343][T12539] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 569.269334][T12539] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 569.287169][T12541] netlink: 'syz-executor.4': attribute type 33 has an invalid length. 13:18:03 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x8}) 13:18:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x2500000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 569.298939][T12541] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:18:03 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x9}) [ 569.384989][T12546] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 569.419628][T12546] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:18:03 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{0x0}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:18:03 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xfeffffff00000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:03 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0xa}) 13:18:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x3f00000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:03 executing program 5 (fault-call:1 fault-nth:52): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 569.786811][T12554] netlink: 'syz-executor.4': attribute type 33 has an invalid length. 13:18:03 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0xb}) 13:18:03 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffff7f00000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 569.834692][T12554] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:18:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x4000000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 569.897085][T12559] FAULT_INJECTION: forcing a failure. [ 569.897085][T12559] name failslab, interval 1, probability 0, space 0, times 0 [ 569.934513][T12559] CPU: 1 PID: 12559 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 569.942437][T12559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 569.952499][T12559] Call Trace: [ 569.955811][T12559] dump_stack+0x1d8/0x2f8 [ 569.960152][T12559] should_fail+0x555/0x770 [ 569.964607][T12559] __should_failslab+0x11a/0x160 [ 569.969572][T12559] should_failslab+0x9/0x20 [ 569.974081][T12559] kmem_cache_alloc_trace+0x5d/0x2f0 [ 569.979377][T12559] ? smack_d_instantiate+0x732/0xd70 [ 569.984679][T12559] smack_d_instantiate+0x732/0xd70 [ 569.989816][T12559] ? lockdep_init_map+0x2a/0x680 [ 569.994782][T12559] security_d_instantiate+0xa5/0x100 [ 570.000078][T12559] d_instantiate_new+0x65/0x130 [ 570.004935][T12559] ext4_mkdir+0xfa9/0x1450 [ 570.009369][T12559] vfs_mkdir+0x43f/0x610 [ 570.013679][T12559] do_mkdirat+0x1d7/0x320 [ 570.018016][T12559] __x64_sys_mkdir+0x60/0x70 [ 570.022622][T12559] do_syscall_64+0xfe/0x140 [ 570.027140][T12559] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 570.033037][T12559] RIP: 0033:0x458c97 [ 570.036940][T12559] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 570.057109][T12559] RSP: 002b:00007f0134a31a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 570.065537][T12559] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458c97 [ 570.073517][T12559] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 570.081490][T12559] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 570.089462][T12559] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 13:18:03 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0xc}) 13:18:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x4800000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:04 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0xd}) 13:18:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x4c00000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 570.097434][T12559] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:18:04 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:18:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffffff00000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:04 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0xe}) 13:18:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x6000000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:04 executing program 5 (fault-call:1 fault-nth:53): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 570.606305][T12586] FAULT_INJECTION: forcing a failure. [ 570.606305][T12586] name failslab, interval 1, probability 0, space 0, times 0 [ 570.644093][T12586] CPU: 1 PID: 12586 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 570.652037][T12586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 570.662691][T12586] Call Trace: [ 570.665991][T12586] dump_stack+0x1d8/0x2f8 [ 570.670351][T12586] should_fail+0x555/0x770 [ 570.670367][T12586] __should_failslab+0x11a/0x160 [ 570.670384][T12586] should_failslab+0x9/0x20 [ 570.679744][T12586] kmem_cache_alloc_trace+0x5d/0x2f0 [ 570.679756][T12586] ? smack_d_instantiate+0xabf/0xd70 [ 570.679765][T12586] smack_d_instantiate+0xabf/0xd70 [ 570.679783][T12586] ? lockdep_init_map+0x2a/0x680 [ 570.690517][T12586] security_d_instantiate+0xa5/0x100 [ 570.690529][T12586] d_instantiate_new+0x65/0x130 [ 570.690539][T12586] ext4_mkdir+0xfa9/0x1450 [ 570.690555][T12586] vfs_mkdir+0x43f/0x610 [ 570.700967][T12586] do_mkdirat+0x1d7/0x320 [ 570.700979][T12586] __x64_sys_mkdir+0x60/0x70 [ 570.700989][T12586] do_syscall_64+0xfe/0x140 [ 570.701000][T12586] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 570.701011][T12586] RIP: 0033:0x458c97 [ 570.747925][T12586] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 570.769826][T12586] RSP: 002b:00007f0134a31a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 570.778423][T12586] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458c97 [ 570.786702][T12586] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 570.794819][T12586] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a 13:18:04 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x10}) 13:18:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x630d000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 570.802793][T12586] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 570.810771][T12586] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:18:04 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x11}) 13:18:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x6558000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:05 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:18:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x6800000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:05 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x12}) 13:18:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:05 executing program 5 (fault-call:1 fault-nth:54): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x7, &(0x7f0000000000)) ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x40047451, &(0x7f0000000080)=0x2) unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x139822, 0x0) r2 = open(&(0x7f0000000000)='\x00', 0x260000, 0xc43cc4a3db2f1d0a) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f00000000c0)={0x0, 0x0, 0x6225}) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) bind$inet(r5, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r4, 0x0, r5, 0x0, 0x10005, 0x0) setsockopt$inet_dccp_int(r4, 0x21, 0xa, &(0x7f0000000140)=0x8d95, 0x4) ioctl$DRM_IOCTL_GEM_OPEN(r4, 0xc010640b, &(0x7f0000000100)={0x0, 0x0, 0x100000000}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000140)={r3, r6, 0xfffffffffffffeff}) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) 13:18:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) splice(r1, 0x0, r2, 0x0, 0x10005, 0x0) setsockopt$inet_dccp_int(r1, 0x21, 0xa, &(0x7f0000000140)=0x8d95, 0x4) r3 = openat(r1, &(0x7f0000000080)='./file0\x00', 0x40, 0x110) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f00000000c0)={{0x3, 0x2, 0x1, 0x1, 0x7}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x200b0c00) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r4, &(0x7f0000000180)=""/4096, 0x1000) 13:18:05 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x25}) [ 571.479593][T12616] FAULT_INJECTION: forcing a failure. [ 571.479593][T12616] name failslab, interval 1, probability 0, space 0, times 0 [ 571.546808][T12616] CPU: 1 PID: 12616 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 571.554840][T12616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 571.565073][T12616] Call Trace: [ 571.570165][T12616] dump_stack+0x1d8/0x2f8 [ 571.570180][T12616] should_fail+0x555/0x770 [ 571.570195][T12616] __should_failslab+0x11a/0x160 [ 571.570214][T12616] should_failslab+0x9/0x20 [ 571.578927][T12616] kmem_cache_alloc_trace+0x5d/0x2f0 [ 571.578937][T12616] ? smack_d_instantiate+0x962/0xd70 [ 571.578947][T12616] smack_d_instantiate+0x962/0xd70 [ 571.578966][T12616] ? lockdep_init_map+0x2a/0x680 [ 571.610081][T12616] security_d_instantiate+0xa5/0x100 [ 571.615394][T12616] d_instantiate_new+0x65/0x130 [ 571.620246][T12616] ext4_mkdir+0xfa9/0x1450 [ 571.624727][T12616] vfs_mkdir+0x43f/0x610 [ 571.628976][T12616] do_mkdirat+0x1d7/0x320 [ 571.633365][T12616] __x64_sys_mkdir+0x60/0x70 [ 571.637964][T12616] do_syscall_64+0xfe/0x140 [ 571.642473][T12616] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 571.648814][T12616] RIP: 0033:0x458c97 [ 571.652722][T12616] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 cd c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ad c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 571.672885][T12616] RSP: 002b:00007f0134a31a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 571.681793][T12616] RAX: ffffffffffffffda RBX: 0000000020000068 RCX: 0000000000458c97 13:18:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x6c00000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:05 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x5c}) [ 571.690165][T12616] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000100 [ 571.698146][T12616] RBP: 0000000000000001 R08: 0000000000000000 R09: 000000000000000a [ 571.708201][T12616] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 571.717110][T12616] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:18:06 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:18:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x7400000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b97000)={0x1, &(0x7f000048fff0)=[{0x6, 0xffffffffffffffff}]}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x1a, 0x0, &(0x7f0000000000)) r3 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mISDNtimer\x00', 0x10000, 0x0) fcntl$dupfd(r2, 0x406, r3) 13:18:06 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x300}) 13:18:06 executing program 5 (fault-call:1 fault-nth:55): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x7a00000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 572.366761][T12645] FAULT_INJECTION: forcing a failure. [ 572.366761][T12645] name failslab, interval 1, probability 0, space 0, times 0 [ 572.410950][T12645] CPU: 0 PID: 12645 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 572.418886][T12645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 572.428962][T12645] Call Trace: [ 572.432246][T12645] dump_stack+0x1d8/0x2f8 [ 572.436579][T12645] should_fail+0x555/0x770 [ 572.441001][T12645] __should_failslab+0x11a/0x160 [ 572.445936][T12645] should_failslab+0x9/0x20 [ 572.450428][T12645] kmem_cache_alloc_trace+0x5d/0x2f0 [ 572.455722][T12645] ? copy_mount_options+0x5f/0x3c0 [ 572.460821][T12645] copy_mount_options+0x5f/0x3c0 [ 572.465756][T12645] ksys_mount+0xa0/0x100 [ 572.470145][T12645] __x64_sys_mount+0xbf/0xd0 [ 572.474754][T12645] do_syscall_64+0xfe/0x140 [ 572.479246][T12645] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 572.485246][T12645] RIP: 0033:0x45c2ca [ 572.489240][T12645] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 13:18:06 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x500}) [ 572.509005][T12645] RSP: 002b:00007f0134a31a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 572.517442][T12645] RAX: ffffffffffffffda RBX: 00007f0134a31b40 RCX: 000000000045c2ca [ 572.525391][T12645] RDX: 00007f0134a31ae0 RSI: 0000000020000100 RDI: 00007f0134a31b00 [ 572.533358][T12645] RBP: 0000000000000001 R08: 00007f0134a31b40 R09: 00007f0134a31ae0 [ 572.541313][T12645] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 572.549263][T12645] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:18:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:06 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x600}) 13:18:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x8000000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:07 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0xffffffae, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x6d, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0xff64}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:18:07 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x700}) 13:18:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x8100000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b97000)={0x1, &(0x7f000048fff0)=[{0x6}]}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x1a, 0x0, &(0x7f0000000000)) r3 = signalfd4(r2, &(0x7f0000000140)={0x6}, 0x8, 0x100c00) fcntl$F_GET_FILE_RW_HINT(r3, 0x40d, &(0x7f0000001180)) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0205647, &(0x7f0000000100)={0xa10000, 0x80, 0x1, [], &(0x7f00000000c0)={0x9e0907, 0xffff, [], @p_u8=&(0x7f0000000080)=0x8}}) 13:18:07 executing program 5 (fault-call:1 fault-nth:56): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 573.235826][T12670] validate_nla: 25 callbacks suppressed [ 573.235833][T12670] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 573.261264][T12670] net_ratelimit: 25 callbacks suppressed [ 573.261272][T12670] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 573.264280][T12675] FAULT_INJECTION: forcing a failure. [ 573.264280][T12675] name failslab, interval 1, probability 0, space 0, times 0 [ 573.280960][T12671] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 573.282061][T12675] CPU: 1 PID: 12675 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 573.312883][T12675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 573.323714][T12675] Call Trace: [ 573.327032][T12675] dump_stack+0x1d8/0x2f8 [ 573.331532][T12675] should_fail+0x555/0x770 [ 573.336237][T12675] __should_failslab+0x11a/0x160 [ 573.341293][T12675] ? __sigqueue_alloc+0x2ce/0x440 [ 573.346310][T12675] should_failslab+0x9/0x20 [ 573.351930][T12675] kmem_cache_alloc+0x56/0x2e0 [ 573.360985][T12675] __sigqueue_alloc+0x2ce/0x440 [ 573.366129][T12675] __send_signal+0x508/0xcd0 [ 573.370706][T12675] send_signal+0x6e0/0x830 [ 573.375106][T12675] force_sig_info_to_task+0x247/0x2e0 [ 573.380475][T12675] force_sig_fault+0xbf/0x130 [ 573.385190][T12675] __bad_area_nosemaphore+0x307/0x470 [ 573.390550][T12675] bad_area+0x6b/0x80 [ 573.394643][T12675] do_user_addr_fault+0xacc/0xaf0 [ 573.399667][T12675] __do_page_fault+0xd3/0x1f0 [ 573.404807][T12675] do_page_fault+0x99/0xb0 [ 573.409210][T12675] page_fault+0x39/0x40 [ 573.413677][T12675] RIP: 0033:0x45347f 13:18:07 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x900}) [ 573.417557][T12675] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 573.437458][T12675] RSP: 002b:00007f0134a31a88 EFLAGS: 00010283 [ 573.444610][T12675] RAX: 00007f0134a31b40 RBX: 0000000020000068 RCX: 0000000000000000 [ 573.452943][T12675] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007f0134a31b40 [ 573.460919][T12675] RBP: 0000000000000001 R08: 00000000000000e0 R09: 000000000000000a [ 573.469757][T12675] R10: 0000000000000075 R11: 00000000004e5320 R12: 0000000000000005 [ 573.477883][T12675] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:18:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x8847000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 573.510994][T12671] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:18:07 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0xa00}) 13:18:07 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x2, 0x0, 0x7}]}, 0x10) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000000)) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000001180)={'syz0\x00', {0x400, 0x81, 0x10000, 0x7ff}, 0x43, [0x8, 0x6bd0, 0x8, 0x1, 0x0, 0x1000, 0x200, 0x0, 0x8000, 0xad, 0x86, 0x9, 0x100, 0xfffffffffffffffc, 0x6, 0x3, 0x401, 0x200, 0x101, 0x6, 0x1, 0x4, 0x78, 0x7, 0x5, 0x81, 0x5, 0x80, 0x6, 0x401, 0x2e, 0x8000, 0x1, 0x5, 0xfffffffffffffffb, 0x40, 0x3, 0x6, 0x2, 0x98, 0xffffffff00000000, 0x1, 0x40000000000000, 0x3ff, 0x7, 0xfffe000000000000, 0x5, 0x7fff, 0xb21, 0x7, 0x10001, 0xfffffffffffffffa, 0x6, 0xfffffffffffff801, 0x7, 0x9, 0x1, 0x0, 0x1, 0x2, 0xfffffffffffffc00, 0xffffffff80000000, 0xff, 0x1ff], [0x6, 0x4, 0x1ff, 0x3, 0x8, 0x1816a1fe, 0x8, 0x1, 0x4, 0x9, 0x800, 0x8000, 0x3e3f, 0x68, 0x5, 0xe80e, 0x7ff, 0x80000001, 0x1, 0x7f, 0xa81, 0x8e, 0x8, 0x7, 0x7, 0x8000, 0xcb9a, 0x1000, 0xfffffffffffffffd, 0x9, 0x7fff, 0x100000001, 0x5a4a, 0x5, 0x9, 0x9, 0x2, 0x7, 0x7, 0x0, 0x4, 0x9, 0x2570, 0x9f, 0x7d3d, 0x3, 0x4c4, 0x4, 0x100000000, 0xffffffff, 0xf2, 0x2102bf44, 0x4, 0x9, 0x5, 0x5, 0x2, 0x3, 0x2, 0x5, 0x1, 0x3, 0x3, 0xb9a], [0x6, 0x0, 0xe1ec1b8, 0xfffffffffffffffe, 0x2, 0x7f, 0x29f, 0x1, 0x4, 0xfffffffffffffff9, 0x2, 0x6, 0xcace, 0x6, 0x1, 0x6, 0x1a3fa281, 0x40, 0x5, 0x4, 0x9, 0x6, 0x1, 0xa00, 0x12d5, 0x0, 0x9, 0x3ff, 0x5, 0x7ff, 0x1, 0x4, 0x7fffffff, 0x8000, 0x3, 0x2, 0xffffffffffffff43, 0x3, 0x2, 0x100, 0x80000001, 0x7, 0x1, 0xbedb, 0x0, 0x8, 0xffffffff, 0x0, 0xfffffffffffffffd, 0x2, 0x7fffffff, 0xe6ec, 0x4, 0x80, 0x966, 0x7fff, 0x400, 0x0, 0x3f, 0x40, 0x68b2, 0x755b539b, 0x1000, 0x800], [0x101, 0x8, 0x80000001, 0x7, 0xfff, 0x4, 0x6, 0x9, 0x4, 0x4, 0x7fc, 0x1ff, 0x400, 0x7, 0x8, 0x6, 0x8, 0x80, 0x0, 0x7, 0x1, 0x1, 0xfff, 0x1, 0x2, 0x35, 0x7, 0x6, 0x7, 0x6, 0x7, 0x3, 0x6, 0x2, 0x3, 0x100, 0x9, 0x5, 0x3, 0x4a5, 0x8, 0x99b, 0x7, 0x5, 0x4, 0x3, 0x5fe7, 0x7fffffff, 0xffffffff, 0x7b, 0x7fff, 0xc4, 0x9, 0x5, 0x9, 0x5, 0x3, 0x7ff, 0x44, 0x80000000, 0x928f]}, 0x45c) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r2, &(0x7f0000000180)=""/4096, 0x1000) [ 573.567802][T12683] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 573.577425][T12683] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 573.599705][T12687] netlink: 'syz-executor.4': attribute type 33 has an invalid length. 13:18:07 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0xb00}) [ 573.637150][T12687] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:18:08 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0xffffffae, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x6d, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0xff64}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:18:08 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0xc00}) 13:18:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x8848000000000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = getpgrp(0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) r3 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x804) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b97000)={0x1, &(0x7f000048fff0)=[{0x6}]}, 0x10) getsockopt$sock_buf(r4, 0x1, 0x1a, 0x0, &(0x7f0000000000)) kcmp(r1, r2, 0x1, r3, r4) read$alg(0xffffffffffffffff, &(0x7f0000000180)=""/4096, 0x1000) 13:18:08 executing program 5 (fault-call:1 fault-nth:57): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:08 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0xd00}) [ 574.340008][T12700] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 574.365869][T12700] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 574.396346][T12707] FAULT_INJECTION: forcing a failure. [ 574.396346][T12707] name failslab, interval 1, probability 0, space 0, times 0 [ 574.421998][T12707] CPU: 1 PID: 12707 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 574.423172][T12710] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 574.430760][T12707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 574.430765][T12707] Call Trace: [ 574.430787][T12707] dump_stack+0x1d8/0x2f8 [ 574.430800][T12707] should_fail+0x555/0x770 [ 574.430812][T12707] __should_failslab+0x11a/0x160 [ 574.430821][T12707] ? ksys_mount+0x6a/0x100 [ 574.430829][T12707] should_failslab+0x9/0x20 [ 574.430837][T12707] __kmalloc_track_caller+0x79/0x340 [ 574.430847][T12707] strndup_user+0x76/0x130 [ 574.430855][T12707] ksys_mount+0x6a/0x100 [ 574.430864][T12707] __x64_sys_mount+0xbf/0xd0 13:18:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:08 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0xe00}) [ 574.430874][T12707] do_syscall_64+0xfe/0x140 [ 574.430889][T12707] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 574.451399][T12710] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 574.452578][T12707] RIP: 0033:0x45c2ca [ 574.452588][T12707] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 13:18:08 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x1100}) [ 574.452600][T12707] RSP: 002b:00007f0134a31a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 574.473432][T12704] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 574.476338][T12707] RAX: ffffffffffffffda RBX: 00007f0134a31b40 RCX: 000000000045c2ca [ 574.492849][T12704] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 574.496025][T12707] RDX: 00007f0134a31ae0 RSI: 0000000020000100 RDI: 00007f0134a31b00 [ 574.496030][T12707] RBP: 0000000000000001 R08: 00007f0134a31b40 R09: 00007f0134a31ae0 [ 574.496035][T12707] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 574.496040][T12707] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 574.571908][T12702] debugfs: File '12701' in directory 'proc' already present! 13:18:08 executing program 2: socket$xdp(0x2c, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x7935, &(0x7f0000000080)="a5c15bdbdf33d1bc79a2db00e4118d4e0139844eed1a14ff835daa53dea690c28616efec58edc9ebf19baa812a21e2af1bc08ec112bc8c3db0c861bb7482b16beac19f2aff54c48701e86b7a") unshare(0x1a010100) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) ioctl$KVM_REINJECT_CONTROL(0xffffffffffffffff, 0xae71, &(0x7f0000000000)={0x40}) 13:18:08 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x1200}) [ 574.649728][T12715] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 574.689346][T12715] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:18:09 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0xffffffae, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x6d, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0xff64}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:18:09 executing program 5 (fault-call:1 fault-nth:58): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x88a8ffff00000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x401, 0x5727f06fb7e8c9ac) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f00000000c0)=0x1, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x210000, 0x0) read$alg(r2, &(0x7f0000000180)=""/4096, 0x1000) 13:18:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:09 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x2500}) 13:18:09 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x4000}) [ 575.212643][T12734] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 575.238327][T12734] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 575.276970][T12732] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 575.301859][T12732] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 575.306672][T12736] FAULT_INJECTION: forcing a failure. [ 575.306672][T12736] name failslab, interval 1, probability 0, space 0, times 0 [ 575.330488][T12736] CPU: 0 PID: 12736 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 575.343299][T12736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 575.353763][T12736] Call Trace: [ 575.357064][T12736] dump_stack+0x1d8/0x2f8 [ 575.361410][T12736] should_fail+0x555/0x770 [ 575.365846][T12736] __should_failslab+0x11a/0x160 [ 575.371849][T12736] ? getname_flags+0xba/0x640 [ 575.376593][T12736] should_failslab+0x9/0x20 [ 575.381105][T12736] kmem_cache_alloc+0x56/0x2e0 [ 575.385872][T12736] ? trace_hardirqs_on_caller+0x74/0x80 [ 575.391438][T12736] getname_flags+0xba/0x640 [ 575.395946][T12736] ? check_preemption_disabled+0xa9/0x2a0 [ 575.401693][T12736] user_path_at_empty+0x2d/0x50 [ 575.406561][T12736] do_mount+0xd4/0x2490 [ 575.411036][T12736] ? copy_mount_options+0x25e/0x3c0 [ 575.416265][T12736] ? copy_mount_options+0x308/0x3c0 [ 575.421875][T12736] ksys_mount+0xcc/0x100 [ 575.426129][T12736] __x64_sys_mount+0xbf/0xd0 [ 575.430873][T12736] do_syscall_64+0xfe/0x140 [ 575.435602][T12736] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 575.441606][T12736] RIP: 0033:0x45c2ca [ 575.445502][T12736] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 575.465513][T12736] RSP: 002b:00007f0134a31a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 13:18:09 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x5c00}) 13:18:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x9effffff00000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") open(&(0x7f0000000080)='./file0\x00', 0x400000, 0x2) unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b97000)={0x2000000000000120, &(0x7f0000000140)=[{0x3, 0x80000001, 0x100000001, 0x400}, {0x4, 0x200, 0x0, 0x3}, {0xffff, 0x942b, 0xff, 0x5}, {0x180, 0x6, 0x400000008, 0x1ffc000000000000}, {0x80e0, 0x9, 0x9, 0x80000001}, {0x2, 0xfffffffffffffffd, 0x7, 0x7f}]}, 0xe) getsockopt$sock_buf(r2, 0x1, 0x1a, 0x0, &(0x7f0000000000)) r3 = dup(r2) ioctl$DRM_IOCTL_MODESET_CTL(r3, 0x40086408, &(0x7f00000000c0)={0x800, 0xfffffffffffffffa}) 13:18:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 575.474182][T12736] RAX: ffffffffffffffda RBX: 00007f0134a31b40 RCX: 000000000045c2ca [ 575.482414][T12736] RDX: 00007f0134a31ae0 RSI: 0000000020000100 RDI: 00007f0134a31b00 [ 575.491073][T12736] RBP: 0000000000000001 R08: 00007f0134a31b40 R09: 00007f0134a31ae0 [ 575.499050][T12736] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 575.507351][T12736] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:18:09 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x1000000}) 13:18:09 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x3, 0x103, &(0x7f00000078c0)) 13:18:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xc3ffffff00000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x40000000) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x400000, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x0) 13:18:09 executing program 5 (fault-call:1 fault-nth:59): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:09 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x2000000}) 13:18:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:10 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x25640c0}) [ 576.105450][T12761] IPVS: ftp: loaded support on port[0] = 21 13:18:10 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x3000000}) 13:18:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xefffffff00000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 576.195361][T12766] FAULT_INJECTION: forcing a failure. [ 576.195361][T12766] name failslab, interval 1, probability 0, space 0, times 0 [ 576.244490][T12766] CPU: 0 PID: 12766 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 576.252402][T12766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 576.252407][T12766] Call Trace: [ 576.252424][T12766] dump_stack+0x1d8/0x2f8 [ 576.252437][T12766] should_fail+0x555/0x770 [ 576.252449][T12766] __should_failslab+0x11a/0x160 [ 576.252459][T12766] ? getname_flags+0xba/0x640 [ 576.252469][T12766] should_failslab+0x9/0x20 [ 576.252477][T12766] kmem_cache_alloc+0x56/0x2e0 [ 576.252484][T12766] ? trace_hardirqs_on_caller+0x74/0x80 [ 576.252498][T12766] getname_flags+0xba/0x640 [ 576.279500][T12766] ? check_preemption_disabled+0xa9/0x2a0 [ 576.279516][T12766] user_path_at_empty+0x2d/0x50 [ 576.298994][T12766] do_mount+0xd4/0x2490 [ 576.299003][T12766] ? copy_mount_options+0x25e/0x3c0 [ 576.299013][T12766] ? copy_mount_options+0x308/0x3c0 [ 576.299030][T12766] ksys_mount+0xcc/0x100 [ 576.325222][T12769] IPVS: ftp: loaded support on port[0] = 21 [ 576.328632][T12766] __x64_sys_mount+0xbf/0xd0 [ 576.328647][T12766] do_syscall_64+0xfe/0x140 [ 576.328658][T12766] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 576.328676][T12766] RIP: 0033:0x45c2ca [ 576.357767][T12766] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 576.377377][T12766] RSP: 002b:00007f0134a31a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 576.377386][T12766] RAX: ffffffffffffffda RBX: 00007f0134a31b40 RCX: 000000000045c2ca 13:18:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 576.377391][T12766] RDX: 00007f0134a31ae0 RSI: 0000000020000100 RDI: 00007f0134a31b00 [ 576.377395][T12766] RBP: 0000000000000001 R08: 00007f0134a31b40 R09: 00007f0134a31ae0 [ 576.377399][T12766] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 576.377403][T12766] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:18:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xf0ffffff00000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:10 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x3, 0x103, &(0x7f00000078c0)) 13:18:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b97000)={0x1, &(0x7f000048fff0)=[{0x6}]}, 0x10) getsockopt$sock_buf(r1, 0x1, 0x1a, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x1}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000000140)={r2, 0x4}, 0x8) connect$inet(r1, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r3, &(0x7f0000000180)=""/4096, 0x1000) 13:18:10 executing program 5 (fault-call:1 fault-nth:60): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:10 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x4000000}) 13:18:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xfeffffff00000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 577.000400][T12792] FAULT_INJECTION: forcing a failure. [ 577.000400][T12792] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 577.014334][T12792] CPU: 1 PID: 12792 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 577.022242][T12792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 577.032749][T12792] Call Trace: [ 577.036056][T12792] dump_stack+0x1d8/0x2f8 [ 577.040397][T12792] should_fail+0x555/0x770 [ 577.045097][T12792] should_fail_alloc_page+0x55/0x60 [ 577.050444][T12792] prepare_alloc_pages+0x283/0x470 [ 577.055574][T12792] __alloc_pages_nodemask+0xb2/0x5d0 [ 577.060869][T12792] kmem_getpages+0x56/0xa20 [ 577.065367][T12792] ? trace_lock_release+0x135/0x1a0 [ 577.070556][T12792] cache_grow_begin+0x7e/0x2c0 [ 577.075313][T12792] cache_alloc_refill+0x311/0x3f0 [ 577.080320][T12792] ? check_preemption_disabled+0xb7/0x2a0 [ 577.086020][T12792] kmem_cache_alloc+0x2b9/0x2e0 [ 577.090885][T12792] ? getname_flags+0xba/0x640 [ 577.095574][T12792] getname_flags+0xba/0x640 [ 577.100061][T12792] user_path_at_empty+0x2d/0x50 [ 577.104889][T12792] do_mount+0xd4/0x2490 [ 577.109218][T12792] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 577.114778][T12792] ? copy_mount_options+0x5f/0x3c0 [ 577.119991][T12792] ? __kasan_check_read+0x11/0x20 [ 577.125030][T12792] ? copy_mount_options+0x308/0x3c0 [ 577.130533][T12792] ksys_mount+0xcc/0x100 [ 577.134791][T12792] __x64_sys_mount+0xbf/0xd0 [ 577.139367][T12792] do_syscall_64+0xfe/0x140 [ 577.143859][T12792] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 577.149760][T12792] RIP: 0033:0x45c2ca [ 577.153659][T12792] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 577.173263][T12792] RSP: 002b:00007f0134a31a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 577.181657][T12792] RAX: ffffffffffffffda RBX: 00007f0134a31b40 RCX: 000000000045c2ca [ 577.189763][T12792] RDX: 00007f0134a31ae0 RSI: 0000000020000100 RDI: 00007f0134a31b00 13:18:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xffffff7f00000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:11 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x5000000}) [ 577.197735][T12792] RBP: 0000000000000001 R08: 00007f0134a31b40 R09: 00007f0134a31ae0 [ 577.205710][T12792] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 577.213996][T12792] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:18:11 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x6000000}) 13:18:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xffffffff00000000, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:11 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x3, 0x103, &(0x7f00000078c0)) 13:18:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:11 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x7000000}) 13:18:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x3faf398e10d099e6) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x9, 0x80) write$uinput_user_dev(r1, &(0x7f0000001180)={'syz0\x00', {0x8, 0x4, 0x3, 0x7}, 0x24, [0xfffffffffffffff9, 0xa0b, 0xd4, 0xfd, 0x30000, 0x7fff, 0x5, 0x3, 0x1000, 0x8, 0x3, 0x4, 0x27, 0x0, 0x6, 0x9, 0x9, 0x5, 0x2, 0x8001, 0x1, 0x3f, 0x3f, 0xffffffffffffffff, 0x5, 0x4ad3, 0x4, 0x401, 0xed, 0x6, 0x2, 0x518, 0x9, 0x6, 0x10001, 0x6, 0x7, 0x7, 0x6, 0x0, 0x1, 0x7f, 0x3, 0x15, 0x9, 0x2, 0x6, 0x8, 0xfff, 0x604, 0x7fff, 0xb32f, 0x6, 0x6, 0x8, 0x80000001, 0x5, 0x81, 0x1, 0x6, 0x8, 0x5, 0x4, 0x7], [0x80000000, 0x9, 0x8000, 0x7, 0x7, 0x4, 0x20, 0x9, 0x1000, 0x7ff, 0x100, 0x8000, 0xb66, 0xffff, 0xb4, 0x5, 0x5, 0x7f, 0x401, 0xffff, 0xffff, 0x2, 0x7, 0x1, 0xff, 0xd582, 0x9, 0x80000000, 0x2, 0x6, 0xffffffffffffffff, 0x7, 0x4, 0x1, 0x3, 0x82e, 0xd11, 0x3, 0x0, 0x2, 0x7f, 0xffffffff, 0x0, 0x3, 0x1, 0x7, 0xd6f, 0x200, 0x2, 0x9, 0x3, 0x4, 0x100000000, 0x5, 0x8, 0x7, 0x7f, 0x5, 0x4, 0x100, 0x2, 0x1d, 0x2, 0x8001], [0x20, 0x5, 0xf065, 0x7ff, 0x7, 0x7, 0x400000000, 0x80000000, 0x5, 0x0, 0x6, 0xfffffffffffffffc, 0x1, 0x0, 0x0, 0x4, 0x2, 0x90, 0x8, 0x5, 0x3, 0x8513, 0x8, 0x7, 0x2, 0x3, 0x8, 0x1, 0x5f, 0x3ff, 0x3, 0x108, 0xbc7, 0x7, 0x1f, 0x3, 0x0, 0x12a, 0x2, 0xca03, 0x1ff, 0x3, 0x401, 0x1, 0x200, 0xffff, 0x2, 0xffff, 0x400, 0x6, 0x7, 0x4, 0xffffffff00000001, 0xc065, 0x7, 0x9, 0x9233, 0x8, 0x2, 0x1, 0x9, 0x1, 0x9, 0x100], [0x200, 0x9, 0x30e0, 0xffffffff, 0xfff, 0x1, 0x0, 0x5, 0x38000000000, 0x0, 0x363, 0x1, 0x1de1, 0xffffffff, 0x6, 0x80000001, 0x0, 0x80, 0x7, 0x6, 0x0, 0x2, 0x7, 0x5, 0xffff, 0x5, 0x8, 0x70, 0xb1f6, 0x1f, 0xfff, 0x8, 0xff, 0xbbac, 0x5, 0x4, 0x2, 0x1, 0x2, 0x9, 0x6, 0x10001, 0x8, 0x0, 0x458f, 0x2, 0x2, 0x3ff, 0x2, 0x1, 0x8, 0x8, 0x9c, 0x9, 0x5, 0x856, 0x8, 0x80000000, 0x6, 0x4, 0x2, 0x1f, 0x1, 0x7]}, 0x45c) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r4 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fcntl$setown(r3, 0x8, 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a) ioctl$SIOCX25GFACILITIES(r3, 0x89e2, &(0x7f0000000000)) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = socket$inet6(0xa, 0x3, 0x20000000021) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendto$inet6(r5, &(0x7f0000000000), 0xff77, 0x2000000, 0x0, 0x4d97) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x10, &(0x7f0000000000)=@sack_info={r8, 0x0, 0xffff}, 0xc) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f0000000140)={r8, 0x7}, &(0x7f0000001600)=0x8) sendfile(r3, r4, 0x0, 0x20000102000007) ioctl$BLKROSET(r3, 0x125d, &(0x7f00000000c0)=0x5) read$alg(r2, &(0x7f0000000180)=""/4096, 0x1000) ioctl$RTC_RD_TIME(0xffffffffffffffff, 0x80247009, &(0x7f0000000100)) 13:18:11 executing program 5 (fault-call:1 fault-nth:61): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:12 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x8000000}) 13:18:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 578.118088][T12830] FAULT_INJECTION: forcing a failure. [ 578.118088][T12830] name failslab, interval 1, probability 0, space 0, times 0 [ 578.222081][T12830] CPU: 1 PID: 12830 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 578.230013][T12830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 578.240068][T12830] Call Trace: [ 578.243379][T12830] dump_stack+0x1d8/0x2f8 [ 578.247871][T12830] should_fail+0x555/0x770 [ 578.252312][T12830] __should_failslab+0x11a/0x160 [ 578.257272][T12830] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 578.263012][T12830] should_failslab+0x9/0x20 [ 578.267534][T12830] __kmalloc+0x7a/0x340 [ 578.271705][T12830] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 578.277440][T12830] tomoyo_realpath_from_path+0xdc/0x7c0 [ 578.283121][T12830] tomoyo_mount_permission+0x294/0xa30 [ 578.288832][T12830] ? kmem_cache_free+0xd8/0xf0 [ 578.293617][T12830] tomoyo_sb_mount+0x35/0x40 [ 578.298231][T12830] security_sb_mount+0x84/0xe0 [ 578.303867][T12830] do_mount+0x107/0x2490 [ 578.308137][T12830] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 578.313805][T12830] ? copy_mount_options+0x5f/0x3c0 [ 578.319051][T12830] ? copy_mount_options+0x308/0x3c0 [ 578.325287][T12830] ksys_mount+0xcc/0x100 [ 578.329544][T12830] __x64_sys_mount+0xbf/0xd0 [ 578.334166][T12830] do_syscall_64+0xfe/0x140 [ 578.338684][T12830] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 578.344583][T12830] RIP: 0033:0x45c2ca [ 578.348485][T12830] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 578.368199][T12830] RSP: 002b:00007f0134a31a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 578.376617][T12830] RAX: ffffffffffffffda RBX: 00007f0134a31b40 RCX: 000000000045c2ca [ 578.384711][T12830] RDX: 00007f0134a31ae0 RSI: 0000000020000100 RDI: 00007f0134a31b00 [ 578.392693][T12830] RBP: 0000000000000001 R08: 00007f0134a31b40 R09: 00007f0134a31ae0 [ 578.400680][T12830] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 578.408655][T12830] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:18:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:12 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x9000000}) 13:18:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 578.517562][T12843] validate_nla: 18 callbacks suppressed [ 578.517568][T12843] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 578.526383][T12843] net_ratelimit: 18 callbacks suppressed [ 578.526390][T12843] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 578.566836][T12847] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 578.581792][T12847] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 578.638285][T12830] ERROR: Out of memory at tomoyo_realpath_from_path. 13:18:12 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{0x0, 0x0, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:18:12 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b97000)={0x1, &(0x7f000048fff0)=[{0x6}]}, 0x10) getsockopt$sock_buf(r2, 0x1, 0x1a, 0x0, &(0x7f0000000000)) ioctl$int_out(r2, 0x0, &(0x7f00000000c0)) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) 13:18:12 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0xa000000}) 13:18:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:12 executing program 5 (fault-call:1 fault-nth:62): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:12 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0xb000000}) 13:18:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 578.903719][T12853] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 578.918696][T12853] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 578.940381][T12856] netlink: 'syz-executor.1': attribute type 33 has an invalid length. 13:18:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r2, &(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, r2) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r2) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000001180)={r3, 0x1000, 0xfe}, &(0x7f00000011c0)={'enc=', 'pkcs1', ' hash=', {'ghash-clmulni\x00'}}, &(0x7f0000001240)="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", &(0x7f0000002240)=""/254) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x101400, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b97000)={0x1, &(0x7f000048fff0)=[{0x6}]}, 0x10) getsockopt$sock_buf(r4, 0x1, 0x1a, 0x0, &(0x7f0000000000)) r5 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x40, 0x0) dup3(r4, r5, 0x39c5db0a9b0b700a) [ 578.957237][T12856] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 579.004590][T12858] FAULT_INJECTION: forcing a failure. [ 579.004590][T12858] name failslab, interval 1, probability 0, space 0, times 0 [ 579.026991][T12866] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 579.046324][T12858] CPU: 1 PID: 12858 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 579.054961][T12858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 579.058167][T12866] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 579.065047][T12858] Call Trace: [ 579.065069][T12858] dump_stack+0x1d8/0x2f8 [ 579.065083][T12858] should_fail+0x555/0x770 [ 579.065096][T12858] __should_failslab+0x11a/0x160 [ 579.065107][T12858] ? getname_kernel+0x59/0x2f0 13:18:12 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0xc000000}) 13:18:13 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0xd000000}) 13:18:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 579.065118][T12858] should_failslab+0x9/0x20 [ 579.065128][T12858] kmem_cache_alloc+0x56/0x2e0 [ 579.065139][T12858] getname_kernel+0x59/0x2f0 [ 579.065147][T12858] kern_path+0x1f/0x40 [ 579.065156][T12858] tomoyo_mount_permission+0x7f1/0xa30 [ 579.065171][T12858] ? kmem_cache_free+0xd8/0xf0 [ 579.065191][T12858] tomoyo_sb_mount+0x35/0x40 [ 579.106644][T12858] security_sb_mount+0x84/0xe0 [ 579.106657][T12858] do_mount+0x107/0x2490 [ 579.106667][T12858] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 579.106675][T12858] ? copy_mount_options+0x5f/0x3c0 [ 579.106685][T12858] ? copy_mount_options+0x308/0x3c0 [ 579.106694][T12858] ksys_mount+0xcc/0x100 [ 579.106709][T12858] __x64_sys_mount+0xbf/0xd0 [ 579.121118][T12858] do_syscall_64+0xfe/0x140 [ 579.121173][T12858] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 579.121187][T12858] RIP: 0033:0x45c2ca [ 579.132536][T12858] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 579.132542][T12858] RSP: 002b:00007f0134a31a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 579.132550][T12858] RAX: ffffffffffffffda RBX: 00007f0134a31b40 RCX: 000000000045c2ca [ 579.132555][T12858] RDX: 00007f0134a31ae0 RSI: 0000000020000100 RDI: 00007f0134a31b00 [ 579.132559][T12858] RBP: 0000000000000001 R08: 00007f0134a31b40 R09: 00007f0134a31ae0 [ 579.132564][T12858] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 579.132569][T12858] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 579.260200][T12878] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 579.281423][T12878] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:18:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:13 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0xe000000}) 13:18:13 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{0x0, 0x0, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:18:13 executing program 5 (fault-call:1 fault-nth:63): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x9040, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) 13:18:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 579.900727][T12886] netlink: 'syz-executor.1': attribute type 33 has an invalid length. 13:18:13 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x10000000}) [ 579.939022][T12886] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 579.991724][T12890] FAULT_INJECTION: forcing a failure. [ 579.991724][T12890] name failslab, interval 1, probability 0, space 0, times 0 [ 580.009692][T12890] CPU: 0 PID: 12890 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 580.017611][T12890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 580.027686][T12890] Call Trace: [ 580.030984][T12890] dump_stack+0x1d8/0x2f8 [ 580.035304][T12890] should_fail+0x555/0x770 [ 580.039717][T12890] __should_failslab+0x11a/0x160 [ 580.044674][T12890] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 580.050395][T12890] should_failslab+0x9/0x20 [ 580.054887][T12890] __kmalloc+0x7a/0x340 [ 580.059029][T12890] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 580.064733][T12890] tomoyo_realpath_from_path+0xdc/0x7c0 [ 580.070289][T12890] tomoyo_mount_permission+0x294/0xa30 [ 580.075761][T12890] ? retint_kernel+0x2b/0x2b [ 580.080342][T12890] ? kmem_cache_free+0xd8/0xf0 [ 580.085094][T12890] tomoyo_sb_mount+0x35/0x40 [ 580.089662][T12890] security_sb_mount+0x84/0xe0 [ 580.094404][T12890] do_mount+0x107/0x2490 [ 580.098640][T12890] ? copy_mount_options+0x25e/0x3c0 [ 580.103847][T12890] ? copy_mount_options+0x308/0x3c0 [ 580.109028][T12890] ksys_mount+0xcc/0x100 [ 580.113433][T12890] __x64_sys_mount+0xbf/0xd0 [ 580.118029][T12890] do_syscall_64+0xfe/0x140 [ 580.122524][T12890] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 580.128448][T12890] RIP: 0033:0x45c2ca [ 580.132332][T12890] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 580.151929][T12890] RSP: 002b:00007f0134a31a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 580.161136][T12890] RAX: ffffffffffffffda RBX: 00007f0134a31b40 RCX: 000000000045c2ca [ 580.169709][T12890] RDX: 00007f0134a31ae0 RSI: 0000000020000100 RDI: 00007f0134a31b00 [ 580.178654][T12890] RBP: 0000000000000001 R08: 00007f0134a31b40 R09: 00007f0134a31ae0 13:18:14 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x11000000}) 13:18:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 580.186634][T12890] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 580.194617][T12890] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 580.202934][T12884] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 580.212262][T12890] ERROR: Out of memory at tomoyo_realpath_from_path. [ 580.222816][T12884] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:18:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x2, 0x0) unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) r2 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r3 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) ioprio_get$pid(0x4, 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a) ioctl$SIOCX25GFACILITIES(r2, 0x89e2, &(0x7f0000000000)) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r2, r3, 0x0, 0x20000102000007) ioctl$LOOP_SET_FD(r2, 0x4c00, r0) 13:18:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:14 executing program 5 (fault-call:1 fault-nth:64): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:14 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x12000000}) [ 580.335332][T12908] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 580.353633][T12908] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 580.372482][T12909] FAULT_INJECTION: forcing a failure. [ 580.372482][T12909] name failslab, interval 1, probability 0, space 0, times 0 [ 580.391373][T12909] CPU: 1 PID: 12909 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 580.399909][T12909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 580.410188][T12909] Call Trace: [ 580.413492][T12909] dump_stack+0x1d8/0x2f8 [ 580.417826][T12909] should_fail+0x555/0x770 [ 580.422251][T12909] __should_failslab+0x11a/0x160 [ 580.427207][T12909] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 580.432951][T12909] should_failslab+0x9/0x20 [ 580.437461][T12909] __kmalloc+0x7a/0x340 [ 580.442569][T12909] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 580.448304][T12909] tomoyo_realpath_from_path+0xdc/0x7c0 [ 580.453871][T12909] tomoyo_mount_permission+0x294/0xa30 [ 580.459344][T12909] ? path_lookupat+0x474/0xb30 [ 580.464137][T12909] ? kmem_cache_free+0xd8/0xf0 [ 580.468952][T12909] tomoyo_sb_mount+0x35/0x40 [ 580.473576][T12909] security_sb_mount+0x84/0xe0 [ 580.478356][T12909] do_mount+0x107/0x2490 [ 580.482618][T12909] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 580.488180][T12909] ? copy_mount_options+0x5f/0x3c0 [ 580.493482][T12909] ? copy_mount_options+0x308/0x3c0 [ 580.498687][T12909] ksys_mount+0xcc/0x100 [ 580.502937][T12909] __x64_sys_mount+0xbf/0xd0 [ 580.507653][T12909] do_syscall_64+0xfe/0x140 [ 580.512170][T12909] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 580.518063][T12909] RIP: 0033:0x45c2ca [ 580.521960][T12909] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 580.541581][T12909] RSP: 002b:00007f0134a31a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 580.550368][T12909] RAX: ffffffffffffffda RBX: 00007f0134a31b40 RCX: 000000000045c2ca [ 580.558363][T12909] RDX: 00007f0134a31ae0 RSI: 0000000020000100 RDI: 00007f0134a31b00 [ 580.566425][T12909] RBP: 0000000000000001 R08: 00007f0134a31b40 R09: 00007f0134a31ae0 [ 580.574408][T12909] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 580.582929][T12909] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:18:14 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x25000000}) [ 580.595625][T12904] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 580.595710][T12909] ERROR: Out of memory at tomoyo_realpath_from_path. [ 580.614537][T12904] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:18:14 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{0x0, 0x0, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:18:14 executing program 5 (fault-call:1 fault-nth:65): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:14 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x40000000}) 13:18:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) bind$inet(r4, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000b97000)={0x1, &(0x7f000048fff0)=[{0x6}]}, 0x10) getsockopt$sock_buf(r5, 0x1, 0x1a, 0x0, &(0x7f0000000000)) accept4$inet(r5, &(0x7f00000000c0)={0x2, 0x0, @remote}, &(0x7f0000000100)=0x10, 0x800) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x10005, 0x0) setsockopt$inet_dccp_int(r2, 0x21, 0xa, &(0x7f0000000140)=0x8d95, 0x4) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x8) ioctl$VHOST_SET_VRING_ERR(r2, 0x4008af22, &(0x7f0000000080)={0x0, r1}) ioctl$NBD_CLEAR_QUE(r3, 0xab05) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) 13:18:14 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x5c000000}) 13:18:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 580.819398][T12928] FAULT_INJECTION: forcing a failure. [ 580.819398][T12928] name failslab, interval 1, probability 0, space 0, times 0 [ 580.858202][T12928] CPU: 1 PID: 12928 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 580.866133][T12928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 580.866137][T12928] Call Trace: [ 580.866156][T12928] dump_stack+0x1d8/0x2f8 [ 580.866174][T12928] should_fail+0x555/0x770 [ 580.889257][T12928] __should_failslab+0x11a/0x160 [ 580.889271][T12928] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 580.889280][T12928] should_failslab+0x9/0x20 [ 580.889300][T12928] __kmalloc+0x7a/0x340 [ 580.908710][T12928] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 580.914452][T12928] tomoyo_realpath_from_path+0xdc/0x7c0 [ 580.920014][T12928] tomoyo_mount_permission+0x294/0xa30 [ 580.925622][T12928] ? kmem_cache_free+0xd8/0xf0 [ 580.930758][T12928] tomoyo_sb_mount+0x35/0x40 [ 580.935545][T12928] security_sb_mount+0x84/0xe0 [ 580.935558][T12928] do_mount+0x107/0x2490 [ 580.935569][T12928] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 580.935576][T12928] ? copy_mount_options+0x5f/0x3c0 [ 580.935591][T12928] ? copy_mount_options+0x308/0x3c0 [ 580.944974][T12928] ksys_mount+0xcc/0x100 [ 580.944987][T12928] __x64_sys_mount+0xbf/0xd0 [ 580.945004][T12928] do_syscall_64+0xfe/0x140 [ 580.974403][T12928] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 580.980293][T12928] RIP: 0033:0x45c2ca [ 580.984324][T12928] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 581.004554][T12928] RSP: 002b:00007f0134a31a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 13:18:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:14 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0xc0405602}) 13:18:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 581.012966][T12928] RAX: ffffffffffffffda RBX: 00007f0134a31b40 RCX: 000000000045c2ca [ 581.020948][T12928] RDX: 00007f0134a31ae0 RSI: 0000000020000100 RDI: 00007f0134a31b00 [ 581.028930][T12928] RBP: 0000000000000001 R08: 00007f0134a31b40 R09: 00007f0134a31ae0 [ 581.036894][T12928] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 581.044857][T12928] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 581.063335][T12928] ERROR: Out of memory at tomoyo_realpath_from_path. 13:18:15 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, 0x0, 0x0, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:18:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:15 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x1000000000000}) 13:18:15 executing program 5 (fault-call:1 fault-nth:66): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/netlink\x00') r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000100)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f00000011c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2020}, 0xc, &(0x7f0000001180)={&(0x7f0000000140)={0x14, r2, 0x300, 0x70bd29, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40000044}, 0x80) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r3, &(0x7f0000000180)=""/4096, 0x7954) [ 581.662618][T12957] FAULT_INJECTION: forcing a failure. [ 581.662618][T12957] name failslab, interval 1, probability 0, space 0, times 0 [ 581.691011][T12957] CPU: 1 PID: 12957 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 581.698942][T12957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 581.708998][T12957] Call Trace: [ 581.712296][T12957] dump_stack+0x1d8/0x2f8 [ 581.716640][T12957] should_fail+0x555/0x770 [ 581.721067][T12957] __should_failslab+0x11a/0x160 [ 581.726014][T12957] should_failslab+0x9/0x20 [ 581.730520][T12957] kmem_cache_alloc_trace+0x5d/0x2f0 [ 581.735850][T12957] ? legacy_init_fs_context+0x51/0xc0 [ 581.741239][T12957] legacy_init_fs_context+0x51/0xc0 [ 581.746455][T12957] alloc_fs_context+0x4e3/0x5f0 [ 581.751313][T12957] fs_context_for_mount+0x24/0x30 [ 581.756343][T12957] do_mount+0x1095/0x2490 [ 581.760684][T12957] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 581.766238][T12957] ? copy_mount_options+0x5f/0x3c0 [ 581.771365][T12957] ? copy_mount_options+0x308/0x3c0 [ 581.776569][T12957] ksys_mount+0xcc/0x100 [ 581.780823][T12957] __x64_sys_mount+0xbf/0xd0 [ 581.785420][T12957] do_syscall_64+0xfe/0x140 [ 581.790026][T12957] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 581.795927][T12957] RIP: 0033:0x45c2ca [ 581.799826][T12957] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 581.819432][T12957] RSP: 002b:00007f0134a31a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 581.828976][T12957] RAX: ffffffffffffffda RBX: 00007f0134a31b40 RCX: 000000000045c2ca [ 581.836972][T12957] RDX: 00007f0134a31ae0 RSI: 0000000020000100 RDI: 00007f0134a31b00 [ 581.844947][T12957] RBP: 0000000000000001 R08: 00007f0134a31b40 R09: 00007f0134a31ae0 [ 581.853013][T12957] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 13:18:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:15 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x100000000000000}) 13:18:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:15 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x200000000000000}) 13:18:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 581.861021][T12957] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:18:16 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, 0x0, 0x0, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:18:16 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x25640c000000000}) 13:18:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x5, 0x100) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001180)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000100)=0xfffffc90) ioctl$SIOCAX25ADDUID(r1, 0x89e1, &(0x7f0000000140)={0x3, @default, r2}) syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x5, 0x501002) unshare(0x24020400) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r3, &(0x7f0000000180)=""/4096, 0x1000) 13:18:16 executing program 5 (fault-call:1 fault-nth:67): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:16 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x300000000000000}) 13:18:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x45242, 0x0) setsockopt$inet_opts(r1, 0x0, 0x9, &(0x7f00000000c0), 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r2, &(0x7f0000000180)=""/4096, 0x1000) 13:18:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 582.786020][T12989] FAULT_INJECTION: forcing a failure. [ 582.786020][T12989] name failslab, interval 1, probability 0, space 0, times 0 [ 582.843989][T12989] CPU: 0 PID: 12989 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 582.852376][T12989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 582.862444][T12989] Call Trace: [ 582.865748][T12989] dump_stack+0x1d8/0x2f8 [ 582.870083][T12989] should_fail+0x555/0x770 [ 582.874503][T12989] __should_failslab+0x11a/0x160 [ 582.879445][T12989] ? getname_kernel+0x59/0x2f0 [ 582.884214][T12989] should_failslab+0x9/0x20 [ 582.888718][T12989] kmem_cache_alloc+0x56/0x2e0 [ 582.893488][T12989] getname_kernel+0x59/0x2f0 [ 582.898084][T12989] kern_path+0x1f/0x40 [ 582.902177][T12989] tomoyo_mount_permission+0x7f1/0xa30 [ 582.907649][T12989] ? retint_kernel+0x2b/0x2b [ 582.912252][T12989] ? kmem_cache_free+0xd8/0xf0 [ 582.917037][T12989] tomoyo_sb_mount+0x35/0x40 [ 582.921628][T12989] security_sb_mount+0x84/0xe0 [ 582.926394][T12989] do_mount+0x107/0x2490 [ 582.930634][T12989] ? copy_mount_options+0x25e/0x3c0 [ 582.935850][T12989] ? copy_mount_options+0x308/0x3c0 [ 582.941060][T12989] ksys_mount+0xcc/0x100 [ 582.945309][T12989] __x64_sys_mount+0xbf/0xd0 [ 582.949905][T12989] do_syscall_64+0xfe/0x140 [ 582.954408][T12989] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 582.960292][T12989] RIP: 0033:0x45c2ca [ 582.964182][T12989] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 582.983786][T12989] RSP: 002b:00007f0134a31a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 13:18:16 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x400000000000000}) 13:18:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 582.992196][T12989] RAX: ffffffffffffffda RBX: 00007f0134a31b40 RCX: 000000000045c2ca [ 583.000174][T12989] RDX: 00007f0134a31ae0 RSI: 0000000020000100 RDI: 00007f0134a31b00 [ 583.008156][T12989] RBP: 0000000000000001 R08: 00007f0134a31b40 R09: 00007f0134a31ae0 [ 583.016144][T12989] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 583.024111][T12989] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:18:17 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, 0x0, 0x0, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:18:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:17 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x500000000000000}) 13:18:17 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) ioctl$KVM_S390_INTERRUPT_CPU(r1, 0x4010ae94, &(0x7f0000001180)={0x4, 0x3e8, 0xfffffffffffffff9}) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) setsockopt$inet_dccp_int(r0, 0x21, 0xa, &(0x7f0000000140)=0x8d95, 0x4) setsockopt$packet_int(r0, 0x107, 0x17, &(0x7f0000000140)=0x3, 0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r4, &(0x7f0000000180)=""/4096, 0x1000) r5 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x0, 0x0) getsockopt$inet_int(r5, 0x0, 0x15, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 13:18:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:17 executing program 5 (fault-call:1 fault-nth:68): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:17 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x600000000000000}) [ 583.581356][T13013] validate_nla: 17 callbacks suppressed [ 583.581363][T13013] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 583.616585][T13016] FAULT_INJECTION: forcing a failure. [ 583.616585][T13016] name failslab, interval 1, probability 0, space 0, times 0 [ 583.637253][T13013] net_ratelimit: 17 callbacks suppressed [ 583.637260][T13013] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 583.651741][T13016] CPU: 1 PID: 13016 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 583.666284][T13016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 583.676907][T13016] Call Trace: [ 583.680206][T13016] dump_stack+0x1d8/0x2f8 13:18:17 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x700000000000000}) [ 583.684645][T13016] should_fail+0x555/0x770 [ 583.689275][T13016] __should_failslab+0x11a/0x160 [ 583.689286][T13016] ? getname_kernel+0x59/0x2f0 [ 583.689296][T13016] should_failslab+0x9/0x20 [ 583.689306][T13016] kmem_cache_alloc+0x56/0x2e0 [ 583.689316][T13016] getname_kernel+0x59/0x2f0 [ 583.689325][T13016] kern_path+0x1f/0x40 [ 583.689336][T13016] tomoyo_mount_permission+0x7f1/0xa30 [ 583.689351][T13016] ? kmem_cache_free+0xd8/0xf0 [ 583.689369][T13016] tomoyo_sb_mount+0x35/0x40 [ 583.703569][T13016] security_sb_mount+0x84/0xe0 [ 583.703584][T13016] do_mount+0x107/0x2490 [ 583.703595][T13016] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 583.703603][T13016] ? copy_mount_options+0x5f/0x3c0 [ 583.703614][T13016] ? copy_mount_options+0x308/0x3c0 [ 583.703628][T13016] ksys_mount+0xcc/0x100 [ 583.713415][T13016] __x64_sys_mount+0xbf/0xd0 [ 583.713427][T13016] do_syscall_64+0xfe/0x140 [ 583.713438][T13016] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 583.713447][T13016] RIP: 0033:0x45c2ca [ 583.713457][T13016] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 583.713462][T13016] RSP: 002b:00007f0134a31a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 583.713470][T13016] RAX: ffffffffffffffda RBX: 00007f0134a31b40 RCX: 000000000045c2ca [ 583.713475][T13016] RDX: 00007f0134a31ae0 RSI: 0000000020000100 RDI: 00007f0134a31b00 [ 583.713480][T13016] RBP: 0000000000000001 R08: 00007f0134a31b40 R09: 00007f0134a31ae0 13:18:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, r0, 0x0, 0x10001, 0x0) setsockopt$inet_dccp_int(r1, 0x21, 0xa, &(0x7f0000000140)=0x8d95, 0x4) ioctl$KVM_GET_MP_STATE(r1, 0x8004ae98, &(0x7f0000000080)) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b97000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0xfffffffffffffffe}]}, 0x10) getsockopt$sock_buf(r3, 0x1, 0x1a, 0x0, &(0x7f0000000000)) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b97000)={0x1, &(0x7f000048fff0)=[{0x6}]}, 0x10) getsockopt$sock_buf(r4, 0x1, 0x1a, 0x0, &(0x7f0000000000)) setsockopt$inet_mreq(r4, 0x0, 0x20, &(0x7f00000000c0)={@broadcast, @local}, 0x8) unshare(0x24020400) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r5, &(0x7f0000000180)=""/4096, 0x1000) 13:18:17 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x800000000000000}) 13:18:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 583.713485][T13016] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 583.713489][T13016] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 583.714003][T13018] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 583.740200][T13018] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 583.955011][T13032] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 583.975161][T13032] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 583.993435][T13035] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 584.003017][T13035] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:18:18 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}], 0x3, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:18:18 executing program 5 (fault-call:1 fault-nth:69): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:18 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x900000000000000}) 13:18:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:18 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0xa00000000000000}) [ 584.451168][T13042] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 584.475569][T13042] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 584.510888][T13044] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 584.529048][T13045] FAULT_INJECTION: forcing a failure. [ 584.529048][T13045] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 584.541077][T13044] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 584.542275][T13045] CPU: 0 PID: 13045 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 584.565344][T13045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 584.575400][T13045] Call Trace: [ 584.578696][T13045] dump_stack+0x1d8/0x2f8 [ 584.583027][T13045] should_fail+0x555/0x770 [ 584.587467][T13045] should_fail_alloc_page+0x55/0x60 [ 584.592688][T13045] prepare_alloc_pages+0x283/0x470 [ 584.597801][T13045] __alloc_pages_nodemask+0xb2/0x5d0 [ 584.603082][T13045] ? debug_check_no_obj_freed+0x505/0x5b0 [ 584.608806][T13045] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 584.614292][T13045] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 584.619931][T13045] kmem_getpages+0x56/0xa20 [ 584.624429][T13045] ? trace_lock_release+0x135/0x1a0 [ 584.629645][T13045] cache_grow_begin+0x7e/0x2c0 [ 584.634420][T13045] cache_alloc_refill+0x311/0x3f0 [ 584.639453][T13045] ? check_preemption_disabled+0xb7/0x2a0 [ 584.645208][T13045] kmem_cache_alloc+0x2b9/0x2e0 [ 584.650258][T13045] ? getname_kernel+0x59/0x2f0 [ 584.655136][T13045] getname_kernel+0x59/0x2f0 [ 584.659730][T13045] kern_path+0x1f/0x40 [ 584.663802][T13045] tomoyo_mount_permission+0x7f1/0xa30 [ 584.669252][T13045] ? retint_kernel+0x2b/0x2b [ 584.673842][T13045] ? kmem_cache_free+0xd8/0xf0 [ 584.678699][T13045] tomoyo_sb_mount+0x35/0x40 [ 584.683290][T13045] security_sb_mount+0x84/0xe0 [ 584.688063][T13045] do_mount+0x107/0x2490 [ 584.692309][T13045] ? copy_mount_options+0x25e/0x3c0 [ 584.697507][T13045] ? copy_mount_options+0x308/0x3c0 [ 584.702839][T13045] ksys_mount+0xcc/0x100 [ 584.707112][T13045] __x64_sys_mount+0xbf/0xd0 [ 584.711709][T13045] do_syscall_64+0xfe/0x140 [ 584.716241][T13045] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 584.722285][T13045] RIP: 0033:0x45c2ca [ 584.726359][T13045] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 584.745961][T13045] RSP: 002b:00007f0134a31a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 13:18:18 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0xb00000000000000}) 13:18:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 584.754487][T13045] RAX: ffffffffffffffda RBX: 00007f0134a31b40 RCX: 000000000045c2ca [ 584.762637][T13045] RDX: 00007f0134a31ae0 RSI: 0000000020000100 RDI: 00007f0134a31b00 [ 584.770698][T13045] RBP: 0000000000000001 R08: 00007f0134a31b40 R09: 00007f0134a31ae0 [ 584.770703][T13045] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 584.770707][T13045] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:18:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:18 executing program 2: r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0xfffffffffffff007, 0x2) setsockopt$inet_dccp_buf(r0, 0x21, 0x80, &(0x7f00000000c0)="a258144467f9b297aee7b68caea059096f498d3450cbde7be437e032c058108d787f20d54678dafe9ce8ba96c485d0daf4712706237cc83cf8ad04707ba0d660054f38ec44b9fa89f931a07a4d2be1567f0ec36c865d1a5917c27f2a73bb8988a4f315bd489985dfa5d8d3d5d776d8a2d91f7095099db477d5478610bd3c9375d4863bc18d21c7e9e4b8cb9f7ba83be6ddac", 0x92) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001200)={0x0}, &(0x7f0000001240)=0xc) r4 = inotify_init1(0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r5, &(0x7f0000000240)=[{&(0x7f0000000280)=""/61, 0x144}], 0x1, &(0x7f0000002540)=[{&(0x7f00000001c0)=""/63, 0x3f}], 0x1, 0x0) rt_tgsigqueueinfo(r3, r5, 0xe, &(0x7f0000001280)={0x10, 0xc22, 0x3}) rt_sigprocmask(0x1, &(0x7f0000001180)={0x2}, &(0x7f00000011c0), 0x8) read$alg(r2, &(0x7f0000000180)=""/4096, 0x1000) [ 584.827589][T13055] netlink: 'syz-executor.1': attribute type 33 has an invalid length. 13:18:18 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0xc00000000000000}) [ 584.863588][T13055] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 584.883377][T13058] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 584.895558][T13058] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:18:18 executing program 5 (fault-call:1 fault-nth:70): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 584.930923][T13064] ptrace attach of "/root/syz-executor.2"[9245] was attempted by "/root/syz-executor.2"[13064] [ 584.969954][T13064] ptrace attach of "/root/syz-executor.2"[9245] was attempted by "/root/syz-executor.2"[13064] [ 585.012189][T13066] FAULT_INJECTION: forcing a failure. [ 585.012189][T13066] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 585.026073][T13066] CPU: 0 PID: 13066 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 585.034677][T13066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 585.044888][T13066] Call Trace: [ 585.048189][T13066] dump_stack+0x1d8/0x2f8 [ 585.052543][T13066] should_fail+0x555/0x770 [ 585.056970][T13066] should_fail_alloc_page+0x55/0x60 [ 585.062186][T13066] prepare_alloc_pages+0x283/0x470 [ 585.067322][T13066] __alloc_pages_nodemask+0xb2/0x5d0 [ 585.072624][T13066] ? debug_check_no_obj_freed+0x505/0x5b0 [ 585.078355][T13066] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 585.083837][T13066] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 585.089601][T13066] kmem_getpages+0x56/0xa20 [ 585.094133][T13066] ? trace_lock_release+0x135/0x1a0 [ 585.099363][T13066] cache_grow_begin+0x7e/0x2c0 [ 585.104299][T13066] cache_alloc_refill+0x311/0x3f0 [ 585.109463][T13066] ? check_preemption_disabled+0xb7/0x2a0 [ 585.115209][T13066] kmem_cache_alloc+0x2b9/0x2e0 [ 585.120061][T13066] ? getname_kernel+0x59/0x2f0 [ 585.124825][T13066] getname_kernel+0x59/0x2f0 [ 585.129409][T13066] kern_path+0x1f/0x40 [ 585.133621][T13066] tomoyo_mount_permission+0x7f1/0xa30 [ 585.139525][T13066] ? retint_kernel+0x2b/0x2b [ 585.144150][T13066] ? kmem_cache_free+0xd8/0xf0 [ 585.148933][T13066] tomoyo_sb_mount+0x35/0x40 [ 585.153533][T13066] security_sb_mount+0x84/0xe0 [ 585.158316][T13066] do_mount+0x107/0x2490 [ 585.162587][T13066] ? copy_mount_options+0x308/0x3c0 [ 585.167818][T13066] ksys_mount+0xcc/0x100 [ 585.172182][T13066] __x64_sys_mount+0xbf/0xd0 [ 585.176785][T13066] do_syscall_64+0xfe/0x140 [ 585.181300][T13066] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 585.187211][T13066] RIP: 0033:0x45c2ca [ 585.191248][T13066] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 585.210951][T13066] RSP: 002b:00007f0134a31a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 585.219359][T13066] RAX: ffffffffffffffda RBX: 00007f0134a31b40 RCX: 000000000045c2ca [ 585.227342][T13066] RDX: 00007f0134a31ae0 RSI: 0000000020000100 RDI: 00007f0134a31b00 [ 585.235524][T13066] RBP: 0000000000000001 R08: 00007f0134a31b40 R09: 00007f0134a31ae0 [ 585.243619][T13066] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 585.251715][T13066] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:18:19 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}], 0x3, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:18:19 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0xd00000000000000}) 13:18:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c2f07000000000000000") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) 13:18:19 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0xe00000000000000}) [ 585.329953][T13071] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 585.358210][T13071] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 585.374475][T13074] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 585.383340][T13074] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:18:19 executing program 5 (fault-call:1 fault-nth:71): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = accept4(r0, &(0x7f0000000080)=@pppoe, &(0x7f0000000100)=0x80, 0x80000) setsockopt$packet_int(r1, 0x107, 0xc, &(0x7f0000000140)=0x6, 0x4) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r2, &(0x7f0000000180)=""/4096, 0x1000) 13:18:19 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x1000000000000000}) 13:18:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:19 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x1100000000000000}) [ 585.578178][T13092] FAULT_INJECTION: forcing a failure. [ 585.578178][T13092] name failslab, interval 1, probability 0, space 0, times 0 [ 585.596632][T13092] CPU: 0 PID: 13092 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 585.604651][T13092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 585.614822][T13092] Call Trace: [ 585.618122][T13092] dump_stack+0x1d8/0x2f8 [ 585.622458][T13092] should_fail+0x555/0x770 [ 585.626899][T13092] __should_failslab+0x11a/0x160 [ 585.631971][T13092] ? tomoyo_encode2+0x273/0x5a0 [ 585.636845][T13092] should_failslab+0x9/0x20 [ 585.641357][T13092] __kmalloc+0x7a/0x340 [ 585.645552][T13092] tomoyo_encode2+0x273/0x5a0 [ 585.650231][T13092] tomoyo_realpath_from_path+0x769/0x7c0 [ 585.655865][T13092] tomoyo_mount_permission+0x923/0xa30 [ 585.661320][T13092] ? retint_kernel+0x2b/0x2b [ 585.666073][T13092] ? kmem_cache_free+0xd8/0xf0 [ 585.670938][T13092] tomoyo_sb_mount+0x35/0x40 [ 585.675555][T13092] security_sb_mount+0x84/0xe0 [ 585.680349][T13092] do_mount+0x107/0x2490 [ 585.684609][T13092] ? copy_mount_options+0x25e/0x3c0 [ 585.689821][T13092] ? copy_mount_options+0x308/0x3c0 [ 585.695034][T13092] ksys_mount+0xcc/0x100 [ 585.699290][T13092] __x64_sys_mount+0xbf/0xd0 [ 585.703888][T13092] do_syscall_64+0xfe/0x140 [ 585.708391][T13092] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 585.714390][T13092] RIP: 0033:0x45c2ca [ 585.718284][T13092] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 585.738009][T13092] RSP: 002b:00007f0134a31a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 585.746788][T13092] RAX: ffffffffffffffda RBX: 00007f0134a31b40 RCX: 000000000045c2ca [ 585.754776][T13092] RDX: 00007f0134a31ae0 RSI: 0000000020000100 RDI: 00007f0134a31b00 [ 585.762767][T13092] RBP: 0000000000000001 R08: 00007f0134a31b40 R09: 00007f0134a31ae0 [ 585.770783][T13092] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 585.778772][T13092] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 585.791836][T13092] ERROR: Out of memory at tomoyo_realpath_from_path. 13:18:20 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}], 0x3, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:18:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:20 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000100)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r1, r0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000001280)=0x6, 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) bind$inet(r5, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r3, 0x0, r5, 0x0, 0x10005, 0x0) setsockopt$inet_dccp_int(r3, 0x21, 0xa, &(0x7f0000000140)=0x8d95, 0x4) connect$ax25(r4, &(0x7f0000001200)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x6}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast]}, 0x48) sendmsg$IPVS_CMD_ZERO(r3, &(0x7f00000011c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4200}, 0xc, &(0x7f0000001180)={&(0x7f0000000100)={0x64, 0x0, 0x820, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x40, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x77, 0x7a}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}]}, 0x64}}, 0xeb325f2af824e3c5) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_RX(r6, 0x6, 0x2, &(0x7f0000000080)=@ccm_128={{0xb12ded6bc2a92b10}, "bd6f2c7ecb35d764", "1c4167931b6ac08ffe49d4e87c450c18", "4f18f28f", "bb4417236ac1cda6"}, 0x28) read$alg(r6, &(0x7f0000000180)=""/4096, 0x1000) 13:18:20 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x1200000000000000}) 13:18:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:20 executing program 5 (fault-call:1 fault-nth:72): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 586.281573][T13103] FAULT_INJECTION: forcing a failure. [ 586.281573][T13103] name failslab, interval 1, probability 0, space 0, times 0 [ 586.312497][T13103] CPU: 1 PID: 13103 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 586.320430][T13103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 586.330486][T13103] Call Trace: [ 586.333784][T13103] dump_stack+0x1d8/0x2f8 [ 586.338221][T13103] should_fail+0x555/0x770 [ 586.342981][T13103] __should_failslab+0x11a/0x160 [ 586.348093][T13103] ? btrfs_mount+0x83/0x18f0 [ 586.352820][T13103] should_failslab+0x9/0x20 [ 586.357334][T13103] __kmalloc_track_caller+0x79/0x340 [ 586.362630][T13103] ? tomoyo_mount_permission+0x8d8/0xa30 [ 586.368388][T13103] kstrdup+0x34/0x70 [ 586.372557][T13103] btrfs_mount+0x83/0x18f0 [ 586.377002][T13103] ? legacy_parse_param+0x37b/0x880 [ 586.382403][T13103] ? cap_capable+0x250/0x290 [ 586.387407][T13103] legacy_get_tree+0xf9/0x1a0 [ 586.392103][T13103] ? btrfs_resize_thread_pool+0x290/0x290 [ 586.397824][T13103] vfs_get_tree+0x8f/0x380 [ 586.402251][T13103] do_mount+0x169d/0x2490 [ 586.406594][T13103] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 586.412148][T13103] ? copy_mount_options+0x5f/0x3c0 [ 586.417272][T13103] ? copy_mount_options+0x308/0x3c0 [ 586.422482][T13103] ksys_mount+0xcc/0x100 [ 586.426731][T13103] __x64_sys_mount+0xbf/0xd0 13:18:20 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x2500000000000000}) 13:18:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, &(0x7f0000000080)=0x36) 13:18:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:20 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 586.431337][T13103] do_syscall_64+0xfe/0x140 [ 586.435856][T13103] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 586.441757][T13103] RIP: 0033:0x45c2ca [ 586.445656][T13103] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 586.465355][T13103] RSP: 002b:00007f0134a31a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 586.465365][T13103] RAX: ffffffffffffffda RBX: 00007f0134a31b40 RCX: 000000000045c2ca [ 586.465369][T13103] RDX: 00007f0134a31ae0 RSI: 0000000020000100 RDI: 00007f0134a31b00 [ 586.465374][T13103] RBP: 0000000000000001 R08: 00007f0134a31b40 R09: 00007f0134a31ae0 [ 586.465380][T13103] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 586.465385][T13103] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:18:21 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {0x0}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:18:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:21 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x4000000000000000}) 13:18:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x400) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000001180)='fou\x00') r4 = syz_open_dev$admmidi(&(0x7f0000000180)='/dev/admmidi#\x00', 0x9, 0x0) ioctl$IMCTRLREQ(r4, 0x80044945, &(0x7f00000001c0)={0x4009, 0x9, 0x6, 0x6}) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r5, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1e}}}, 0x24) accept4$packet(r4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000580)=0x14, 0x800) bind$can_raw(r5, &(0x7f00000005c0)={0x1d, r6}, 0x10) sendmsg$FOU_CMD_GET(r2, &(0x7f0000001280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000400}, 0xc, &(0x7f0000001240)={&(0x7f00000011c0)={0x44, r3, 0x3ab3087bb58455ef, 0x70bd26, 0x25dfdbff, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x1}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}, @FOU_ATTR_IFINDEX={0x8, 0xb, r6}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @empty}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x44}, 0x1, 0x0, 0x0, 0x200000c0}, 0x8000) r7 = socket$inet_udp(0x2, 0x2, 0x0) close(r7) bind$inet(r7, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r7, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, r7, 0x0, 0x10005, 0x0) setsockopt$inet_dccp_int(r1, 0x21, 0xa, &(0x7f0000000140)=0x8d95, 0x4) read$alg(r1, &(0x7f0000000180)=""/4096, 0xfffffffffffffc7a) 13:18:21 executing program 5 (fault-call:1 fault-nth:73): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:21 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x5c00000000000000}) [ 587.135723][T13136] FAULT_INJECTION: forcing a failure. [ 587.135723][T13136] name failslab, interval 1, probability 0, space 0, times 0 13:18:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x400, 0x43) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x21b, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000011c0)={0x7, 0x8, 0xfa00, {r2, 0x2}}, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r3 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffff993, 0x80) ioctl$VIDIOC_G_SELECTION(r3, 0xc040565e, &(0x7f00000000c0)={0x1, 0x207, 0xb739166cccd90e60, {0x101, 0x9, 0x4, 0x98d}}) unshare(0x24020400) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r4, &(0x7f0000000180)=""/4096, 0x1000) 13:18:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 587.200927][T13136] CPU: 0 PID: 13136 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 587.208850][T13136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 587.218908][T13136] Call Trace: [ 587.222209][T13136] dump_stack+0x1d8/0x2f8 [ 587.226552][T13136] should_fail+0x555/0x770 [ 587.230994][T13136] __should_failslab+0x11a/0x160 [ 587.235942][T13136] ? tomoyo_realpath_from_path+0xdc/0x7c0 [ 587.235954][T13136] should_failslab+0x9/0x20 [ 587.235964][T13136] __kmalloc+0x7a/0x340 [ 587.235972][T13136] ? tomoyo_realpath_from_path+0xca/0x7c0 [ 587.235985][T13136] tomoyo_realpath_from_path+0xdc/0x7c0 [ 587.256562][T13136] tomoyo_mount_permission+0x923/0xa30 [ 587.256580][T13136] ? kmem_cache_free+0xd8/0xf0 [ 587.256598][T13136] tomoyo_sb_mount+0x35/0x40 [ 587.256613][T13136] security_sb_mount+0x84/0xe0 [ 587.268304][T13136] do_mount+0x107/0x2490 [ 587.268315][T13136] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 587.268323][T13136] ? copy_mount_options+0x5f/0x3c0 13:18:21 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0xffffffff00000000}) [ 587.268332][T13136] ? copy_mount_options+0x308/0x3c0 [ 587.268342][T13136] ksys_mount+0xcc/0x100 [ 587.268351][T13136] __x64_sys_mount+0xbf/0xd0 [ 587.268362][T13136] do_syscall_64+0xfe/0x140 [ 587.268373][T13136] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 587.268386][T13136] RIP: 0033:0x45c2ca [ 587.277872][T13136] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 587.277877][T13136] RSP: 002b:00007f0134a31a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 587.277885][T13136] RAX: ffffffffffffffda RBX: 00007f0134a31b40 RCX: 000000000045c2ca [ 587.277891][T13136] RDX: 00007f0134a31ae0 RSI: 0000000020000100 RDI: 00007f0134a31b00 [ 587.277896][T13136] RBP: 0000000000000001 R08: 00007f0134a31b40 R09: 00007f0134a31ae0 [ 587.277901][T13136] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 587.277906][T13136] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 587.341260][T13136] ERROR: Out of memory at tomoyo_realpath_from_path. 13:18:21 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {0x0}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:18:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:21 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x0, [0x2]}) 13:18:21 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) unshare(0x24020400) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) setsockopt$inet_dccp_int(r0, 0x21, 0xa, &(0x7f0000000140)=0x8d95, 0x4) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f0000000080)) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) read$alg(r2, &(0x7f0000000180)=""/4096, 0xffffffffffffff69) 13:18:21 executing program 5 (fault-call:1 fault-nth:74): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 588.032851][T13164] FAULT_INJECTION: forcing a failure. [ 588.032851][T13164] name failslab, interval 1, probability 0, space 0, times 0 [ 588.051759][T13164] CPU: 1 PID: 13164 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 588.059780][T13164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 588.070931][T13164] Call Trace: [ 588.070953][T13164] dump_stack+0x1d8/0x2f8 [ 588.070965][T13164] should_fail+0x555/0x770 13:18:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:22 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x0, [0x3]}) [ 588.070978][T13164] __should_failslab+0x11a/0x160 [ 588.070990][T13164] should_failslab+0x9/0x20 [ 588.071007][T13164] kmem_cache_alloc_trace+0x5d/0x2f0 [ 588.097751][T13164] ? alloc_fs_context+0x65/0x5f0 [ 588.102701][T13164] alloc_fs_context+0x65/0x5f0 [ 588.107596][T13164] ? trace_kmalloc+0xbb/0x130 [ 588.112276][T13164] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 588.112289][T13164] fs_context_for_mount+0x24/0x30 [ 588.112299][T13164] vfs_kern_mount+0x2c/0x160 [ 588.112310][T13164] btrfs_mount+0x34f/0x18f0 [ 588.112325][T13164] ? legacy_parse_param+0x37b/0x880 [ 588.112336][T13164] ? cap_capable+0x250/0x290 [ 588.112349][T13164] legacy_get_tree+0xf9/0x1a0 [ 588.127784][T13164] ? btrfs_resize_thread_pool+0x290/0x290 [ 588.127797][T13164] vfs_get_tree+0x8f/0x380 [ 588.127809][T13164] do_mount+0x169d/0x2490 [ 588.127819][T13164] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 588.127826][T13164] ? copy_mount_options+0x5f/0x3c0 [ 588.127837][T13164] ? copy_mount_options+0x308/0x3c0 [ 588.127846][T13164] ksys_mount+0xcc/0x100 13:18:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:22 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x0, [0x4]}) [ 588.127861][T13164] __x64_sys_mount+0xbf/0xd0 [ 588.147109][T13164] do_syscall_64+0xfe/0x140 [ 588.147123][T13164] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 588.147132][T13164] RIP: 0033:0x45c2ca [ 588.147142][T13164] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 588.147151][T13164] RSP: 002b:00007f0134a31a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 588.167134][T13164] RAX: ffffffffffffffda RBX: 00007f0134a31b40 RCX: 000000000045c2ca [ 588.167138][T13164] RDX: 00007f0134a31ae0 RSI: 0000000020000100 RDI: 00007f0134a31b00 [ 588.167144][T13164] RBP: 0000000000000001 R08: 00007f0134a31b40 R09: 00007f0134a31ae0 [ 588.167148][T13164] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 588.167154][T13164] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:18:22 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005e40)=""/128, 0x80}, {0x0}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:18:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0xde76, 0x200) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000001180)={0xffffffff, {{0xa, 0x4e22, 0x3f, @local, 0xb5b}}}, 0x88) unshare(0x24020400) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r2, &(0x7f0000000180)=""/4096, 0x1000) ioctl$TCSETXF(0xffffffffffffffff, 0x5434, &(0x7f0000000080)={0x80b9, 0x1, [0x68170d0f, 0x7ff, 0xfffffffffffffff9, 0x3, 0x5], 0xffffffffffffff81}) 13:18:22 executing program 5 (fault-call:1 fault-nth:75): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:22 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x0, [0x5]}) 13:18:22 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 588.919779][T13193] validate_nla: 20 callbacks suppressed [ 588.919785][T13193] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 588.951669][T13193] net_ratelimit: 20 callbacks suppressed 13:18:22 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x0, [0x6]}) [ 588.951675][T13193] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 589.030287][T13197] FAULT_INJECTION: forcing a failure. [ 589.030287][T13197] name failslab, interval 1, probability 0, space 0, times 0 [ 589.046217][T13196] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 589.046352][T13197] CPU: 0 PID: 13197 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 589.062608][T13197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 589.072669][T13197] Call Trace: [ 589.072690][T13197] dump_stack+0x1d8/0x2f8 [ 589.072702][T13197] should_fail+0x555/0x770 [ 589.072715][T13197] __should_failslab+0x11a/0x160 [ 589.072726][T13197] should_failslab+0x9/0x20 [ 589.072735][T13197] kmem_cache_alloc_trace+0x5d/0x2f0 [ 589.072744][T13197] ? alloc_fs_context+0x65/0x5f0 [ 589.072752][T13197] alloc_fs_context+0x65/0x5f0 [ 589.072768][T13197] ? _raw_read_unlock+0x2c/0x50 [ 589.077585][T13196] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 589.080392][T13197] ? get_fs_type+0x47f/0x500 [ 589.080405][T13197] fs_context_for_mount+0x24/0x30 [ 589.080413][T13197] do_mount+0x1095/0x2490 [ 589.080429][T13197] ksys_mount+0xcc/0x100 [ 589.090145][T13197] __x64_sys_mount+0xbf/0xd0 [ 589.090157][T13197] do_syscall_64+0xfe/0x140 [ 589.090170][T13197] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 589.090178][T13197] RIP: 0033:0x45c2ca [ 589.090194][T13197] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 589.187885][T13197] RSP: 002b:00007f0134a31a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 589.196335][T13197] RAX: ffffffffffffffda RBX: 00007f0134a31b40 RCX: 000000000045c2ca [ 589.204492][T13197] RDX: 00007f0134a31ae0 RSI: 0000000020000100 RDI: 00007f0134a31b00 [ 589.213404][T13197] RBP: 0000000000000001 R08: 00007f0134a31b40 R09: 00007f0134a31ae0 [ 589.221388][T13197] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 13:18:23 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x0, [0x7]}) 13:18:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, &(0x7f0000000080)=0x3, 0x4) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) 13:18:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 589.229361][T13197] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:18:23 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x0, [0x8]}) [ 589.287291][T13212] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 589.306464][T13212] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 589.331496][T13216] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 589.340304][T13216] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:18:23 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005ec0)}], 0x3, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:18:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:23 executing program 2: pipe(&(0x7f0000000240)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) bind$inet(r1, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) setsockopt$inet_dccp_int(r0, 0x21, 0xa, &(0x7f0000000140)=0x8d95, 0x4) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000100)={0x0, 0x0}) process_vm_readv(r3, &(0x7f0000000240)=[{&(0x7f0000000280)=""/61, 0x144}], 0x1, &(0x7f0000002540)=[{&(0x7f00000001c0)=""/63, 0x3f}], 0x1, 0x0) r4 = getpgid(r3) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x1, 0x100000000, 0x37, 0x4, 0x5, r4}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r6, &(0x7f0000004180)=""/4096, 0xfffffffffffffe06) 13:18:23 executing program 5 (fault-call:1 fault-nth:76): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:23 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x0, [0x9]}) 13:18:23 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x0, [0xa]}) [ 589.832800][T13222] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 589.843145][T13225] ptrace attach of "/root/syz-executor.2"[9245] was attempted by "/root/syz-executor.2"[13225] [ 589.876800][T13222] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 589.918130][T13229] FAULT_INJECTION: forcing a failure. [ 589.918130][T13229] name failslab, interval 1, probability 0, space 0, times 0 [ 589.920881][T13228] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 589.948850][T13229] CPU: 0 PID: 13229 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 589.953941][T13228] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 589.956770][T13229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 589.956774][T13229] Call Trace: [ 589.956794][T13229] dump_stack+0x1d8/0x2f8 [ 589.956811][T13229] should_fail+0x555/0x770 [ 589.994460][T13229] __should_failslab+0x11a/0x160 [ 589.999399][T13229] ? vfs_parse_fs_string+0xed/0x1a0 [ 590.004603][T13229] should_failslab+0x9/0x20 [ 590.009114][T13229] __kmalloc_track_caller+0x79/0x340 [ 590.014405][T13229] ? check_preemption_disabled+0xa9/0x2a0 [ 590.020655][T13229] kmemdup_nul+0x2a/0xa0 [ 590.024994][T13229] vfs_parse_fs_string+0xed/0x1a0 [ 590.030033][T13229] do_mount+0x11a6/0x2490 [ 590.034371][T13229] ? copy_mount_options+0x25e/0x3c0 [ 590.039584][T13229] ? copy_mount_options+0x308/0x3c0 [ 590.045220][T13229] ksys_mount+0xcc/0x100 [ 590.049495][T13229] __x64_sys_mount+0xbf/0xd0 [ 590.054279][T13229] do_syscall_64+0xfe/0x140 [ 590.058618][T13238] ptrace attach of "/root/syz-executor.2"[9245] was attempted by "/root/syz-executor.2"[13238] [ 590.058801][T13229] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 590.075219][T13229] RIP: 0033:0x45c2ca [ 590.079110][T13229] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 590.100601][T13229] RSP: 002b:00007f0134a31a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 590.110262][T13229] RAX: ffffffffffffffda RBX: 00007f0134a31b40 RCX: 000000000045c2ca 13:18:24 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x0, [0xb]}) 13:18:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 590.118242][T13229] RDX: 00007f0134a31ae0 RSI: 0000000020000100 RDI: 00007f0134a31b00 [ 590.126219][T13229] RBP: 0000000000000001 R08: 00007f0134a31b40 R09: 00007f0134a31ae0 [ 590.126224][T13229] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 590.126228][T13229] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 590.161241][T13240] netlink: 'syz-executor.1': attribute type 33 has an invalid length. 13:18:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) setsockopt$inet_dccp_int(r1, 0x21, 0xa, &(0x7f0000000140)=0x8d95, 0x4) sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x309900}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0xffffffffffffffb3, 0x0, 0x20, 0x70bd28, 0x25dfdbfd, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x3}, @SEG6_ATTR_SECRET={0x116, 0x4, [0x0, 0x8000]}]}, 0x28}, 0x1, 0x0, 0x0, 0x20000840}, 0x4000000) unshare(0x24020400) ioctl$VIDIOC_G_DV_TIMINGS(r2, 0xc0845658, &(0x7f0000001180)={0x0, @reserved}) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r4, &(0x7f0000000180)=""/4096, 0x1000) 13:18:24 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x0, [0xc]}) [ 590.201740][T13240] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 590.240970][T13246] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 590.260108][T13246] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:18:24 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005ec0)}], 0x3, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:18:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:24 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x0, [0xd]}) 13:18:24 executing program 5 (fault-call:1 fault-nth:77): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x11900, 0x0) write$P9_RWSTAT(r1, &(0x7f0000001180)={0x7, 0x7f, 0x2}, 0x7) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f00000000c0)={&(0x7f0000000080)=[0x6, 0x3, 0x0, 0x6, 0x4], 0x5, 0x8001, 0x0, 0x7, 0x5, 0x6, {0x3, 0x0, 0x4, 0xced, 0x8000, 0x8, 0x1ff, 0x2, 0x9, 0xebb4, 0x5, 0x182, 0x3, 0x3, "87b8757c1a01817527018f0abf086575afdf9e648efd1e40fd9cc293376730ee"}}) read$alg(r2, &(0x7f0000000180)=""/4096, 0x1000) 13:18:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 590.737947][T13258] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 590.762447][T13258] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:18:24 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x0, [0xe]}) 13:18:24 executing program 2: arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000001180)) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x4200, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r3, 0x0, 0x10005, 0x0) setsockopt$inet_dccp_int(r2, 0x21, 0xa, &(0x7f0000000140)=0x8d95, 0x4) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000001240)='TIPC\x00') r5 = creat(&(0x7f0000001380)='./file0\x00', 0x3) sendmsg$TIPC_CMD_SET_LINK_TOL(r5, &(0x7f0000001340)={&(0x7f0000001200)={0x10, 0x0, 0x0, 0xa0ca8096}, 0xc, &(0x7f0000001300)={&(0x7f0000001280)={0x68, r4, 0x24bded190f16cdf7, 0x70bd25, 0x25dfdbfe, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x80000001, @link='broadcast-link\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r2, 0x40405514, &(0x7f00000011c0)={0xa, 0x3, 0x3, 0x10000, '\x00', 0x2}) bind(r0, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e20, @empty}, 0x1, 0x2, 0x3, 0x2}}, 0x80) r6 = socket$inet_udplite(0x2, 0x2, 0x88) write$capi20(0xffffffffffffffff, &(0x7f00000013c0)={0x10, 0x4, 0x88, 0x555c6d0dfa79e748, 0x5, 0x5}, 0x10) ioctl(r6, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r7 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x40000, 0x0) read$alg(r7, &(0x7f0000000180)=""/4096, 0x1000) [ 590.787053][T13261] FAULT_INJECTION: forcing a failure. [ 590.787053][T13261] name failslab, interval 1, probability 0, space 0, times 0 [ 590.803945][T13267] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 590.828520][T13261] CPU: 0 PID: 13261 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 590.830998][T13267] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 590.836438][T13261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 590.836443][T13261] Call Trace: [ 590.836462][T13261] dump_stack+0x1d8/0x2f8 [ 590.836484][T13261] should_fail+0x555/0x770 [ 590.873928][T13261] __should_failslab+0x11a/0x160 [ 590.878877][T13261] should_failslab+0x9/0x20 [ 590.883670][T13261] kmem_cache_alloc_trace+0x5d/0x2f0 [ 590.889858][T13261] ? btrfs_mount_root+0x1b2/0x1050 [ 590.895312][T13261] btrfs_mount_root+0x1b2/0x1050 [ 590.900261][T13261] ? vfs_parse_fs_string+0x13b/0x1a0 [ 590.905544][T13261] ? trace_kfree+0xa0/0x110 [ 590.910043][T13261] legacy_get_tree+0xf9/0x1a0 [ 590.914713][T13261] ? btrfs_control_open+0x40/0x40 [ 590.919736][T13261] vfs_get_tree+0x8f/0x380 [ 590.924174][T13261] vfs_kern_mount+0xc2/0x160 [ 590.928938][T13261] btrfs_mount+0x34f/0x18f0 [ 590.933461][T13261] ? legacy_parse_param+0x37b/0x880 [ 590.938681][T13261] ? cap_capable+0x250/0x290 [ 590.943302][T13261] legacy_get_tree+0xf9/0x1a0 [ 590.947990][T13261] ? btrfs_resize_thread_pool+0x290/0x290 [ 590.953858][T13261] vfs_get_tree+0x8f/0x380 [ 590.958275][T13261] do_mount+0x169d/0x2490 [ 590.962611][T13261] ? copy_mount_options+0x25e/0x3c0 [ 590.967821][T13261] ? copy_mount_options+0x308/0x3c0 [ 590.973216][T13261] ksys_mount+0xcc/0x100 [ 590.977496][T13261] __x64_sys_mount+0xbf/0xd0 [ 590.982117][T13261] do_syscall_64+0xfe/0x140 [ 590.986634][T13261] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 590.992534][T13261] RIP: 0033:0x45c2ca [ 590.996434][T13261] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 591.016039][T13261] RSP: 002b:00007f0134a31a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 13:18:24 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x0, [0x10]}) 13:18:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:24 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x0, [0x11]}) 13:18:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x1, 0x200) ioctl$VIDIOC_S_DV_TIMINGS(r1, 0xc0845657, &(0x7f0000001180)={0x0, @bt={0x20, 0x6, 0x1, 0x2, 0x59eb, 0x2, 0x7525ef84, 0x7, 0x14c, 0x9, 0x7, 0x3, 0x64, 0xfffffffffffffffc, 0x1}}) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2, 0x2) ioctl$VIDIOC_G_OUTPUT(r2, 0x8004562e, &(0x7f00000000c0)) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r3 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000100)='/dev/capi20\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r4, r3, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000001240)={{{@in6=@local, @in6=@remote}}}, &(0x7f0000000140)=0xe8) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r5, &(0x7f0000000180)=""/4096, 0x1000) [ 591.024734][T13261] RAX: ffffffffffffffda RBX: 00007f0134a31b40 RCX: 000000000045c2ca [ 591.024740][T13261] RDX: 00007f0134a31ae0 RSI: 0000000020000100 RDI: 00007f0134a31b00 [ 591.024744][T13261] RBP: 0000000000000001 R08: 00007f0134a31b40 R09: 00007f0134a31ae0 [ 591.024748][T13261] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 591.024752][T13261] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:18:25 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {&(0x7f0000005ec0)}], 0x3, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:18:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:25 executing program 5 (fault-call:1 fault-nth:78): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:25 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x0, [0x12]}) 13:18:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000000)=@sack_info={r3, 0x0, 0xffff}, 0xc) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000080)={r3, 0x44, "6d9fbfea489fca9b496505732b2fa427b7400136874b6007edf0a41ba815e833fafa345b448c901fea331093870b32959a19e13f189c92f0c50021ae8926d4b7619e1853"}, &(0x7f0000000100)=0x4c) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r4, &(0x7f0000001180)=0x2) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe4ffff70") unshare(0x24020400) r5 = syz_open_dev$sndpcmc(&(0x7f00000011c0)='/dev/snd/pcmC#D#c\x00', 0x29164149, 0x40200) getsockname$netlink(r5, &(0x7f0000001200), &(0x7f0000001240)=0xc) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000001280)={0x3, 0x8001, 0x4000, 0x9, 0xfffffffffffffff8, 0x80000001, 0xffffffffffffcfe4, 0x0, r3}, &(0x7f00000012c0)=0x20) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r6, &(0x7f0000000180)=""/4096, 0x1000) 13:18:25 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x0, [0x25]}) 13:18:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 591.710403][T13295] FAULT_INJECTION: forcing a failure. [ 591.710403][T13295] name failslab, interval 1, probability 0, space 0, times 0 [ 591.752658][T13295] CPU: 0 PID: 13295 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 591.760704][T13295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 591.771016][T13295] Call Trace: [ 591.774316][T13295] dump_stack+0x1d8/0x2f8 [ 591.778662][T13295] should_fail+0x555/0x770 [ 591.783104][T13295] __should_failslab+0x11a/0x160 [ 591.788062][T13295] ? vfs_parse_fs_string+0xed/0x1a0 [ 591.793383][T13295] should_failslab+0x9/0x20 [ 591.797911][T13295] __kmalloc_track_caller+0x79/0x340 13:18:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") epoll_wait(0xffffffffffffffff, 0xfffffffffffffffd, 0xffffff67, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b97000)={0x1, &(0x7f000048fff0)=[{0x6}]}, 0x10) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) bind$inet(r5, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r4, 0x0, r5, 0x0, 0x10005, 0x0) setsockopt$inet_dccp_int(r4, 0x21, 0xa, &(0x7f0000000140)=0x8d95, 0x4) ioctl$UI_SET_KEYBIT(r4, 0x40045565, 0x178) getsockopt$sock_buf(r3, 0x1, 0x1a, 0x0, &(0x7f0000000000)) fsetxattr$security_smack_entry(r3, &(0x7f0000000080)='security.SMACK64\x00', &(0x7f00000000c0)='/dev/sequencer2\x00', 0x10, 0x1) read$alg(r2, &(0x7f0000000180)=""/4096, 0x1000) [ 591.803228][T13295] kmemdup_nul+0x2a/0xa0 [ 591.807497][T13295] vfs_parse_fs_string+0xed/0x1a0 [ 591.812641][T13295] vfs_kern_mount+0x77/0x160 [ 591.817257][T13295] btrfs_mount+0x34f/0x18f0 [ 591.821782][T13295] ? legacy_parse_param+0x37b/0x880 [ 591.827008][T13295] ? cap_capable+0x250/0x290 [ 591.831748][T13295] legacy_get_tree+0xf9/0x1a0 [ 591.836437][T13295] ? btrfs_resize_thread_pool+0x290/0x290 [ 591.842295][T13295] vfs_get_tree+0x8f/0x380 [ 591.846716][T13295] do_mount+0x169d/0x2490 [ 591.846723][T13295] ? copy_mount_options+0x25e/0x3c0 [ 591.846734][T13295] ? copy_mount_options+0x308/0x3c0 [ 591.846743][T13295] ksys_mount+0xcc/0x100 [ 591.846756][T13295] __x64_sys_mount+0xbf/0xd0 [ 591.866222][T13295] do_syscall_64+0xfe/0x140 [ 591.866235][T13295] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 591.866250][T13295] RIP: 0033:0x45c2ca [ 591.866264][T13295] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 591.905189][T13295] RSP: 002b:00007f0134a31a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 591.915024][T13295] RAX: ffffffffffffffda RBX: 00007f0134a31b40 RCX: 000000000045c2ca [ 591.922997][T13295] RDX: 00007f0134a31ae0 RSI: 0000000020000100 RDI: 00007f0134a31b00 [ 591.930968][T13295] RBP: 0000000000000001 R08: 00007f0134a31b40 R09: 00007f0134a31ae0 [ 591.938945][T13295] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 13:18:25 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x0, [0x5c]}) 13:18:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 591.946921][T13295] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:18:26 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {0x0}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:18:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r1, &(0x7f0000001180)=""/4096, 0x1000) 13:18:26 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x0, [0x300]}) 13:18:26 executing program 5 (fault-call:1 fault-nth:79): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, r2, 0x0, 0x10005, 0x0) setsockopt$inet_dccp_int(r1, 0x21, 0xa, &(0x7f0000000140)=0x8d95, 0x4) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000080)=""/64) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000b97000)={0x1, &(0x7f000048fff0)=[{0x6}]}, 0x10) getsockopt$sock_buf(r3, 0x1, 0x1a, 0x0, &(0x7f0000000000)) fcntl$setlease(r3, 0x400, 0x0) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xde28cb53f79cdb42, 0x0) read$alg(r4, &(0x7f0000000180)=""/4096, 0x1000) [ 592.523783][T13325] FAULT_INJECTION: forcing a failure. [ 592.523783][T13325] name failslab, interval 1, probability 0, space 0, times 0 [ 592.555926][T13325] CPU: 1 PID: 13325 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 592.563851][T13325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 592.563855][T13325] Call Trace: [ 592.563873][T13325] dump_stack+0x1d8/0x2f8 [ 592.563890][T13325] should_fail+0x555/0x770 [ 592.588430][T13325] __should_failslab+0x11a/0x160 [ 592.593607][T13325] ? vfs_parse_fs_string+0xed/0x1a0 [ 592.598818][T13325] should_failslab+0x9/0x20 [ 592.598830][T13325] __kmalloc_track_caller+0x79/0x340 [ 592.598842][T13325] kmemdup_nul+0x2a/0xa0 [ 592.598858][T13325] vfs_parse_fs_string+0xed/0x1a0 [ 592.613204][T13325] vfs_kern_mount+0x77/0x160 13:18:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:26 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x0, [0x500]}) 13:18:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 592.613215][T13325] btrfs_mount+0x34f/0x18f0 [ 592.613231][T13325] ? legacy_parse_param+0x37b/0x880 [ 592.613242][T13325] ? cap_capable+0x250/0x290 [ 592.613254][T13325] legacy_get_tree+0xf9/0x1a0 [ 592.613262][T13325] ? btrfs_resize_thread_pool+0x290/0x290 [ 592.613271][T13325] vfs_get_tree+0x8f/0x380 [ 592.613284][T13325] do_mount+0x169d/0x2490 [ 592.622906][T13325] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 592.622917][T13325] ? copy_mount_options+0x5f/0x3c0 [ 592.622929][T13325] ? copy_mount_options+0x308/0x3c0 13:18:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:26 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x0, [0x600]}) [ 592.622944][T13325] ksys_mount+0xcc/0x100 [ 592.632904][T13325] __x64_sys_mount+0xbf/0xd0 [ 592.632918][T13325] do_syscall_64+0xfe/0x140 [ 592.632934][T13325] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 592.642306][T13325] RIP: 0033:0x45c2ca [ 592.642316][T13325] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 592.642320][T13325] RSP: 002b:00007f0134a31a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 592.642330][T13325] RAX: ffffffffffffffda RBX: 00007f0134a31b40 RCX: 000000000045c2ca [ 592.642335][T13325] RDX: 00007f0134a31ae0 RSI: 0000000020000100 RDI: 00007f0134a31b00 [ 592.642344][T13325] RBP: 0000000000000001 R08: 00007f0134a31b40 R09: 00007f0134a31ae0 [ 592.642349][T13325] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 592.642353][T13325] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:18:27 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {0x0}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:18:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x5a) 13:18:27 executing program 5 (fault-call:1 fault-nth:80): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:27 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x0, [0x700]}) 13:18:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:27 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x0, [0x900]}) 13:18:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 593.419593][T13353] FAULT_INJECTION: forcing a failure. [ 593.419593][T13353] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 593.434363][T13353] CPU: 0 PID: 13353 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 593.442255][T13353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 593.452605][T13353] Call Trace: [ 593.456087][T13353] dump_stack+0x1d8/0x2f8 [ 593.460435][T13353] should_fail+0x555/0x770 13:18:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:27 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x0, [0xa00]}) [ 593.465857][T13353] should_fail_alloc_page+0x55/0x60 [ 593.471080][T13353] prepare_alloc_pages+0x283/0x470 [ 593.476219][T13353] __alloc_pages_nodemask+0xb2/0x5d0 [ 593.481633][T13353] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 593.487105][T13353] kmem_getpages+0x56/0xa20 [ 593.491736][T13353] ? trace_lock_release+0x135/0x1a0 [ 593.496982][T13353] cache_grow_begin+0x7e/0x2c0 [ 593.501755][T13353] cache_alloc_refill+0x311/0x3f0 [ 593.507212][T13353] ? check_preemption_disabled+0xb7/0x2a0 [ 593.512960][T13353] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 593.518349][T13353] ? btrfs_mount_root+0x12c/0x1050 [ 593.523481][T13353] btrfs_mount_root+0x12c/0x1050 [ 593.528433][T13353] ? trace_hardirqs_on_caller+0x46/0x80 [ 593.534015][T13353] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 593.539504][T13353] ? check_preemption_disabled+0xa9/0x2a0 [ 593.545255][T13353] legacy_get_tree+0xf9/0x1a0 [ 593.550141][T13353] ? btrfs_control_open+0x40/0x40 [ 593.555172][T13353] vfs_get_tree+0x8f/0x380 [ 593.559611][T13353] vfs_kern_mount+0xc2/0x160 [ 593.564342][T13353] btrfs_mount+0x34f/0x18f0 [ 593.570198][T13353] ? legacy_parse_param+0xaa/0x880 [ 593.576016][T13353] ? legacy_parse_param+0x111/0x880 [ 593.581225][T13353] ? legacy_parse_param+0x37b/0x880 [ 593.586440][T13353] ? cap_capable+0x250/0x290 [ 593.591041][T13353] legacy_get_tree+0xf9/0x1a0 [ 593.595730][T13353] ? btrfs_resize_thread_pool+0x290/0x290 [ 593.601450][T13353] vfs_get_tree+0x8f/0x380 [ 593.605993][T13353] do_mount+0x169d/0x2490 [ 593.610316][T13353] ? copy_mount_options+0x308/0x3c0 [ 593.615551][T13353] ksys_mount+0xcc/0x100 [ 593.619780][T13353] __x64_sys_mount+0xbf/0xd0 [ 593.625165][T13353] do_syscall_64+0xfe/0x140 [ 593.629670][T13353] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 593.635690][T13353] RIP: 0033:0x45c2ca [ 593.639575][T13353] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 593.659757][T13353] RSP: 002b:00007f0134a31a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 593.669357][T13353] RAX: ffffffffffffffda RBX: 00007f0134a31b40 RCX: 000000000045c2ca [ 593.677608][T13353] RDX: 00007f0134a31ae0 RSI: 0000000020000100 RDI: 00007f0134a31b00 [ 593.686749][T13353] RBP: 0000000000000001 R08: 00007f0134a31b40 R09: 00007f0134a31ae0 [ 593.695826][T13353] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 593.704649][T13353] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:18:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:28 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x0, [0xb00]}) 13:18:28 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005d80)=""/171, 0xab}, {0x0}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:18:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) bind$inet(r3, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x544feab41e1d6d03) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) setsockopt$inet_dccp_int(r1, 0x21, 0xa, &(0x7f0000000140)=0x8d95, 0x4) accept4$x25(r2, &(0x7f0000001480)={0x9, @remote}, &(0x7f00000014c0)=0x12, 0x80800) write$P9_RLERRORu(r1, &(0x7f0000001200)=ANY=[@ANYBLOB="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"], 0x1d) unshare(0x24020400) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b97000)={0x1, &(0x7f000048fff0)=[{0x6}]}, 0x10) getsockopt$sock_buf(r4, 0x1, 0x1a, 0x0, &(0x7f0000000000)) syz_open_dev$radio(&(0x7f0000001600)='/dev/radio#\x00', 0x1, 0x2) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000b97000)={0x1, &(0x7f000048fff0)=[{0x6}]}, 0x10) getsockopt$sock_buf(r5, 0x1, 0x1a, 0x0, &(0x7f0000000000)) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000b97000)={0x1, &(0x7f000048fff0)=[{0x6}]}, 0x10) getsockopt$sock_buf(r6, 0x1, 0x1a, 0x0, &(0x7f0000000000)) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f0000b97000)={0x1, &(0x7f000048fff0)=[{0x6}]}, 0x10) getsockopt$sock_buf(r7, 0x1, 0x1a, 0x0, &(0x7f0000000000)) fstatfs(r7, &(0x7f0000001740)=""/252) r8 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x40040, 0x0) r9 = creat(&(0x7f0000001180)='./file0\x00', 0x23) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r9, 0x110, 0x5, &(0x7f00000011c0)=[0x0, 0x4], 0x2) r10 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x6, 0x480) ioctl$VIDIOC_CROPCAP(r10, 0xc02c563a, &(0x7f0000000100)={0x7, {0x0, 0x4, 0x0, 0x7fffffff}, {0x80, 0x2, 0x8, 0x7}, {0x9, 0x80000001}}) read$alg(r8, &(0x7f0000000180)=""/4096, 0x1000) 13:18:28 executing program 5 (fault-call:1 fault-nth:81): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 594.235599][T13382] validate_nla: 19 callbacks suppressed [ 594.235606][T13382] netlink: 'syz-executor.4': attribute type 33 has an invalid length. 13:18:28 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x0, [0xc00]}) [ 594.281921][T13382] net_ratelimit: 19 callbacks suppressed [ 594.281927][T13382] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:18:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 594.348742][T13381] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 594.365133][T13383] FAULT_INJECTION: forcing a failure. [ 594.365133][T13383] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 594.380344][T13383] CPU: 0 PID: 13383 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 594.388249][T13383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 13:18:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 594.398315][T13383] Call Trace: [ 594.398338][T13383] dump_stack+0x1d8/0x2f8 [ 594.398351][T13383] should_fail+0x555/0x770 [ 594.398366][T13383] should_fail_alloc_page+0x55/0x60 [ 594.398378][T13383] prepare_alloc_pages+0x283/0x470 [ 594.398388][T13383] __alloc_pages_nodemask+0xb2/0x5d0 [ 594.398404][T13383] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 594.403622][T13381] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 594.406210][T13383] kmem_getpages+0x56/0xa20 [ 594.406222][T13383] ? trace_lock_release+0x135/0x1a0 [ 594.406233][T13383] cache_grow_begin+0x7e/0x2c0 [ 594.406248][T13383] cache_alloc_refill+0x311/0x3f0 [ 594.415841][T13383] ? check_preemption_disabled+0xb7/0x2a0 [ 594.415856][T13383] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 594.415867][T13383] ? btrfs_mount_root+0x12c/0x1050 [ 594.415881][T13383] btrfs_mount_root+0x12c/0x1050 [ 594.448761][T13383] ? vfs_parse_fs_string+0x13b/0x1a0 [ 594.448771][T13383] ? trace_kfree+0xa0/0x110 [ 594.448785][T13383] legacy_get_tree+0xf9/0x1a0 [ 594.458490][T13383] ? btrfs_control_open+0x40/0x40 [ 594.458505][T13383] vfs_get_tree+0x8f/0x380 [ 594.468583][T13391] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 594.468910][T13383] vfs_kern_mount+0xc2/0x160 [ 594.468922][T13383] btrfs_mount+0x34f/0x18f0 [ 594.468939][T13383] ? legacy_parse_param+0x37b/0x880 [ 594.485169][T13391] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 594.485312][T13383] ? cap_capable+0x250/0x290 [ 594.556870][T13383] legacy_get_tree+0xf9/0x1a0 [ 594.561700][T13383] ? btrfs_resize_thread_pool+0x290/0x290 [ 594.567590][T13383] vfs_get_tree+0x8f/0x380 [ 594.572014][T13383] do_mount+0x169d/0x2490 [ 594.576332][T13383] ? copy_mount_options+0x308/0x3c0 [ 594.581517][T13383] ksys_mount+0xcc/0x100 [ 594.585757][T13383] __x64_sys_mount+0xbf/0xd0 [ 594.590923][T13383] do_syscall_64+0xfe/0x140 [ 594.595435][T13383] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 594.601324][T13383] RIP: 0033:0x45c2ca [ 594.607682][T13383] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 594.628793][T13383] RSP: 002b:00007f0134a31a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 594.637477][T13383] RAX: ffffffffffffffda RBX: 00007f0134a31b40 RCX: 000000000045c2ca 13:18:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 594.645868][T13383] RDX: 00007f0134a31ae0 RSI: 0000000020000100 RDI: 00007f0134a31b00 [ 594.653844][T13383] RBP: 0000000000000001 R08: 00007f0134a31b40 R09: 00007f0134a31ae0 [ 594.661810][T13383] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 594.670130][T13383] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 594.695633][T13393] netlink: 'syz-executor.4': attribute type 33 has an invalid length. 13:18:28 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x0, [0xd00]}) [ 594.725604][T13393] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 594.745129][T13397] netlink: 'syz-executor.1': attribute type 33 has an invalid length. 13:18:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:28 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x0, [0xe00]}) 13:18:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 594.769791][T13397] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:18:28 executing program 5 (fault-call:1 fault-nth:82): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) [ 594.832270][T13402] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 594.856408][T13402] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 594.923886][T13406] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 594.954730][T13406] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 594.995642][T13408] FAULT_INJECTION: forcing a failure. [ 594.995642][T13408] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 595.008874][T13408] CPU: 0 PID: 13408 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 595.008880][T13408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 595.008884][T13408] Call Trace: [ 595.008900][T13408] dump_stack+0x1d8/0x2f8 [ 595.008918][T13408] should_fail+0x555/0x770 [ 595.026864][T13408] should_fail_alloc_page+0x55/0x60 [ 595.026874][T13408] prepare_alloc_pages+0x283/0x470 [ 595.026885][T13408] __alloc_pages_nodemask+0xb2/0x5d0 [ 595.026894][T13408] ? check_preemption_disabled+0xa9/0x2a0 [ 595.026906][T13408] kmem_getpages+0x56/0xa20 [ 595.026915][T13408] ? trace_lock_release+0x135/0x1a0 [ 595.026924][T13408] cache_grow_begin+0x7e/0x2c0 [ 595.026934][T13408] cache_alloc_refill+0x311/0x3f0 [ 595.026941][T13408] ? check_preemption_disabled+0xb7/0x2a0 [ 595.026955][T13408] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 595.091496][T13408] ? btrfs_mount_root+0x12c/0x1050 [ 595.096632][T13408] btrfs_mount_root+0x12c/0x1050 [ 595.101604][T13408] ? vfs_parse_fs_string+0x13b/0x1a0 [ 595.107058][T13408] ? trace_kfree+0xa0/0x110 [ 595.111736][T13408] legacy_get_tree+0xf9/0x1a0 [ 595.116558][T13408] ? btrfs_control_open+0x40/0x40 [ 595.121585][T13408] vfs_get_tree+0x8f/0x380 [ 595.126014][T13408] vfs_kern_mount+0xc2/0x160 [ 595.131790][T13408] btrfs_mount+0x34f/0x18f0 [ 595.131803][T13408] ? retint_kernel+0x2b/0x2b [ 595.131815][T13408] ? legacy_parse_param+0x37b/0x880 [ 595.131826][T13408] ? cap_capable+0x250/0x290 [ 595.131840][T13408] legacy_get_tree+0xf9/0x1a0 [ 595.140923][T13408] ? btrfs_resize_thread_pool+0x290/0x290 [ 595.140938][T13408] vfs_get_tree+0x8f/0x380 [ 595.140949][T13408] do_mount+0x169d/0x2490 [ 595.140957][T13408] ? copy_mount_options+0x25e/0x3c0 [ 595.140967][T13408] ? copy_mount_options+0x308/0x3c0 [ 595.140976][T13408] ksys_mount+0xcc/0x100 [ 595.140991][T13408] __x64_sys_mount+0xbf/0xd0 [ 595.191360][T13408] do_syscall_64+0xfe/0x140 [ 595.195892][T13408] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 595.201797][T13408] RIP: 0033:0x45c2ca [ 595.205811][T13408] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 595.227074][T13408] RSP: 002b:00007f0134a31a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 595.235508][T13408] RAX: ffffffffffffffda RBX: 00007f0134a31b40 RCX: 000000000045c2ca 13:18:29 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x3, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:18:29 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x0, [0x1100]}) 13:18:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100000001, &(0x7f00000013c0)="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") openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x185800, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) openat$md(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/md0\x00', 0x100, 0x0) close(r2) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, r2, 0x0, 0x10005, 0x0) getsockopt$inet6_dccp_buf(r1, 0x21, 0xf, &(0x7f0000000100)=""/4, &(0x7f0000001180)=0x4) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10) setsockopt$inet_dccp_int(r1, 0x21, 0xa, &(0x7f0000000140)=0x8d95, 0x4) ioctl$SCSI_IOCTL_PROBE_HOST(r1, 0x5385, &(0x7f0000001540)={0xfd, ""/253}) unshare(0x24020400) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r3, &(0x7f0000000180)=""/4096, 0x1000) signalfd(r0, &(0x7f0000000000)={0x4}, 0x8) 13:18:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 595.243499][T13408] RDX: 00007f0134a31ae0 RSI: 0000000020000100 RDI: 00007f0134a31b00 [ 595.251477][T13408] RBP: 0000000000000001 R08: 00007f0134a31b40 R09: 00007f0134a31ae0 [ 595.259468][T13408] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 595.267794][T13408] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:18:29 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x0, [0x1200]}) 13:18:29 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x400202, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000001380)="11dca5055e0bcfe47bf070d2d609629f677493f109877db1714f9fe7febfeef3d08ed00ad8ed5c52966c982ae2176bc9e27c823a124672a701feb4677118bd553407291afd3cb7d8e553a8117f5ec87dfa97522624b0a5de980b4ddaa7b1d4e3f1fe0530c692dd0400000000000000db1e7769921ccf558a9ec81c57544a6f1526a132e1bc8650dd2c459cd5ac8866bbb5a1095d07624c8534c4bade122da1b738faf9bc0d3f42eaac6dae437c0605854ddd25049f2f2d431ccd7793b7ffa045f858cf6470") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080)=0x40, 0x4) [ 595.316818][T13420] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 595.338830][T13420] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:18:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:29 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x0, [0x2500]}) 13:18:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) [ 595.366250][T13418] netlink: 'syz-executor.1': attribute type 33 has an invalid length. [ 595.385978][T13418] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 13:18:29 executing program 5 (fault-call:1 fault-nth:83): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:29 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x0, [0x4000]}) [ 595.450533][T13431] netlink: 'syz-executor.4': attribute type 33 has an invalid length. [ 595.474911][T13431] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 595.543452][T13439] FAULT_INJECTION: forcing a failure. [ 595.543452][T13439] name failslab, interval 1, probability 0, space 0, times 0 [ 595.564215][T13439] CPU: 1 PID: 13439 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 595.572312][T13439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 595.572317][T13439] Call Trace: [ 595.572338][T13439] dump_stack+0x1d8/0x2f8 [ 595.572353][T13439] should_fail+0x555/0x770 [ 595.572367][T13439] __should_failslab+0x11a/0x160 [ 595.572378][T13439] should_failslab+0x9/0x20 [ 595.572389][T13439] kmem_cache_alloc_trace+0x5d/0x2f0 [ 595.572398][T13439] ? btrfs_mount_root+0x12c/0x1050 [ 595.572409][T13439] btrfs_mount_root+0x12c/0x1050 [ 595.572424][T13439] ? vfs_parse_fs_string+0x13b/0x1a0 [ 595.572432][T13439] ? trace_kfree+0xa0/0x110 [ 595.572442][T13439] legacy_get_tree+0xf9/0x1a0 [ 595.572450][T13439] ? btrfs_control_open+0x40/0x40 [ 595.572459][T13439] vfs_get_tree+0x8f/0x380 [ 595.572470][T13439] vfs_kern_mount+0xc2/0x160 [ 595.572479][T13439] btrfs_mount+0x34f/0x18f0 [ 595.572492][T13439] ? legacy_parse_param+0x37b/0x880 [ 595.572502][T13439] ? cap_capable+0x250/0x290 [ 595.572516][T13439] legacy_get_tree+0xf9/0x1a0 [ 595.586448][T13439] ? btrfs_resize_thread_pool+0x290/0x290 [ 595.675847][T13439] vfs_get_tree+0x8f/0x380 [ 595.680271][T13439] do_mount+0x169d/0x2490 [ 595.684596][T13439] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 595.690162][T13439] ? copy_mount_options+0x5f/0x3c0 [ 595.695356][T13439] ? copy_mount_options+0x308/0x3c0 [ 595.700548][T13439] ksys_mount+0xcc/0x100 [ 595.704784][T13439] __x64_sys_mount+0xbf/0xd0 [ 595.709567][T13439] do_syscall_64+0xfe/0x140 [ 595.714095][T13439] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 595.719989][T13439] RIP: 0033:0x45c2ca [ 595.723883][T13439] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 595.743486][T13439] RSP: 002b:00007f0134a31a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 595.751901][T13439] RAX: ffffffffffffffda RBX: 00007f0134a31b40 RCX: 000000000045c2ca [ 595.760138][T13439] RDX: 00007f0134a31ae0 RSI: 0000000020000100 RDI: 00007f0134a31b00 [ 595.768551][T13439] RBP: 0000000000000001 R08: 00007f0134a31b40 R09: 00007f0134a31ae0 [ 595.776541][T13439] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 595.784519][T13439] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:18:30 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x3, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:18:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) timerfd_create(0x3, 0x180000) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") unshare(0x24020400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r1, &(0x7f0000000180)=""/4096, 0x1000) 13:18:30 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x0, [0x5c00]}) 13:18:30 executing program 5 (fault-call:1 fault-nth:84): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0xa4}, [@ldst={0x5}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xb1e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffcbd, 0x10, &(0x7f0000000000), 0x3}, 0x48) 13:18:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:30 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x0, [0x1000000]}) [ 596.260351][T13452] FAULT_INJECTION: forcing a failure. [ 596.260351][T13452] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 596.273603][T13452] CPU: 0 PID: 13452 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 596.281480][T13452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 596.291846][T13452] Call Trace: [ 596.295127][T13452] dump_stack+0x1d8/0x2f8 [ 596.299441][T13452] should_fail+0x555/0x770 [ 596.304554][T13452] should_fail_alloc_page+0x55/0x60 [ 596.309789][T13452] prepare_alloc_pages+0x283/0x470 [ 596.314889][T13452] __alloc_pages_nodemask+0xb2/0x5d0 [ 596.320196][T13452] kmem_getpages+0x56/0xa20 [ 596.324690][T13452] ? trace_lock_release+0x135/0x1a0 [ 596.329870][T13452] cache_grow_begin+0x7e/0x2c0 [ 596.334623][T13452] cache_alloc_refill+0x311/0x3f0 [ 596.339625][T13452] ? check_preemption_disabled+0xb7/0x2a0 [ 596.345355][T13452] kmem_cache_alloc+0x2b9/0x2e0 [ 596.350223][T13452] ? getname_kernel+0x59/0x2f0 [ 596.354978][T13452] getname_kernel+0x59/0x2f0 [ 596.359573][T13452] kern_path+0x1f/0x40 [ 596.363629][T13452] blkdev_get_by_path+0x71/0x270 [ 596.368553][T13452] btrfs_get_bdev_and_sb+0x48/0x280 [ 596.373732][T13452] open_fs_devices+0x14d/0xb40 [ 596.378474][T13452] ? list_sort+0x5fc/0x860 [ 596.382868][T13452] ? blkdev_put+0x2c8/0x3b0 [ 596.387346][T13452] ? btrfs_open_devices+0x1c0/0x1c0 [ 596.392524][T13452] btrfs_open_devices+0x11d/0x1c0 [ 596.397526][T13452] btrfs_mount_root+0x6ef/0x1050 [ 596.402443][T13452] ? vfs_parse_fs_string+0x13b/0x1a0 [ 596.408140][T13452] ? trace_kfree+0xa0/0x110 [ 596.412637][T13452] legacy_get_tree+0xf9/0x1a0 [ 596.417300][T13452] ? btrfs_control_open+0x40/0x40 [ 596.422326][T13452] vfs_get_tree+0x8f/0x380 [ 596.426730][T13452] vfs_kern_mount+0xc2/0x160 [ 596.431299][T13452] btrfs_mount+0x34f/0x18f0 [ 596.435782][T13452] ? trace_hardirqs_on_caller+0x74/0x80 [ 596.441307][T13452] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 596.446739][T13452] ? check_preemption_disabled+0xa9/0x2a0 [ 596.452458][T13452] ? retint_kernel+0x2b/0x2b [ 596.457037][T13452] ? capable+0x7e/0xf0 [ 596.461188][T13452] legacy_get_tree+0xf9/0x1a0 [ 596.465874][T13452] ? btrfs_resize_thread_pool+0x290/0x290 [ 596.471589][T13452] vfs_get_tree+0x8f/0x380 [ 596.476009][T13452] do_mount+0x169d/0x2490 [ 596.480330][T13452] ? copy_mount_options+0x308/0x3c0 [ 596.485512][T13452] ksys_mount+0xcc/0x100 [ 596.489746][T13452] __x64_sys_mount+0xbf/0xd0 [ 596.494315][T13452] do_syscall_64+0xfe/0x140 [ 596.498799][T13452] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 596.504669][T13452] RIP: 0033:0x45c2ca [ 596.508542][T13452] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 596.528318][T13452] RSP: 002b:00007f0134a31a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 596.536729][T13452] RAX: ffffffffffffffda RBX: 00007f0134a31b40 RCX: 000000000045c2ca [ 596.544949][T13452] RDX: 00007f0134a31ae0 RSI: 0000000020000100 RDI: 00007f0134a31b00 [ 596.552926][T13452] RBP: 0000000000000001 R08: 00007f0134a31b40 R09: 00007f0134a31ae0 13:18:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 596.560881][T13452] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 596.568965][T13452] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:18:30 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x0, [0x2000000]}) 13:18:30 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x3, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:18:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:30 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x0, [0x25640c0]}) 13:18:30 executing program 2: creat(&(0x7f0000000580)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x1, 0x5ebb4d953a08e709) 13:18:30 executing program 5 (fault-call:1 fault-nth:85): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:31 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x0, [0x3000000]}) 13:18:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 597.166646][T13482] FAULT_INJECTION: forcing a failure. [ 597.166646][T13482] name failslab, interval 1, probability 0, space 0, times 0 [ 597.207286][T13482] CPU: 0 PID: 13482 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 597.215241][T13482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 597.225299][T13482] Call Trace: [ 597.228604][T13482] dump_stack+0x1d8/0x2f8 [ 597.232940][T13482] should_fail+0x555/0x770 [ 597.232954][T13482] __should_failslab+0x11a/0x160 [ 597.232969][T13482] ? mempool_alloc_slab+0x4d/0x70 [ 597.242340][T13482] should_failslab+0x9/0x20 [ 597.242352][T13482] kmem_cache_alloc+0x56/0x2e0 [ 597.242363][T13482] mempool_alloc_slab+0x4d/0x70 [ 597.242371][T13482] ? mempool_free+0x350/0x350 [ 597.242378][T13482] mempool_alloc+0x104/0x5e0 [ 597.242388][T13482] ? trace_lock_release+0x135/0x1a0 [ 597.242396][T13482] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 597.242402][T13482] ? trace_hardirqs_on_caller+0x46/0x80 [ 597.242414][T13482] bio_alloc_bioset+0x1b0/0x5f0 [ 597.242422][T13482] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 597.242437][T13482] ? check_preemption_disabled+0xa9/0x2a0 [ 597.303965][T13482] submit_bh_wbc+0x1d5/0x700 [ 597.303980][T13482] block_read_full_page+0x9de/0xbd0 [ 597.313747][T13482] ? blkdev_direct_IO+0xd0/0xd0 [ 597.313756][T13482] ? lru_cache_add+0x2db/0x3b0 [ 597.313767][T13482] ? add_to_page_cache_lru+0x2d4/0x4a0 [ 597.313776][T13482] blkdev_readpage+0x1c/0x20 [ 597.313783][T13482] do_read_cache_page+0x798/0xcb0 [ 597.313793][T13482] read_cache_page_gfp+0x29/0x30 [ 597.313804][T13482] btrfs_scan_one_device+0x16a/0x450 [ 597.313816][T13482] ? kfree+0x1a3/0x200 [ 597.352744][T13482] btrfs_mount_root+0x4af/0x1050 13:18:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 597.357885][T13482] ? vfs_parse_fs_string+0x13b/0x1a0 [ 597.363177][T13482] ? trace_kfree+0xa0/0x110 [ 597.367866][T13482] legacy_get_tree+0xf9/0x1a0 [ 597.372871][T13482] ? btrfs_control_open+0x40/0x40 [ 597.377909][T13482] vfs_get_tree+0x8f/0x380 [ 597.382506][T13482] vfs_kern_mount+0xc2/0x160 [ 597.387104][T13482] btrfs_mount+0x34f/0x18f0 [ 597.391613][T13482] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 597.397080][T13482] ? trace_irq_enable_rcuidle+0x23/0x1e0 [ 597.402740][T13482] ? trace_hardirqs_on_caller+0x46/0x80 [ 597.410971][T13482] ? retint_kernel+0x2b/0x2b [ 597.410981][T13482] ? trace_hardirqs_on_caller+0x74/0x80 [ 597.410993][T13482] ? cap_capable+0x250/0x290 [ 597.411007][T13482] legacy_get_tree+0xf9/0x1a0 [ 597.411019][T13482] ? btrfs_resize_thread_pool+0x290/0x290 [ 597.411028][T13482] vfs_get_tree+0x8f/0x380 [ 597.411040][T13482] do_mount+0x169d/0x2490 [ 597.411049][T13482] ? copy_mount_options+0x308/0x3c0 [ 597.411058][T13482] ksys_mount+0xcc/0x100 [ 597.411066][T13482] __x64_sys_mount+0xbf/0xd0 [ 597.411078][T13482] do_syscall_64+0xfe/0x140 [ 597.411094][T13482] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 597.422656][T13482] RIP: 0033:0x45c2ca [ 597.422666][T13482] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 597.422670][T13482] RSP: 002b:00007f0134a31a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 597.422678][T13482] RAX: ffffffffffffffda RBX: 00007f0134a31b40 RCX: 000000000045c2ca [ 597.422684][T13482] RDX: 00007f0134a31ae0 RSI: 0000000020000100 RDI: 00007f0134a31b00 [ 597.422689][T13482] RBP: 0000000000000001 R08: 00007f0134a31b40 R09: 00007f0134a31ae0 [ 597.422693][T13482] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 597.422698][T13482] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:18:31 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {0x0}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:18:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:31 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:31 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x0, [0x4000000]}) 13:18:31 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775db7b2803b4f0a1258b675d26b0952fb6e5b3b60ced5c54dbb72955f0dd8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000001000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="00000000ffffffff00"/104], 0x68) recvmmsg(r1, &(0x7f0000000d40)=[{{0x0, 0x0, &(0x7f0000000dc0)=[{&(0x7f0000000700)=""/54, 0x36}, {&(0x7f0000000740)=""/49, 0x31}], 0x2}}], 0x1, 0x0, 0x0) 13:18:31 executing program 5 (fault-call:1 fault-nth:86): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:31 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x0, [0x5000000]}) 13:18:31 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775db7b2803b4f0a1258b675d26b0952fb6e5b3b60ced5c54dbb72955f0dd8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000001000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="00000000ffffffff00"/104], 0x68) recvmmsg(r1, &(0x7f0000000d40)=[{{0x0, 0x0, &(0x7f0000000dc0)=[{&(0x7f0000000700)=""/54, 0x36}, {&(0x7f0000000740)=""/49, 0x31}], 0x2}}], 0x1, 0x0, 0x0) 13:18:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 598.026346][T13512] FAULT_INJECTION: forcing a failure. [ 598.026346][T13512] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 598.040286][T13512] CPU: 0 PID: 13512 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 598.048266][T13512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 598.058496][T13512] Call Trace: [ 598.062491][T13512] dump_stack+0x1d8/0x2f8 [ 598.066871][T13512] should_fail+0x555/0x770 [ 598.071317][T13512] should_fail_alloc_page+0x55/0x60 [ 598.076539][T13512] prepare_alloc_pages+0x283/0x470 [ 598.081676][T13512] __alloc_pages_nodemask+0xb2/0x5d0 [ 598.086983][T13512] ? trace_lock_release+0x135/0x1a0 [ 598.092323][T13512] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 598.092336][T13512] kmem_getpages+0x56/0xa20 [ 598.092347][T13512] ? trace_lock_release+0x135/0x1a0 [ 598.092356][T13512] cache_grow_begin+0x7e/0x2c0 [ 598.092365][T13512] cache_alloc_refill+0x311/0x3f0 [ 598.092374][T13512] ? check_preemption_disabled+0xb7/0x2a0 [ 598.092384][T13512] kmem_cache_alloc_trace+0x2d0/0x2f0 [ 598.092395][T13512] ? btrfs_mount_root+0x1b2/0x1050 [ 598.092403][T13512] btrfs_mount_root+0x1b2/0x1050 [ 598.092418][T13512] ? vfs_parse_fs_string+0x13b/0x1a0 [ 598.092431][T13512] ? trace_kfree+0xa0/0x110 [ 598.102389][T13512] legacy_get_tree+0xf9/0x1a0 [ 598.102399][T13512] ? btrfs_control_open+0x40/0x40 [ 598.102409][T13512] vfs_get_tree+0x8f/0x380 [ 598.102420][T13512] vfs_kern_mount+0xc2/0x160 [ 598.102428][T13512] btrfs_mount+0x34f/0x18f0 [ 598.102448][T13512] ? legacy_parse_param+0x37b/0x880 [ 598.153700][T13512] ? cap_capable+0x250/0x290 [ 598.153715][T13512] legacy_get_tree+0xf9/0x1a0 [ 598.153728][T13512] ? btrfs_resize_thread_pool+0x290/0x290 [ 598.153738][T13512] vfs_get_tree+0x8f/0x380 [ 598.153750][T13512] do_mount+0x169d/0x2490 [ 598.153758][T13512] ? copy_mount_options+0x25e/0x3c0 [ 598.153767][T13512] ? copy_mount_options+0x308/0x3c0 [ 598.153775][T13512] ksys_mount+0xcc/0x100 [ 598.153784][T13512] __x64_sys_mount+0xbf/0xd0 [ 598.153795][T13512] do_syscall_64+0xfe/0x140 13:18:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775db7b2803b4f0a1258b675d26b0952fb6e5b3b60ced5c54dbb72955f0dd8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000001000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="00000000ffffffff00"/104], 0x68) recvmmsg(r1, &(0x7f0000000d40)=[{{0x0, 0x0, &(0x7f0000000dc0)=[{&(0x7f0000000700)=""/54, 0x36}, {&(0x7f0000000740)=""/49, 0x31}], 0x2}}], 0x1, 0x0, 0x0) 13:18:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 598.153808][T13512] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 598.153823][T13512] RIP: 0033:0x45c2ca [ 598.163237][T13512] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 598.163242][T13512] RSP: 002b:00007f0134a31a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 598.163250][T13512] RAX: ffffffffffffffda RBX: 00007f0134a31b40 RCX: 000000000045c2ca [ 598.163255][T13512] RDX: 00007f0134a31ae0 RSI: 0000000020000100 RDI: 00007f0134a31b00 [ 598.163259][T13512] RBP: 0000000000000001 R08: 00007f0134a31b40 R09: 00007f0134a31ae0 [ 598.163264][T13512] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 598.163269][T13512] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 13:18:32 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1a, 0x304, 0x0, 0x0, 0x0, 0x0, @random="0387945b9f37"}, 0x10) recvmmsg(r0, &(0x7f00000077c0)=[{{&(0x7f0000005a80)=@isdn, 0x80, &(0x7f0000002c00)=[{&(0x7f0000005b00)=""/92, 0x5c}, {&(0x7f0000005b80)=""/197, 0xc5}], 0x2}, 0x1}, {{&(0x7f0000005c80)=@xdp, 0x80, &(0x7f0000005f00)=[{&(0x7f0000005d00)=""/97, 0x61}, {0x0}, {&(0x7f0000005e40)=""/128, 0x80}, {&(0x7f0000005ec0)}], 0x4, &(0x7f0000005f40)=""/183, 0xb7}, 0x1}, {{&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @hyper}, 0x80, &(0x7f0000006500)=[{&(0x7f0000006080)=""/99, 0x63}, {&(0x7f0000006100)=""/254, 0xfe}, {&(0x7f0000006200)=""/136, 0x88}, {&(0x7f00000062c0)=""/115, 0x73}, {&(0x7f0000006340)=""/117, 0x75}, {&(0x7f00000063c0)=""/63, 0x3f}, {&(0x7f0000006400)=""/106, 0x6a}, {&(0x7f0000006480)=""/128, 0x80}], 0x8, &(0x7f0000006580)=""/4096, 0x1000}, 0x200}, {{&(0x7f0000007580)=@x25={0x9, @remote}, 0x80, &(0x7f0000007780)=[{&(0x7f0000007600)=""/144, 0x90}, {&(0x7f00000076c0)=""/135, 0x87}], 0x2}, 0x1}], 0x4, 0x103, &(0x7f00000078c0)) 13:18:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:32 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x0, [0x6000000]}) 13:18:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775db7b2803b4f0a1258b675d26b0952fb6e5b3b60ced5c54dbb72955f0dd8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000001000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) write$binfmt_aout(r1, &(0x7f0000000800)=ANY=[@ANYBLOB="00000000ffffffff00"/104], 0x68) recvmmsg(r1, &(0x7f0000000d40)=[{{0x0, 0x0, &(0x7f0000000dc0)=[{&(0x7f0000000700)=""/54, 0x36}, {&(0x7f0000000740)=""/49, 0x31}], 0x2}}], 0x1, 0x0, 0x0) 13:18:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:32 executing program 5 (fault-call:1 fault-nth:87): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="8da4363ac0ed0200000000000001004d01000000000000000000000000000000fff6f2a2299748aeb81e1b00920efd9a000001000000000001fffffff60000005f42485266535f4d", 0x48, 0x10000}], 0x0, 0x0) 13:18:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:32 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775db7b2803b4f0a1258b675d26b0952fb6e5b3b60ced5c54dbb72955f0dd8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000001000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000d40)=[{{0x0, 0x0, &(0x7f0000000dc0)=[{&(0x7f0000000700)=""/54, 0x36}, {&(0x7f0000000740)=""/49, 0x31}], 0x2}}], 0x1, 0x0, 0x0) 13:18:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) 13:18:32 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x2, 0x1, 0x0, "d84508255c9dcde5bf0e377ba316eff6de4ea002f0ee1528d35b1f6ce2b535d9", 0x0, [0x7000000]}) [ 598.915344][T13540] FAULT_INJECTION: forcing a failure. [ 598.915344][T13540] name failslab, interval 1, probability 0, space 0, times 0 [ 598.936825][T13540] CPU: 0 PID: 13540 Comm: syz-executor.5 Not tainted 5.3.0-rc7+ #0 [ 598.944778][T13540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 598.954840][T13540] Call Trace: [ 598.958144][T13540] dump_stack+0x1d8/0x2f8 [ 598.962484][T13540] should_fail+0x555/0x770 [ 598.966901][T13540] __should_failslab+0x11a/0x160 [ 598.966914][T13540] ? bio_alloc_bioset+0x118/0x5f0 [ 598.966930][T13540] should_failslab+0x9/0x20 [ 598.977055][T13540] __kmalloc+0x7a/0x340 [ 598.977074][T13540] bio_alloc_bioset+0x118/0x5f0 [ 598.990572][T13540] ? kmem_cache_alloc_trace+0x23a/0x2f0 [ 598.996122][T13540] ? btrfs_alloc_device+0x78/0x5a0 [ 599.001255][T13540] btrfs_alloc_device+0xa7/0x5a0 [ 599.006202][T13540] ? blkdev_put+0x2c8/0x3b0 [ 599.010711][T13540] close_fs_devices+0x4ae/0x910 [ 599.015563][T13540] btrfs_close_devices+0x33/0x130 [ 599.020669][T13540] btrfs_mount_root+0xa9d/0x1050 [ 599.025613][T13540] ? vfs_parse_fs_string+0x13b/0x1a0 [ 599.031255][T13540] ? kfree+0x1a8/0x200 [ 599.035340][T13540] legacy_get_tree+0xf9/0x1a0 [ 599.040023][T13540] ? btrfs_control_open+0x40/0x40 [ 599.045052][T13540] vfs_get_tree+0x8f/0x380 [ 599.049468][T13540] vfs_kern_mount+0xc2/0x160 [ 599.054101][T13540] btrfs_mount+0x34f/0x18f0 [ 599.058600][T13540] ? trace_hardirqs_on_caller+0x74/0x80 [ 599.064166][T13540] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 599.069640][T13540] ? check_preemption_disabled+0xa9/0x2a0 [ 599.075364][T13540] ? retint_kernel+0x2b/0x2b [ 599.079973][T13540] ? capable+0x7e/0xf0 [ 599.084222][T13540] legacy_get_tree+0xf9/0x1a0 [ 599.089087][T13540] ? btrfs_resize_thread_pool+0x290/0x290 [ 599.094819][T13540] vfs_get_tree+0x8f/0x380 [ 599.099254][T13540] do_mount+0x169d/0x2490 [ 599.103590][T13540] ? copy_mount_options+0x25e/0x3c0 [ 599.108901][T13540] ? copy_mount_options+0x308/0x3c0 [ 599.114261][T13540] ksys_mount+0xcc/0x100 [ 599.118511][T13540] __x64_sys_mount+0xbf/0xd0 [ 599.123118][T13540] do_syscall_64+0xfe/0x140 [ 599.127756][T13540] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 599.133665][T13540] RIP: 0033:0x45c2ca [ 599.137561][T13540] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 599.157163][T13540] RSP: 002b:00007f0134a31a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 13:18:33 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775db7b2803b4f0a1258b675d26b0952fb6e5b3b60ced5c54dbb72955f0dd8217ad62005127000000000000e60000", 0x30) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000001000)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000000d40)=[{{0x0, 0x0, &(0x7f0000000dc0)=[{&(0x7f0000000700)=""/54, 0x36}, {&(0x7f0000000740)=""/49, 0x31}], 0x2}}], 0x1, 0x0, 0x0) 13:18:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_CARRIER={0x8}]}, 0x30}}, 0x0) [ 599.165590][T13540] RAX: ffffffffffffffda RBX: 00007f0134a31b40 RCX: 000000000045c2ca [ 599.174291][T13540] RDX: 00007f0134a31ae0 RSI: 0000000020000100 RDI: 00007f0134a31b00 [ 599.182576][T13540] RBP: 0000000000000001 R08: 00007f0134a31b40 R09: 00007f0134a31ae0 [ 599.191383][T13540] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 599.199453][T13540] R13: 00000000004c8980 R14: 00000000004df898 R15: 0000000000000004 [ 599.237434][T13540] ------------[ cut here ]------------